Distributed tracing in Kubernetes apps: What you need to know
Guest post originally published on Grafana Labs’ blog Kubernetes makes it easier for businesses to automate software deployment and manage applications in the cloud at scale. However, if you’ve ever deployed a cloud native app, you know how…
Announcing the Schedule for cdCon + GitOpsCon North America 2023
This year, CDF and CNCF join forces to bring attendees the best Continuous Delivery and GitOps content available SAN FRANCISCO, March 13, 2023 – The Continuous Delivery Foundation (CDF), which seeks to improve the world’s capacity to deliver…
Leveraging platform engineering and DevOps synergy for high-performance systems
Guest post originally published on the Ozone blog by Abhilash “Gartner expects that by 2026, 80% of software engineering organizations will establish platform teams as internal providers of reusable services, components, and tools for application delivery.”1 Gartner Insights….
2022 Kubernetes vulnerabilities – Main takeaways
Guest post originally published on ARMO’s blog by Ben Hirschberg All the main K8s vulnerabilities from 2022 consolidated into one article. Put together by Ben Hirschberg, CTO & co-founder of ARMO. During 2022, Kubernetes continued to cement itself as a…
Chaos engineering with LitmusChaos: September 2022 update
Guest post from LitmusChaos maintainers As promised, we are back with another edition of monthly updates from the LitmusChaos community. With the growth of the Chaos Engineering community as well as the LitmusChaos community, we appreciate this massive…
More than 65 organizations across the world join CNCF’s 800+ members to drive cloud native innovation across industries San Francisco, CA – September 13, 2022 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud…
Securing Kubernetes cluster using Kubescape and kube-bench
Guest post originally published on InfraCloud’s blog by Amar Chand With businesses adopting cloud native technology, Kubernetes has emerged as a primary tool of choice for container orchestration. Deploying and managing applications has never been easier. However, securing…
Backstage security audit & updates
Project post originally posted on the Backstage blog by Patrik Oldsberg, Spotify TL;DR: Backstage’s security posture continues to mature! Today, we’re releasing a report from an independent security audit and the first version of the Backstage Threat Model….
Orchestration versus choreography, which one should you use? The pros and cons
Guest post originally published on the Sparkfabrik blog Orchestration vs Choreography: Many factors need to be evaluated in order to figure out which approach is the most appropriate. Orchestration, Choreography or a Hybrid Approach: Let’s delve into how…
Project post by KubeEdge maintainers The security of cloud native edge computing has been of concern to many users. It was difficult for users to perform effective security hardening on their edge systems due to no security threat…