Newsletter of Carlos Santana — Issue #30
Welcome to my newsletter. Every week, I’ll update you on Cloud Native topics in 3 categories News, Assets, and Skills
Cloud Native Computing Foundation Unveils Schedule for KubeCon + CloudNativeCon Europe 2022 | Cloud Native Computing Foundation — www.cncf.io
Back in-person in Valencia, Spain in May, technology enthusiasts will meet to share and educate around cloud native innovation SAN FRANCISCO, Calif. — March 9…
This begins a new chapter in the evolution of a leading containerized serverless platform.
Software Supply Chain Security: Tearing Down the Silos — The New Stack — thenewstack.io
Both application and infrastructure security are required to keep a cloud native system safe. A single solution can integrate both to foil hackers.
Visualising the Cost of Kubernetes | by Mitchell Rowling | Streamotion Tech Blog | Mar, 2022 | Medium — medium.com
Containerisation is still an emerging technology in many organisations across the world and Here at Streamotion, the adoption of containers has promoted rapid acceleration of our journey of Kayo…
Kubernetes is ubiquitous in container orchestration, and its popularity has yet to weaken. This does, however, not mean that evolution in the container orchestration space is at a stand-still.
CVE-2022–0847 Dirty Pipe in the Linux kernel allows users on Linux hosts running containerized applications to modify files in container images on the host
GitHub — cert-manager/istio-csr: istio-csr is an agent that allows for Istio workload and control plane components to be secured using cert-manager. — github.com
istio-csr is an agent that allows for Istio workload and control plane components to be secured using cert-manager. — GitHub — cert-manager/istio-csr: istio-csr is an agent that allows for Istio workload and control plane components to be secured using cert-manager.
Your description for this link…
Kubernetes Workload Identity with AKS — baeke.info — blog.baeke.info
When you run a workload, no matter how simple or complex, you often need to access protected resources in both a secure and manageable way. Often, a resource’s security is integrated with an identity store. Azure resources, for instance, can be secured with roles assigned to Azure Active Directory (AAD) users, groups, or service principals.…
This month is SIG-Docs edition with guest @Divya_Mohan02
See Cloud Native Live: Optimizing Istio with eBPF at CNCF CNCF Online Programs — community.cncf.io
CNCF CNCF Online Programs presents Cloud Native Live: Optimizing Istio with eBPF | Mar 16, 2022. Find event and ticket information.
Principles & Best practices of REST API Design | by Love Sharma | Dev Genius — blog.devgenius.io
This best-practices article intends for developers interested in creating RESTful Web services that provide high reliability and consistency across multiple service suites; following these…