Staff Post
2024 year in review of CNCF and top 30 open source project velocity
By Chris Aniszczyk By consistently tracking open source project velocity, we are able to see the trends and technologies resonating with developers and end users. We have been tracking these trends since 2017; all previous blogs...
January 29, 2025
Found 2257 posts
ITOps Times: “Kubernetes 1.28 is now available”
The Kubernetes release team has officially announced the launch of the next version of the technology, Kubernetes 1.28.
August 16, 2023
Community Post
Chennai’s first in-person KCD concludes!
Guest post by Senthil Raja Chermapandian, Organizer, KCD Chennai 2023 Kubernetes Community Days Chennai 2023 finally concluded on 22nd July 2023; a day of learning and networking with Kubernetes and Cloud Native professionals from across India....
August 16, 2023 | Senthil Raja Chermapandian
Cloud Native Now: “Latest Kubernetes Release Adds Range of Management Capabilities”
The Technical Oversight Committee (TOC) for Kubernetes released a 1.28 update to the platform that adds a number of capabilities including a proposal to create a lightweight common expression language (CEL) that can be used to...
August 16, 2023
Project Post
Enterprise multi-cluster at scale: supporting flat networks in Linkerd
Guest post originally published on Linkerd’s blog by William Morgan (Photo by NASA on Unsplash) Linkerd has seen a steady rise in enterprise adoption, with companies like Adidas, Microsoft, Plaid, and DB Schenker deploying Linkerd at scale to bring security, compliance, and reliability to...
August 15, 2023 | William Morgan
Member Post
The future of API gateways on Kubernetes
Guest post originally published on WS02’s blog by Pubudu Gunatilaka Key Takeaways Introduction The exponential growth of the Internet and cloud computing has given rise to applications that are smaller, more distributed, and designed for highly...
August 14, 2023 | Pubudu Gunatilaka
One-time pass codes for Kyverno
Community post originally published on Neon Mirrors by Chip Zoller In real life, imposed rules often have cases where exceptions may be required but on a case-by-case basis. Policy is really no different here. While prevention...
August 11, 2023
Member Post
Decoding the difference: artifacts vs packages in software development
Guest post originally published on Cloudsmith’s blog by Andrea Saez “Artifact” and “package” are often used interchangeably, but they have distinct differences. Understand their unique roles, learn through practical examples, and discover why distinguishing between them...
August 10, 2023 | Andrea Saez
Project Post
Workshop recap: running Linkerd in production
Guest post originally published on Linkerd’s blog by Flynn This blog post is based on a workshop that I delivered at Buoyant’s Service Mesh Academy. If this seems interesting, check out the full recording! Linkerd is used in...
August 9, 2023 | Flynn
Community Post
Real-time analytics with stream processing and OLAP
Guest post originally published on Medium by Hubert Dulay Gartner States: “By the end of 2024, 75% of organizations will shift from piloting to operationalizing artificial intelligence (AI), driving a 5 times increase in streaming data and analytics...
August 8, 2023 | Hubert Dulay
Project Post
Dragonfly v2.1.0 is released!
Project post from the Dragonfly maintainers Dragonfly v2.1.0 is released! 🎉🎉🎉 Thanks to the Xinxin Zhao[1] for helping to refactor the console[2] and the manager provides a new console for users to operate Dragonfly. Welcome to...
August 7, 2023
Community Post
Have we reached a point of no return on managing software dependencies?
Guest post originally published on Paolo Mainardi’s blog by Paolo Mainardi, Founder and CTO of Sparkfabrik Software Supply Chain security issues are hitting hard the whole OSS ecosystem; not a day goes by without a security incident going into...
August 7, 2023 | Paolo Mainardi
Member Post
Supply chain security framework: S2C2F
Guest post originally published on the SIGHUP blog by Simone Ragonesi In this article, we will introduce you to S2C2F. The Secure Supply Chain Consumption Framework is a combination of requirements and tools for any organization...
August 4, 2023
Staff Post
Upgrading to Docsy 0.7 & Bootstrap 5
Originally published on the Docsy blog by Patrice Chalin, CNCF and Docsy Steering Committee A guide to upgrading to Docsy 0.7 and Bootstrap 5 with examples Last June, Docsy celebrated a significant milestone with the release...
August 4, 2023
Member Post
Streamlining observability: the journey towards query language standardization
Guest post originally published on Logz.io’s blog by Dotan Horovits One of the most captivating discussions I had at KubeCon Europe 2023 in Amsterdam was about standardization of a query language for observability. This query language...
August 3, 2023 | Dotan Horovits
Member Post
Digital transformation roadmap: an update on Q2 2023 trends and strategies
Guest post by Sameer Danave, Senior Director Marketing at MSys Technologies In January, we made predictions about trends in the digital transformation area for this year. As we approach the end of the first quarter, let’s...
August 2, 2023 | Sameer Danave
End User Post
Securing GRPC on Kubernetes with mTLS identities, using Linkerd and Go
Guest post originally published on Medium by Lachlan Smith Lachlan Smith from the ZeroFlucs Engineering team takes a dive into how we use strong identities, message authentication and encryption to ensure trusted, secure and contained communication...
August 1, 2023 | Lachlan Smith
Member Post
Building the perfect internal developer platform with Linkerd and Garden
Member post originally published on the Buoyant blog by Tao Hansen The automat of the 50s was a marvel. It was a vending machine that served hot food. It was a restaurant without waiters. It was...
July 31, 2023 | Tao Hansen
Member Post
10 awesome benefits of artifact management and why you need it
Guest post originally published on the Cloudsmith blog by Lee Skillen All about artifact management, alongside 10 awesome benefits that any good Artifact Management platform will provide, including added security, traceability, and control. Efficiency and organization...
July 28, 2023
Project Post
Crossplane Completes Security Audit – Hardening and Growing Enterprise Confidence
Project post originally published on the Crossplane blog The Crossplane project has spent the last couple months partnering with Ada Logics, an independent third party security research firm, as well as the CNCF and the OSTIF, to perform a security...
July 27, 2023
Member Post
Kelemetry: global tracing for Kubernetes control plane
Member post originally published on ByteDance’s blog by Jonathan Chan Kelemetry is a tracing system for the Kubernetes control plane developed in ByteDance. It connects the behavior of various Kubernetes components and traces the entire lifecycle...
July 27, 2023 | Jonathan Chan