Accelerating digital transformation: what every CEO needs to know about software delivery automation
Guest post originally published on CloudOps blog by Sunil Mavadia, Director of Global Solutions Architecture at Cloudbees We have all heard the term “digital transformation,” and we often ask ourselves why many companies struggle to define…
Guest post originally published on Linkerd’s blog by William Morgan, CEO at Buoyant Why Linkerd doesn’t use Envoy In this article I’m going to describe why Linkerd isn’t built on Envoy. This is a bit of a…
CNCF Releases Free Training Course Covering Basics of Service Mesh with Linkerd
Introduction to Service Mesh with Linkerd is the newest training course from CNCF and The Linux Foundation. This course, offered on the non-profit edX learning platform, can be audited by anyone at no cost. The course…
For PayIt, cloud native is a ‘competitive advantage’ for getting government services online
So much of our daily lives happen online these days, and yet the average adoption rate for a digital government service is less than 20%. PayIt’s founders set out to boost that number by offering a…
So much of our daily lives happen online these days, and yet the average adoption rate for a digital government service is less than 20%. PayIt’s founders set out to boost that number by offering a…
The first Authoritative Guide on Harbor is now available in Chinese
Today we are excited to share a new book from the maintainers and contributors of the graduated project Harbor. We were very excited to announce the graduation of Harbor this summer. Harbor was the first project…
Just over a month ago we released this new version of CNCF.io. We had spent the previous 9 months rewriting the site from scratch to accomplish the following goals: Improve the speed of the site, both…
A Practical Guide to Kubernetes Logging
Guest post originally published on the Logz.io blog by Dotan Horovitz, Logz.io Kubernetes has become the de-facto industry standard for container orchestration. It provides the required abstraction for efficiently managing large-scale containerized applications with declarative configurations,…
Simplify Kubernetes Resource Access Control using RBAC Impersonation
Guest post originally published on Bitnami by Juanjo Ciarlante Introduction Kubernetes, like any other secure system, supports the following concepts: Authentication: Verifying and proving identities for users and groups, and service accounts Authorization: Allowing users to…
Introducing Policy As Code: The Open Policy Agent (OPA)
Guest post originally published on the Magalix blog by Mohamed Ahmed What Is OPA? It’s a project that started in 2016 aimed at unifying policy enforcement across different technologies and systems. Today, OPA is used by giant players…