Cloud Native Live: Right-sizing Kubernetes workloads with open source tooling
According to most benchmarks, about 70% of real-world Kubernetes workloads are over-provisioned. This problem has remained a persistent thorn in the side of infrastructure teams, despite an increasing number of tools that can solve the problem…
Too Complex: It’s Not Kubernetes, It’s What It Does
The open-source container orchestration system for automating software deployment, scaling, and management has earned a bad rep for being too complicated. In this post, let’s explore whether that reputation is well deserved. The Steep Learning Curve…
KubeCon + CloudNativeCon Europe 2025 co-located event deep dive: Cloud Native + Kubernetes AI Day
Co-chairs: Rajas Kakodkar, Ricardo Rocha, Thiago Gil, Yuan TangApril 1, 2025London Cloud Native & Kubernetes AI Day brings together a diverse range of technical enthusiasts, open source contributors, practitioners, researchers and end users, all united in…
Announcing the Kubernetes “Shift Down” Security Paper
The CNCF Kubernetes Policy Working group (WG) has just released the Shift Down Security paper to help educate the community about how organizations can leverage cloud native security best practices to address key business risks and…
Introducing k0rdent: Design, Deploy, and Manage Kubernetes-based IDPs
The Challenge Today Kubernetes is the de facto standard for container orchestration, but managing a complete infrastructure efficiently remains a significant challenge. Without a standardized approach, most organizations building an Internal Developer Portal (IDP) face inconsistent…
CNCF On demand webinar: Demystifying Kubernetes observability with generative AI and LLMs
Join Asaf Yigal, co-founder and CTO of Logz.io, as he discusses the future of Kubernetes observability in an era driven by Generative AI and machine learning. Filmed at the Boston K8s Meetup, Asaf shares insights on:•…
Demo an Automated Canary Deployment on Kubernetes with Argo Rollouts, Istio, and Prometheus
Building stuff is fun! Let’s use Argo Rollouts, Istio, and Prometheus to automate a canary deployment on Kubernetes! The application we’ll run is the Argo Rollouts Demo Application which does a great job of visualizing how…
How to manage three top Kubernetes security vulnerabilities
This article explains: Kubernetes and security Across various organizations, Kubernetes is being adopted at lightning rates. It is estimated that 60% of organizations have adopted this technology, and the list of companies planning on transitioning to…
CNCF On demand webinar: Extending Kubernetes with the operator pattern
This session dives into Kubernetes and how you can use custom controllers and resources to expand its functionalities. Learn how to apply the operator pattern to implement Kubernetes behaviors tailored to your solutions and watch a…
CNCF On demand webinar: Securing Kubernetes from cryptojacking attacks
“This video demonstrates a cryptojacking attack on a Kubernetes cluster and its impact. It also highlights how you can defend against such attacks using KubeArmor. KubeArmor is a runtime security engine for Kubernetes. KubeArmor leverages eBPF…