Cloud Native Live: Optimizing and Securing Kubernetes Workloads with Polaris and Goldilocks
Learn how to scan your Kubernetes workloads to improve your resource utilization and security using open source tools Polaris and Goldilocks. You will watch Andy Suderman, Director of R&D and Technology at Fairwinds as he shows…
Kubernetes Ingress gRPC example with a Dune quote service
Guest post originally published on Kong’s blog by Viktor Gamov, Principal Developer Advocate at Kong APIs come in all different shapes and forms. In this tutorial, I’ll show you a Kubernetes Ingress gRPC example. I’ll explain…
Cloud Native Live: Kubernetes Clusters need Persistent Data
A key consideration for many Kubernetes deployments is the installation and use of a Container Network Interface (CNI). The use of a Kubernetes Data Plane via the Container Storage Interface (CSI) is often overlooked, resulting in…
Managing Docker apps with Kubernetes Ingress Controller
Guest post originally published on Kong’s blog by Alvin Lee Think back to when your development team made the switch to Dockerized containers. What was once an application requiring multiple services on virtual machines transitioned to…
Redundancy across data centers with Kubernetes, WireGuard and Rook
Guest post originally published on Elastisys’ blog by Cristian Klein, Sr Cloud Architect at Elastisys Several court rulings and a guideline from the European Data Protection Board (EDPB) made it clear: It is a huge legal risk to process EU…
Forbes: How crossplane transforms Kubernetes into a universal control plane
At the heart of the orchestration engine lies an efficient control plane that acts as an interface between the infrastructure and the operators. The control plane exposes a uniform API and taxonomy to perform a standard…
What is Goldilocks? (Or how to set your Kubernetes resource requests)
Guest post originally published on Fairwinds’s blog by Andrew Suderman, Lead R&D Engineer at Fairwinds When we open sourced Goldilocks in October 2019, our goal was to provide a dashboard utility that helps you identify a baseline for…
How to detect runtime threats in Kubernetes
Guest post originally published on Logiq’s blog by Ajit Chelat, Citrix Kubernetes is one of the leaders in the container orchestration market. A recent survey by Cloud Native Computing Foundation (CNCF) suggests that 84% of companies are running…
CNCF On-Demand Webinar: Crossing The Boundary – Hybrid Kubernetes Clusters with Wireguard
Discover the world of location-agnostic Kubernetes. We will show how to securely and automatically cross network boundaries with a single Kubernetes cluster using Wireguard.