End User Post
KubeCon + CloudNativeCon NA: the End User TAB shares top talks
Coming to KubeCon + CloudNativeCon North America in Salt Lake City next month? Members of the CNCF End User Technical Advisory Board (TAB) pulled together their top talk recommendations with insights into their recommendations 🙂 Worth...
October 14, 2024
Found 2072 posts
Community Post
OSTIF’s audit of CRI-O is complete – high severity issues found and fixed
Community post originally published on the OSTIF blog Open Source Technology Improvement Fund is thrilled to report the results of a security audit of CRI-O. CRI-O is an open source software (OSS) project that is an implementation of the Kubernetes Container...
June 6, 2022 | OSTIF
Community Post
Ada Logics: CRI-O holistic security audit engagement
Community post originally on the Ada Logics blog by David Korczynski, Security Research & Security Engineering and Adam Korczynski, Security Engineering & Security Automation, Ada Logics Ada Logics Ltd. recently performed a holistic security audit of CRI-O....
June 6, 2022 | David Korczynski + Adam Korczynski
Member Post
How to test application security
Guest post originally published on the Snapt blog by Craig Risi We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play,...
June 6, 2022 | Craig Risi
Member Post
5 key takeaways from Humanitec’s 2022 Kubernetes Benchmarking Study
Guest post originally published on Humanitec’s blog by Aeris Stewart, Community Manager at Humanitec Here are 5 things you need to know about implementing Kubernetes, based on Humanitec’s 2022 Kubernetes Benchmarking Study. Knowing your way around...
June 3, 2022 | Aeris Stewart
Member Post
Local Env as Code: Is it possible yet
Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon...
June 2, 2022 | Jan Van Bruggen
Project Post
Flux May 2022 update
Project post originally published on the Flux blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities...
June 2, 2022 | Daniel Holbach
Community Post
How we designed the logo of KCD Chennai 2022
Community post from the Kubernetes Community Days Chennai team We are proud to present Kubernetes Community Days Chennai (KCD Chennai), a community-organized event supported by the Cloud Native Computing Foundation (CNCF). It gathers adopters and technologists...
June 1, 2022
Member Post
Multi-cloud architecture: pros and cons
Guest post originally published on the SparkFabrik blog The affirmation of the public cloud in business organizations – and in particular those of a more innovative nature – has had an almost immediate effect, with a new need...
June 1, 2022
Community Post
What is continuous profiling?
Community post by Uchechukwu Obasi Coming from a background working as a frontend developer at Grafana I’m no stranger to open source performance monitoring. I was part of a team that was responsible for the overall user...
May 31, 2022
Community Post
CNCF WG Environmental Sustainability
Community post by Max Körbächer, Co-Founder of Liquid Reply, and Leonard Pahlke, Consultant at Liquid Reply We are pleased to announce that we have established a new working group for environmental sustainability. Our mission is to...
May 31, 2022 | Max Körbächer + Leonard Pahlke
Member Post
Best practices for deploying applications to production in Kubernetes
Guest post originally published on the Elastisys blog Going live with your application and deploying it to production on Kubernetes means you are exposing it to your end users. You want this to be a successful...
May 30, 2022
Member Post
SSH bastions break your zero trust model
Guest post originally published on the Appaegis blog by Michael Shieh It’s a common practice to set up a bastion server to provide access to the host and then use that as the gateway for SSH...
May 27, 2022 | Michael Shieh
Project Post
Flux’s KubeCon Europe 2022 Wrap-Up
Project post originally published on the Flux blog by Daniel Holbach It was KubeCon + CloudNativeCon EU 2022 last week and if you weren’t able to attend, this post provides you with everything you need to...
May 27, 2022
Member Post
Designing secure applications
Guest post originally published on the Snapt blog by Iwan Price-Evans Hackers, malware, cybercriminals, and more threaten modern applications constantly. Malicious actors will try to uncover and exploit any vulnerabilities to steal private data, disrupt your...
May 26, 2022 | Iwan Price-Evans
Member Post
The components of OpenTelemetry
Guest post originally published on the Scout APM blog by Dave Anderson, CTO, Scout APM Before we dive into the Collector, let’s cover the components that make up the OpenTelemetry project. Scout’s blog post “What is...
May 25, 2022 | Dave Anderson
Kubernetes ephemeral container security
Guest post originally published on Xenit’s blog by Philip Laine, DevOps Engineer at Xenit Attempting to debug a Pod and realizing that you can’t install curl due to security settings has to be a meme at...
May 24, 2022 | Philip Laine
Member Post
What is high cardinality?
Guest post originally published on Chronosphere’s blog by Rob Skillington With the transition from monolith to cloud-native environments, we are seeing an ongoing explosion of metrics data in terms of both volume and cardinality. This is...
May 23, 2022 | Rob Skillington
Member Post
Comparing Frameworks for Node.js Serverless Apps
Guest post originally published on the Rookout blog by Gedalyah Reback Cloud deployments have gotten more complicated over the years. That’s on them, but it’s not necessarily to a fault – there’s just so much more...
May 23, 2022 | Gedalyah Reback
TAG Post
Announcing the Secure Software Factory Reference Architecture Paper
Community post by Alexander Floyd Marshall from TAG Security Almost a year ago the CNCF published its “Software Supply Chain Best Practices” guide, detailing over 50 ways to improve cloud-native software supply chains. That guide referenced...
May 20, 2022
Community Post
Announcing the Refreshed Cloud Native Security Whitepaper
The CNCF Security Technical Advisory Group (TAG) has just released a refreshed Cloud Native Security Whitepaper v2 to help educate the community about best practices for securing cloud native deployments. The whitepaper intends to provide organizations...
May 18, 2022