Achieving multi-tenancy in monitoring with Prometheus & the mighty Thanos Receiver
Guest post originally published on Infracloud’s blog by Sayan Das, DevOps Engineer at InfraCloud Technologies Hey there! If you are reading this blog post, then I guess you are already aware of Prometheus and how it helps us…
Rebuilding Linkerd’s continuous integration (CI) with Kubernetes in Docker (kind) and GitHub Actions
Guest post originally published on the Bouyant blog by Andrew Seigner This post is a writeup of a talk Andrew gave at KubeCon EU 2020. Introduction In mid-2019, the Linkerd project’s continuous integration (CI) took 45 minutes,…
Delivering cloud-native apps to Kubernetes using werf
werf is a CLI tool that glues well-established software (Git, Docker, Kubernetes, Helm, a variety of container registries & CI systems) to facilitate applications’ delivery. In this webinar, developers, release engineers & SREs will learn how…
The event will feature four days of educational sessions, technical content, and networking for anyone looking to learn about the cloud native ecosystem SAN FRANCISCO, Calif. – October 1, 2020 – The Cloud Native Computing Foundation®…
ephemeral.run: A full application environment for every PR–before you merge to master!
How do you give product managers an early view of new features before your changes are merged into master? How can your quality team run regression tests on a full, live environment, before merging into master?…
How to Create Ephemeral Environments using Crossplane and ArgoCD?
Guest post originally published on the InfraCloud blog by Suraj Banakar What if you could just spin up a temporary cluster to test your application and set it to delete it after a certain time period…
Simplify Kubernetes Resource Access Control using RBAC Impersonation
Guest post originally published on Bitnami by Juanjo Ciarlante Introduction Kubernetes, like any other secure system, supports the following concepts: Authentication: Verifying and proving identities for users and groups, and service accounts Authorization: Allowing users to…
Top 7 challenges to becoming cloud native
Guest post originally published on the CloudOps blog Cloud native applications take full advantage of the cloud’s operational model, driving business value by being auto-provisioning, scaling, and redundant. By breaking down monolithic applications into independent but…
Leaving the Swarm: The Road to Kubernetes
Guest post by Kevin Crawley, Developer Advocate for Containous In order to tell this story, we have to go back a little over three years ago, when I was asked to join Single as an investor,…
Kubernetes: How to automatically detect and deal with deprecated APIs
Guest post originally published on the DoiT International blog by Stepan Stipl, Senior Cloud Architect at DoiT International With Kubernetes 1.16 available for a while and starting to slowly roll out across many managed Kubernetes platforms,…