Kubernetes governance: the great policy for innovation
Member post by Kyuho Han, SK Telecom Background : Age of collaboration Since the World Economic Forum (WEF) 2021, The great reset of our society through digital transformation has been accelerating. In Korea, digital transformation is…
To satisfy critical customer requirements around data security, Mezmo investigated several service mesh options. After a detailed evaluation, Mezmo chose Linkerd for its simplicity and ease of use. Today, Mezmo operates Linkerd at significant scale in…
Deploy your first app on Kubernetes with GitOps
Member post originally published on the Taikun blog Introduction In the ever-evolving landscape of cloud-native technologies, managing deployments in Kubernetes clusters has become increasingly complex. Enter ArgoCD, a powerful tool that simplifies and automates the deployment…
Explain infrastructure as code (alternatives to IaC)
Member post originally published on AppCD’s blog by Kunal Dabir I was recently speaking with an SRE who, when asked for their opinion on Infrastructure as Code (IaC), shouted, “it’s terrible and our devs hate it!”…
The technical complexities of decoupled authorization
Member post originally published on the Cerbos blog by James Walker Decoupling authorization from your main application code makes authorization more scalable, easier to maintain, and simpler to integrate with your components. However, these benefits are…
Adopting Cilium for High-Performance Load Balancing Seznam’s platform and infrastructure team, consisting of 20 members, collaborates to build, support, and operate their infrastructure for 700 developers. This infrastructure operates across three data centers and includes 10,000…
Lessons from CrowdStrike’s buggy update: the critical importance of robust release processes
Community post by Andrés Vega, M42 and Technical Leader, CNCF TAG Security Recent events involving CrowdStrike’s Falcon security software have underscored a critical lesson across the industry: the importance of having a robust, secure release process….
Mastering DevSecOps with Devtron: a strategic approach
Member post originally published on the Devtron blog by Nishant As the adoption of Kubernetes continues to grow, organizations encounter numerous challenges in securing their software development and deployment processes. Integrating security practices into DevOps, known…
CNCF On demand webinar: Zero trust in practice with Istio and Kyverno
As cyber threats continue to grow in number and complexity, it’s becoming increasingly important to adopt security measures that can keep up. One such approach is Zero Trust (NIST SP800-207*), a security model that assumes the…