Search results for: radius


K8s Benchmark Report: are organizations meeting NSA hardening checks?

Posted on April 9, 2024 | By Joe Pelletier

Member post originally published on Fairwinds’s blog by Joe Pelletier The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) continue to update their Kubernetes hardening guidance, making recommendations to help organizations ensure they are hardening their Kubernetes clusters. This…


Platform engineering maturity at KubeCon + CloudNativeCon NA 2023

Posted on January 3, 2024 | By Mathieu Benoit

Ambassador post originally published on Medium by Mathieu Benoit Platform Engineering was a huge theme at KubeCon NA 2023 in Chicago. More than ever before. More and more companies have initiatives to streamline platform engineering best practices and…


Service proxy, service mesh or API gateway – which do you need?

Posted on December 20, 2023 | By Ahmet Soormally and Carol Cheung

Member post originally published on Tyk’s blog by Ahmet Soormally and Carol Cheung The rise of the microservices architecture has brought with it a whole heap of efficiency and flexibility – and some interesting challenges. As organisations have…


Why you should break down your Terraform into stacks

Posted on December 18, 2023 | By Tim Davis

Member post originally published on Terramate’s blog by Tim Davis Introduction This article introduces one of the most common Terraform problems that Terramate was designed to solve: How to decompose code into more manageable components while maintaining system integrity and…


Karmada brings Kubernetes multi-cloud capabilities to CNCF Incubator

Posted on December 12, 2023

The CNCF Technical Oversight Committee (TOC) has voted to accept Karmada as a CNCF incubating project.  Karmada is a Kubernetes management system that enables users to run cloud native applications across multiple Kubernetes clusters and clouds with no…


Securing attacks targeted at user or kernel level for customer X with KubeArmor & AWS Bottlerocket

Posted on October 26, 2023 | By AccuKnox

Member post by AccuKnox Introduction: In the realm of cybersecurity, ensuring that virtualized or cloud-based infrastructures security is paramount. One crucial aspect is safeguarding applications where most of our crown-jewel sits and are susceptible to dynamic changes. In…


Optimized Kubernetes cluster architecture: considerations and best practices

Posted on June 15, 2023 | By Rotem Refael

Guest post originally published on the ARMO blog by Rotem Refael, Director of Engineering, ARMO Kubernetes is a powerful platform for managing containerized applications at scale, but configuring a Kubernetes cluster can be complex and challenging. In this…


Monitoring micro-front ends on Kubernetes with NGINX

Posted on February 1, 2023 | By Benoit Schipper

Guest post by Benoit Schipper I have been working with multiple Kubernetes-like distributions for the past few years. Adopting Kubernetes brings many benefits, but also many challenges. Traditionally we have hosted web servers or proxies, such as NGINX,…


The five laws of cloud native authorization

Posted on January 19, 2023 | By Omri Gazitt

Guest post originally published on Aserto’s blog by Omri Gazitt Overview In a microservices world, each service needs to verify that a subject (user or machine) has permission to perform an operation on a resource that the service…


How to implement feature flags using LaunchDarkly

Posted on January 9, 2023 | By Sudhanshu Prajapati

Guest post originally published on InfraCloud’s blog by Sudhanshu Prajapati Feature flags (often called feature toggles) have existed for a long time in the software development process. We have been using feature flags in some way or another without…