Designing secure applications
Member Post Designing secure applications
Guest post originally published on the Snapt blog by Iwan Price-Evans Hackers, malware, cybercriminals, and more threaten modern applications constantly. Malicious actors will try to uncover and exploit any vulnerabilities to steal private data, disrupt your service, and...
May 26, 2022 | By Iwan Price-Evans

The components of OpenTelemetry
Member Post The components of OpenTelemetry
Guest post originally published on the Scout APM blog by Dave Anderson, CTO, Scout APM Before we dive into the Collector, let’s cover the components that make up the OpenTelemetry project. Scout’s blog post “What is OpenTelemetry” gives...
May 25, 2022 | By Dave Anderson

TechTarget: “Highlights from KubeCon + CloudNativeCon Europe 2022”
TechTarget: “Highlights from KubeCon + CloudNativeCon Europe 2022”
KubeCon + CloudNativeCon Europe 2022 did not disappoint and has picked up from last year. This event was held both virtually and live in Valencia, Spain, May 16-20, and included over 26,000 registered attendees, from developers, product management,...
May 24, 2022

Kubernetes ephemeral container security
Kubernetes ephemeral container security
Guest post originally published on Xenit’s blog by Philip Laine, DevOps Engineer at Xenit Attempting to debug a Pod and realizing that you can’t install curl due to security settings has to be a meme at this point....
May 24, 2022 | By Philip Laine

SiliconANGLE: “How enterprise end users are enriching the CNCF ecosystem”
SiliconANGLE: “How enterprise end users are enriching the CNCF ecosystem”
In March 2016, the first-ever KubeCon Europe took place in London, England. Pre-event press from that year anticipated “hundreds” of attendees: Kubernetes was starting to grab the attention of the developer world, but the Cloud Native Computing Foundation...
May 24, 2022

What is high cardinality?
Member Post What is high cardinality?
Guest post originally published on Chronosphere’s blog by Rob Skillington  With the transition from monolith to cloud-native environments, we are seeing an ongoing explosion of metrics data in terms of both volume and cardinality. This is because microservices...
May 23, 2022 | By Rob Skillington 

Comparing Frameworks for Node.js Serverless Apps
Member Post Comparing Frameworks for Node.js Serverless Apps
Guest post originally published on the Rookout blog by Gedalyah Reback Cloud deployments have gotten more complicated over the years. That’s on them, but it’s not necessarily to a fault – there’s just so much more you can...
May 23, 2022 | By Gedalyah Reback

Computing: “Application security: shift-left is necessary but insufficent”
Computing: “Application security: shift-left is necessary but insufficent”
Integrating security checks into code should be seen as part of a bigger picture, says Kubecon panelShift-left, aka DevSecOps, the practice of making security checks part of the software development lifecycle rather than being a separate (and slow)...
May 20, 2022

Announcing the Secure Software Factory Reference Architecture Paper
TAG Post Announcing the Secure Software Factory Reference Architecture Paper
Community post by Alexander Floyd Marshall from TAG Security Almost a year ago the CNCF published its “Software Supply Chain Best Practices” guide, detailing over 50 ways to improve cloud-native software supply chains. That guide referenced the concept...
May 20, 2022

RCR Wireless: “Simplifying Kubernetes for telcos and cloud app developers”
RCR Wireless: “Simplifying Kubernetes for telcos and cloud app developers”
The Cloud Native Computing Foundation’s (CNCF)’s KubeCon & CloudNativeCon Europe 2022 event in Valencia, Spain (and online) this week is the backdrop for announcements aimed at making Kubernetes easier for cloud app developers to use. There is good...
May 19, 2022