Posts in tag

CNCF


With the recent release of Syft v0.40.0, you can now create signed SBOM attestations directly in Syft. This is made possible by Project Sigstore, which makes signing and verification of software artifacts insanely easy. Why do attestations matter for SBOMs? Attestations help users to validate that an SBOM comes from a trusted source in the software supply …

OpenTelemetry is enabling a revolution in how Observability data is collected and transmitted. See our What Is OpenTelemetry post on why this is an important inflection point in the Observability space. In this post, we’ll walk through how to configure the OpenTelemetry Gems within a Rails app. Want to learn more about OpenTelemetry and Observability? Sign up to be a …

Kubernetes is a portable, extensible, open-source cluster manager for managing containerized workloads and services. The features of Kubernetes include automatic software deployment, orchestration, automatic scaling, and management of virtualized resources used by the services. Kubernetes also include a scheduler to distribute tasks evenly among worker nodes. This blog is going to focus on the scheduler …

KoolKits (Kubernetes toolkits) are highly-opinionated, language-specific, batteries-included debug container images for Kubernetes. In practice, they’re what you would’ve installed on your production pods if you were stuck during a tough debug session in an unfamiliar shell. We created a quick, 2-minute explanation of the project if you prefer that to the written word: To briefly give …

Amidst many social and economic disruptions that have arisen in the last few years, enterprises have been forced to quicken the pace of their digital transformation initiatives, adding and consuming cloud-based capacity and capability just to stay competitive, relevant, and, for some, in business. At the heart of this new movement is container technology. For …

The telecommunications industry is the backbone of today’s increasingly-digital economies, but it faces a difficult new challenge in evolving to meet modern infrastructure practices. How did telecommunications get itself into this situation? Because the risks of incidents or downtime are so severe, the industry has focused almost exclusively on system designs that minimize risk and maximize …

We increasingly meet CTOs and cloud architects in need of a secure platform that can run on multiple clouds or on-premise to meet customer requirements. A mature platform must not only “run code”, but also outsource application state in databases, message queues and in-memory caches. So what are the options of your platform team? In …

This article describes how e-Cloud uses KubeEdge to manage CDN edge nodes, automatically deploy and upgrade CDN edge services, and implement edge service disaster recovery (DR) when it migrates its CDN services to the cloud. This article includes the following four parts: Project background KubeEdge-based edge node management Edge service deployment Architecture evolution directions Project …

In March 2022, NSA & CISA has issued a new version of the Kubernetes Hardening Guide – version 1.1. It updates the previous version that was released in August 2021. Kubernetes evolves fast, and Kubernetes adoption grows even quicker. Kubernetes has become a very popular target and therefore requires continuous enhancement of the protection measures. The approach that NSA & …

Building a fault-tolerant application stack on top of a dynamic foundation UK fintech Bink’s mission is to reimagine loyalty programs — making them easier for everyone, including banks, shops, and customers. To achieve this, Bink developed a solution that links customer payment cards to any loyalty program and recognizes loyalty points every time people shop, connecting …