Secure application communications with Mutual TLS and Istio
Member post originally published on Isto’s blog by Lin Sun and Yuval Kohavi Dive into securing application communications, mTLS and Istio to achieve end-to-end mTLS among your applications. One of the biggest reasons users adopt service mesh is…
Better Manage CI/CD Pipelines by Growing Your Tekton Skill Set Cloud Native Computing Foundation and Linux Foundation Training and Certification have launched the new course, CI/CD with Tekton (LFS274), designed to give both technical and non-technical professionals the…
Member post from Rob Williamson, Solace The goal of OpenTelemetry is to have a common system for tracing across different (aka distributed) technologies. It solves the problems created when systems are deployed across hybrid and multi-clouds, up and…
Rust + WebAssembly: building infrastructure for Large Language Model ecosystems
Community post originally published on Second State’s blog by Sam Liu, Second State Engineer, CNCF’s WasmEdge Maintainer and Miley Fu, CNCF Ambassador, DevRel at WasmEdge This is a talk at the track “The Programming Languages Shaping the Future…
Ambassador post originally published on Medium by Mitch Connors In preparation for my upcoming talk with Christian Hernandez, I’m setting up an ArgoCD instance which pulls config from a private GitHub repository. While this is my first time using Argo…
Securing attacks targeted at user or kernel level for customer X with KubeArmor & AWS Bottlerocket
Member post by AccuKnox Introduction: In the realm of cybersecurity, ensuring that virtualized or cloud-based infrastructures security is paramount. One crucial aspect is safeguarding applications where most of our crown-jewel sits and are susceptible to dynamic changes. In…
Introduction: a closer look at Kubernetes and Nomad
Guest post by Rob Newsome, Head of Product Management at stack.io In the realm of container orchestration, Kubernetes and Nomad are prominent figures, each furnishing a distinct method to container management. Kubernetes is renowned for its exhaustive features…
Under the hood of fault tolerant private cloud network (part 2 – the how)
Guest post originally published on Netris’ blog by Alex Saroyan, CEO/co-founder at Netris This is a continuation of Article 1. If you want to learn why we spend so much time thinking about High Availability, go there. Otherwise, if…
The New Stack: “Cilium CNCF Graduation Could Mean Better Observability, Security with eBPF”
eBPF (extended Berkeley packet filter) is a powerful technology that operates directly within the Linux kernel, offering robust hooks for extending runtime observability, security, and networking capabilities across various deployment environments. While eBPF has gained widespread adoption, organizations…
Cloud Native Computing Foundation Announces Cilium Graduation
eBPF-powered tool has been adopted by well over 100 organizations SAN FRANCISCO, Calif. – October 11, 2023 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, today announced the graduation of Cilium….