Blog


Chaos Mesh + SkyWalking: better observability for chaos engineering
Member Post Chaos Mesh + SkyWalking: better observability for chaos engineering
Guest post originally published on the PingCAP blog by Ningxuan Wang Chaos Mesh is an open-source cloud-native chaos engineering platform. You can use Chaos Mesh to conveniently inject failures and simulate abnormalities that might occur in reality, so you can identify...
January 31, 2022 | By Ningxuan Wang

Serverless architecture: pros and cons
Member Post Serverless architecture: pros and cons
Guest post originally published on SparkFabrik’s blog by SparkFabrik Team Serverless computing is an execution model in which the Cloud service provider is responsible for executing part of the code through the dynamic allocation of resources. In this model, the...
January 28, 2022 | By SparkFabrik Team

Announcing the Kubernetes Policy Management Paper
Community Post Announcing the Kubernetes Policy Management Paper
Community post by Jim Bugwadia The CNCF Kubernetes Security Special Interest Group (SIG) and Policy Working group (WG) have just released a new paper on Kubernetes Policy Management to help educate the community about best practices for managing...
January 28, 2022 | By Jim Bugwadia

Unveil the secret ingredients of continuous delivery at enterprise scale with Argo CD
Unveil the secret ingredients of continuous delivery at enterprise scale with Argo CD
Guest post originally published on Akuity’s blog by Yuan Tang (Akuity), Hong Wang (Akuity), and Alexander Matyushentsev (Intuit) Deep Dive into Argo CD and Best Practices for Operating at Enterprise-Scale This is a recap from our KubeCon China 2021 talk. If you are interested...
January 27, 2022 | By Yuan Tang, Hong Wang, Alexander Matyushentsev

Secure your GitOps flows with Security-as-Code
Member Post Secure your GitOps flows with Security-as-Code
Guest post originally published on Magalix’s blog by Andrew Zola GitOps teams are shifting security left. This is fantastic news for anyone looking for a solid and efficient plan to secure applications, infrastructure, and other processes within the...
January 26, 2022 | By Andrew Zola

Getting started with your CNCF membership
Staff Post Getting started with your CNCF membership
CNCF is adding members at an astounding rate, with 98 joining at the last KubeCon + CloudNativeCon. When members join, they are often overwhelmed by the number and variety of marketing benefits their membership offers and dont know...
January 25, 2022

Secrets management: essential when using Kubernetes
End User Post Secrets management: essential when using Kubernetes
Guest post originally published on True‘s blog by Sebastiaan Kok In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management of these...
January 25, 2022 | By Sebastiaan Kok

How does threat intelligence work?
Member Post How does threat intelligence work?
Guest post originally published on Snapt’s blog by Iwan Price-Evans The software and web industries speak a lot about security and the ability to handle security threats intelligently. In a landscape where security is becoming increasingly complex in...
January 24, 2022 | By Iwan Price-Evans

KEDA at Zapier
End User Post KEDA at Zapier
End User guest post by Ratnadeep Debnath, Site Reliability Engineer at Zapier At Zapier, RabbitMQ is at the heart of Zap processing. We enqueue messages to RabbitMQ for each step in a Zap. These messages get consumed by...
January 21, 2022

How to monitor endpoints in Kubernetes using Blackbox Exporter
Member Post How to monitor endpoints in Kubernetes using Blackbox Exporter
Guest post originally published on InfraCloud’s blog by Suramya Shah Monitoring endpoints is an important aspect of system observability for diagnosing performance and availability issues. In this article, we will cover in detail how to achieve endpoint monitoring...
January 20, 2022 | By Suramya Shah