Today, the Cloud Native Computing Foundation (CNCF) Technical Oversight Committee (TOC) voted to accept etcd as an incubation-level hosted project from KubeCon + CloudNativeCon Seattle. etcd is a distributed key value store that provides a reliable…
CNCF On-Demand: One API to Rule Them All – Building a Unified Platform with Kubernetes Aggregation
How do you build a unified product from a stack of open-source tools? In this talk, a Cozystack core maintainer walks through the engineering journey of integrating Helm, Operators, and the Kubernetes Aggregation Layer to build…
Securing the Node: A Primer on Cilium’s Host Firewall
When discussing Kubernetes network security, much of the attention focuses on pod-to-pod traffic, ingress controllers, and service meshes. But what about the underlying nodes themselves, the very foundation on which our workloads run? The attack surface…
Smart Uses of imagePullSecrets in Kubernetes Cluster with ServiceAccounts
Kubernetes is everywhere nowadays, so are the container images and fetching the images from a private registry is a norm because of N number of reasons including security, that being the topmost. Recap Just to give…
Announcing Kyverno Release 1.14!
TL;DR We are excited to announce the release of Kyverno 1.14.0, marking a significant milestone in our journey to make policy management in Kubernetes more modular, streamlined, and powerful. This release introduces two new policy types…
Announcing OpenReports: Standardized Kubernetes Reporting
The Kubernetes ecosystem, while powerful, is a sprawling landscape of tools. As organizations scale their deployments, ensuring compliance and security becomes paramount. But how do you effectively track and report on your Kubernetes policies and scanners…
CNCF On demand webinar: What’s new in the land of k0s
This webinar highlights the latest updates to k0s, the minimalist Kubernetes distribution, including its CNCF sandbox acceptance and new features like the control plane load balancer, kubelet root directory flag, and declarative etcd management.
These Kubernetes mistakes will make you an easy target for hackers
Kubernetes is exceedingly powerful for orchestrating containerized applications at scale. But without proper monitoring and observability—especially in self-managed infrastructure—it can quickly become a security disaster waiting to happen. This is not due to inherent flaws in…
Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench
In today’s world, where security risks and breaches are growing daily, it is crucial to maintain our applications and infrastructure’s compliance with security standards and that is where CIS benchmarks from CIS (Center for Internet Security)…
KubeCon + CloudNativeCon Europe 2025: Day Two Keynote Recap
Over 12,000 attendees streamed into the ExCel Arena for the second day of KubeCon + CloudNativeCon Europe 2025, enjoying yet another sunny day in London and primed to hear real world stories of cloud innovation. Here’s…