Project post by LitmusChaos maintainers As promised, we are back with another edition of monthly updates from the LitmusChaos community. With the growth of Chaos Engineering community as well as the LitmusChaos community,we appreciate this massive…
How to deploy Kubernetes apps efficiently
Guest post originally published on the Snapt blog by Dave Blakey Kubernetes has been a revelation for companies working with containers. It makes container orchestration consistent, which can streamline development and make CI/CD processes more reliable….
Project post by KubeEdge maintainers The security of cloud native edge computing has been of concern to many users. It was difficult for users to perform effective security hardening on their edge systems due to no…
Cilium 1.12 GA: Cilium Service Mesh and other major new features for enterprise Kubernetes
The Cilium project is excited to announce the general availability of Cilium 1.12. Cilium is well known as the de-facto standard for cloud native networking and security, adopted by companies like Adobe, Bell Canada, and IKEA…
The 16-point checklist for GitOps success
Guest post originally published on the Weaveworks blog For efficient GitOps management in your organization you need a GitOps checklist. Here’s a handy 16 point checklist you and your team can use when getting started. Build…
How to secure Kubernetes Pods post-PSPs deprecation
Guest post originally published on the ARMO blog by Amir Kaushansky Kubernetes pods are the basic building blocks of Kubernetes. It’s managing one or more tightly coupled application containers allowing them to share resources and networks. Pods are…
Project post by Volcano project maintainers CNCF Volcano 1.6.0 is now available with new features such as elastic job management, dynamic scheduling and rescheduling based on actual resource utilization, and MPI job plugin. Volcano is the …
Know your cloud security acronyms: CWPP, CSPM, CIEM and CNAPP
Guest post originally published on the Orca Security blog by Ty Murphy and Sarah Smith Acronyms help communicate lengthy phrases, but they can sometimes be confusing. This is especially true in the security industry, which has…
How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses…
Local Env as Code: Is it possible yet
Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon…