Securing containers against attacks in multiple deployments and different geolocations requires integrating security into multiple points in the pipeline. Using manual processes to impose the policies is error-prone. Automation is a key to ensure the best…
Decoding the self-healing Kubernetes: step by step
Guest post originally published on the Msys Technology blog by Atul Jadhav Prologue Business application that fails to operate 24/7 would be considered inefficient in the market. The idea is that applications run uninterrupted irrespective of a technical…
Harnessing the power of microservices to overcome an uncertain marketplace
Guest post originally published on the Aspen Mesh blog by Shawn Wormke, Incubation Lead at Aspen Mesh According to PwC’s 23rd Annual Global CEO Survey, the outlook for 2020 can be summarized in one word-uncertainty. According…
With users in 25 different countries, the telecommunications giant Vodafone launched a new digital strategy in 2016 with the goal of creating the #1 customer experience in each of those markets. Historically, the telecom industry in…
The difference between API Gateways and Service Mesh
Guest post originally published on Kong’s blog by Marco Palladino, co-founder and CTO, Kong Why API Management and Service Mesh are Complementary Patterns for Different Use Cases Note: The goal of this piece is to provide a cheat…
How-to guide: Debugging a Kubernetes application
Guest post originally published on Epsagon by Ran Ribenzaft When it comes to debugging a Kubernetes application, it’s usually a painful process, full of unknowns and unpredictable side effects. What happens when your Kubernetes cluster is not healing…
Kubernetes networking demystified: a brief guide
Guest post by Karen Bruner, Technical Evangelist, StackRox. Original article can be found here. Kubernetes cluster networking can be more than a bit confusing, even for engineers with hands-on experience working with virtual networks and request routing….
TOC votes to move Falco into CNCF incubator
Today, the Cloud Native Computing Foundation (CNCF) Technical Oversight Committee (TOC) voted to accept Falco as an incubation-level hosted project. Falco, which entered the CNCF Sandbox in October 2018, is an open source Kubernetes runtime security project. It provides intrusion…
12 Kubernetes configuration best practices
Guest post by Ajmal Kohgadai, originally published on StackRox By now most of us have heard about the role human error plays in causing data breaches. The Capital One breach from July is just the latest…
Cloud Native Computing Foundation Announces Schedule for KubeCon + CloudNativeCon San Diego
Foundation’s largest event yet is expected to host 12,000 attendees SAN FRANCISCO, Calif. – September 5, 2019 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, today announced the session…