Understanding Kubernetes Gateway API: A Modern Approach to Traffic Management
Traffic management in Kubernetes can be complex, especially with modern applications composed of multiple services like frontends, APIs, and backends spread across hybrid and multi-cloud environments. As these environments grow, ensuring secure, efficient, and reliable communication…
Prepare your application landscape for zero trust with Keycloak 26.2
Strong identity and access management is a key component of a zero trust architecture for cloud native applications. Keycloak is well-known for its single-sign-on capabilities based on open standards. It provides you all the building blocks…
Components vs. Containers: Fight?
WebAssembly components offer a new way to deploy microservices and other applications in cloud native environments. This naturally raises the question: is the upstart component out to replace containers? Or is this one of those situations…
Cedar: A new approach to policy management for Kubernetes
The challenges organizations face when managing access control and authorization in cloud-native environments continue to grow in complexity. Organizations scaling their Kubernetes deployments, for example, work to balance their security requirements, operational flexibility, and policy manageability….
Cloud Native Telco Culminating in London the Week of KubeCon + CloudNativeCon Europe 2025
The first week of April, from March 31st to April 4th will be a huge week for cloud native and Telco in London, and it will be a great opportunity to highlight how much telecom is…
Open Networking & Edge Summit: A Must-Attend for KubeCon + CloudNativeCon Attendees
For over a decade, the Open Networking & Edge Summit has been the premier gathering for leaders in open networking, edge, cloud, and IoT industries. It’s a unique event that fosters a neutral, collaborative environment, bringing…
Data Protection Working Group Deep Dive Session at KubeCon + CloudNativeCon London
Data on Kubernetes is a growing field, with databases, object stores, and other stateful applications moving to the platform. The Data Protection Working Group focuses on data availability and preservation for Kubernetes – including backup, restore,…
From PCAP to SCAP: how Falco’s libraries, registries, and plugins enable cloud native insights
Member post by Nigel Douglas, Sysdig In cloud-native systems, understanding the behaviour of complex, distributed web apps requires powerful tools that can dissect system activity down to its core. As the CNCF graduate project Falco demonstrates,…
Observing and monitoring Large Language Model workloads with Ray
Ambassador post by Swastik Gour Introduction The emergence of Large Language Models (LLMs) such as GPT-4, PHI2, BERT, and T5 revolutionized natural language processing, with these models empowering high-end applications, including chatbots, recommendation systems, and analytics….
CEL-ebrating simplicity: mastering Kubernetes policy enforcement with CEL
Community post by Kevin Conner, Chief Engineer, Getup Cloud and co-author of Kubernetes in Action 2nd Edition As Kubernetes deployments grow in scale and complexity, policy enforcement becomes a critical aspect of maintaining secure and reliable…