Kubernetes Could Be The One To Make the Internet of Things (IoT) Reach Its Potential
Guest post originally published on Hackernoon by Adrian Goins is Director of Community and Evangelism at Rancher Labs The arrival of 5G wireless technology is often touted for the orders-of-magnitude boost in bandwidth it will bring…
Developer-friendly platforms with Kubernetes and infrastructure as code
Adopting Kubernetes can dramatically accelerate your product delivery and unify the developer experience across your organization, but building a platform that is both friendly to the platform builders and the developers who need to consume it…
Deploying Kubernetes to bare metal using cluster API
Deploying Kubernetes to bare metal hardware in your data center has a number of advantages, including increased security, performance, data adjacency, and flexibility. But bare metal deployments have disadvantages compared to the cloud or virtual environments….
Effective disaster recovery strategies for Kubernetes
Join Rasheed Amir, Kubernetes evangelist and CEO at Stakater, as he discusses how companies are taking advantage of Kubernetes when it comes to DevOps for their mission-critical cloud-native applications. These applications however will have business requirements…
With Kubernetes, It’s Not All About Horsepower
Member Blog Post Guest post originally published on Carbon Relay’s blog by Brad Ascar Sr. Solutions Architect, Carbon Relay I make my living in the software business. I started out as a software developer, moved up to…
Building 12 factor streaming data apps on Kubernetes
This webinar is hosted by the Lenses.io engineering team – the ones behind bringing DataOps to Apache Kafka. Here they talk about how to build a framework for Kafka streaming applications on Kubernetes. These deployed applications…
5 Problems with Kubernetes Cost Estimation Strategies
Guest post originally published on Fairwinds blog by Robert Brennan Estimating how much you are spending (or wasting) on a particular Kubernetes workload is hard. The good news is that there are some reasonable strategies for…
Simplify Kubernetes Resource Access Control using RBAC Impersonation
Guest post originally published on Bitnami by Juanjo Ciarlante Introduction Kubernetes, like any other secure system, supports the following concepts: Authentication: Verifying and proving identities for users and groups, and service accounts Authorization: Allowing users to…
Leaving the Swarm: The Road to Kubernetes
Guest post by Kevin Crawley, Developer Advocate for Containous In order to tell this story, we have to go back a little over three years ago, when I was asked to join Single as an investor,…
AWS controllers for Kubernetes – AWS services, now kubified!
Ever wanted to use the Kubernetes API to describe not just your Kubernetes objects but also resources on which your applicationsdepend? Well, with AWS Controllers for Kubernetes (ACK), now you can! Describe that RDS database instance…