Posts in tag

Cloud Native Computing Foundation


Every day, the drumbeat to adopt Zero Trust in tech infrastructure amplifies. Like any cybersecurity buzzword, Zero Trust is both more and less than it seems. As more, it holds an enduring concept and construct for better cloud-native security. As less, it doesn’t require new technology or tools – rather, Zero Trust is a series …

In my previous blog post, I introduced the brief history of zero trust, the core pillars of a zero-trust model, and how to build a zero-trust model for cloud-native workloads. In this blog post, you will learn how to mitigate vulnerabilities, such as the recent zero-day Log4j vulnerability, with a zero-trust workload security approach. Zero …

Like many people, I managed my first cluster using the kubernetes cli (aka kubectl). I deployed a handful of ‘objects’ such as deployments, secrets, configmaps, and services by directly applying yaml files, such as: With much trial and error, I finally got my local yaml files perfect, and could issue these commands and produce a …

Cloud native adoption continues to increase, and it is not a surprise that new challenges are arising that are associated with the scale. The modern DevOps ecosystem driven by cloud native technologies is helping the software changes to ship faster than ever. The speed of shipping cannot become an excuse for the downgrade in the …

When designing a stateful cloud native applications, and especially a stateful cloud native network application, you must determine which data model matches the functional requirements of the system. There is often confusion about vocabulary within the telco and networking space when it comes to data (for instance, there are stateful protocols like tcp/ip and stateful data …

As the default Kubernetes scheduler is highly configurable, in many cases we don’t have to write any code to customize the scheduling behavior. However, people who want to learn how the scheduler works and interact with other components may try to develop their own scheduler. In this article, I describe how to build a scheduler …

  1. You need more than ACID An RDBMS’s atomicity, consistency, isolation, and durability are not what they seem to be.  Specifically, consistency and isolation have undergone a facelift in recent years.  Consistency (in the colloquial usage, see #4) is now tailored to the datasets and workloads of your specific use case, especially in the case of data intensive …

We’ve absolutely loved being able to connect with much of our community again in-person over the past year at KubeCon + CloudNativeCon in Los Angeles and Valencia. We’re looking forward to hopefully seeing even more of you at KubeCon + CloudNativeCon North America 2022 in Detroit!In the interest of keeping our events accessible to as …

Guest post by Michael Guarino, CTO, and Co-Founder at PluralOpen-source is at a crossroads at the moment. 97% of data stacks contain open-source code. However, deploying and managing open source applications is tedious and time-consuming.Take an open source product like Apache Airflow for example. The popular workflow management system has over 26k stars on Github …

Consistently looking into CNCF and Linux Foundation project’s velocity and the 30 top open source projects give us a very good indication of trends that are resonating with developers and end users. As a result, we can get insight into platforms that will likely be successful. We use bubble charts to show three axes of …