Cloud Native Live: Supercharge your infrastructure management with Open Policy Agent (OPA)
In the fast-evolving technology landscape, effective infrastructure governance is crucial to ensure the security, reliability, and cost efficiency of complex infrastructures. Policy-as-Code solutions, like Open Policy Agent (OPA), offer a powerful approach to address these challenges,…
An AI dilemma: how to implement generative AI tools safely and ethically
Member post by Dan Ciruli, VP of Product at D2iQ Artificial intelligence is being used in all sorts of ways, from chatbots and virtual assistants to self-driving cars, and 97% of business owners believe that ChatGPT…
Enterprise multi-cluster at scale: supporting flat networks in Linkerd
Guest post originally published on Linkerd’s blog by William Morgan (Photo by NASA on Unsplash) Linkerd has seen a steady rise in enterprise adoption, with companies like Adidas, Microsoft, Plaid, and DB Schenker deploying Linkerd at scale to bring security, compliance, and reliability to…
One-time pass codes for Kyverno
Community post originally published on Neon Mirrors by Chip Zoller In real life, imposed rules often have cases where exceptions may be required but on a case-by-case basis. Policy is really no different here. While prevention…
Workshop recap: running Linkerd in production
Guest post originally published on Linkerd’s blog by Flynn This blog post is based on a workshop that I delivered at Buoyant’s Service Mesh Academy. If this seems interesting, check out the full recording! Linkerd is used in…
Real-time analytics with stream processing and OLAP
Guest post originally published on Medium by Hubert Dulay Gartner States: “By the end of 2024, 75% of organizations will shift from piloting to operationalizing artificial intelligence (AI), driving a 5 times increase in streaming data and analytics…
Cloud Native Live: Intro to Tetragon – eBPF-based security observability & runtime enforcement
Cilium’s new Tetragon component enables powerful realtime, eBPF-based Security Observability and Runtime Enforcement.Tetragon detects and is able to react to security-significant events, such asProcess execution eventsSystem call activityI/O activity including network & file accessWhen used in…
Have we reached a point of no return on managing software dependencies?
Guest post originally published on Paolo Mainardi’s blog by Paolo Mainardi, Founder and CTO of Sparkfabrik Software Supply Chain security issues are hitting hard the whole OSS ecosystem; not a day goes by without a security incident going into…
Securing GRPC on Kubernetes with mTLS identities, using Linkerd and Go
Guest post originally published on Medium by Lachlan Smith Lachlan Smith from the ZeroFlucs Engineering team takes a dive into how we use strong identities, message authentication and encryption to ensure trusted, secure and contained communication…
CNCF On demand webinar: Velero – the open source Kubernetes backup and recovery tool
Velero – the open source Kubernetes backup and recovery tool. While it’s powerful and flexible, the initial setup can be daunting to a beginner. Persistent Volumes also require CSI configuration, which varies from provider to provider.