I was recently asked by a major corporation to give a talk on “fake agile.” They wanted me to explain what it is, how to identify it and how to deal with it.
Today we are excited to launch Service Mesh Interface (SMI) which defines a set of common, portable APIs that provide developers with interoperability across different service mesh technologies including Istio, Linkerd, and Consul Connect.
If you’re selling PHP packages, the easiest way to offer Composer package installation to your customers is now Private Packagist for Vendors. You get a unique URL and authentication token for each customer and they can use these in their composer.json file to install your packages.
We are thrilled to announce that the core security features of the Elastic Stack are now free. This means that users can now encrypt network traffic, create and manage users, define roles that protect index and cluster level access, and fully secure Kibana with Spaces.
When it comes to information modeling, how to denote the relation or relationship between two entities is a key question.
Progressive image rendering and HTTP/2 multiplexing technologies have existed for a while, but now we’ve combined them in a new way that makes them much more powerful. With Cloudflare progressive streaming images appear to load in half of the time, and browsers can start rendering pages sooner.
Part of the Go 2 series of language changes is a new error inspection proposal. The error inspection proposal adds several features to errors that have been tried elsewhere (in packages such as github.com/pkg/errors), with some new implementation tricks.
We are proud and excited to announce that VMware is acquiring Bitnami! This is fantastic news for our users and partners. We will continue to deliver the Bitnami catalog of apps that you know and love, across all the platforms we currently support, including all the major cloud vendors.
Today, Atlassian Bitbucket, GitHub, and GitLab are issuing a joint blog post, in a coordinated effort to help educate and inform users of the three platforms on secure best practices relating to the recent Git ransomware incident.
The LXD team is very excited to announce the release of LXD 3.13! This is another very exciting LXD release, packed with useful features and a lot of bugfixes and performance improvements!
A security vulnerability in the Official Docker images based on the Alpine Linux distribution allowed for more than three years logging into the root account using a blank password. Tracked as CVE-2019-5021, the vulnerability has a critical severity score of 9.8.
In a surprising turn of events, TechCrunch has learned that Docker CEO Steve Singh will be stepping down after two years at the helm, and former Hortonworks CEO Rob Bearden will be taking over. An email announcement, went out this morning to Docker employees.
Today’s answers are curated by Daniele Polencic. Daniele is an instructor and software engineer at Learnk8s. TL;DR: There isn’t any static tool that analyses YAML files. But you can visualise your dependencies in the cluster with Weave Scope, KubeView or tracing the traffic with Istio.
Following the first announcement of odo earlier in the year, we are pleased to announce the beta release of odo, an official project hosted on the OpenShift GitHub repository.
Setting up a production-grade Kubernetes cluster can be done on a hobby budget, and if this is true why mess around with a lesser grade.
Get the skills you need without leaving GitHub. GitHub Learning Lab takes you through a series of fun and practical projects, sharing helpful feedback along the way. By clicking on “Sign in with GitHub” above, you are agreeing to the Terms of Service.
What is KUDO? Kubernetes Universal Declarative Operator (KUDO) provides a declarative approach to building production-grade Kubernetes Operators covering the entire application lifecycle. When should I use KUDO? When you need more than just kubectl apply -f to run your application.
Microsoft continues to look for ways to help companies that are investing in application containers take advantage of the principles of serverless computing, introducing a new open-source project Monday at Microsoft Built in conjunction with Red Hat that puts events at the heart of Kubernetes scalin
Today we’re unveiling the newest architecture for the Windows Subsystem for Linux: WSL 2! Changes in this new architecture will allow for: dramatic file system performance increases, and full system call compatibility, meaning you can run more Linux apps in WSL 2 such as Docker.
Today Eclipse Foundation’s president Mike Milinkovic blogged about the final result of the confidential trademark negotiations between Oracle and the Eclipse Foundation. As we remember, Oracle announced that Java EE will be open sourced to that organization and it would become true open source.
I was recently extended the honor of participating in the W3C Web Fonts Working Group as an Invited Expert.
GitHub Gist: instantly share code, notes, and snippets.
k3OS is an operating system completely managed by Kubernetes. It launches in seconds and runs almost anywhere. As a combined Linux and Kubernetes distribution it has the smallest attack surface and simplest upgrade process of any Kubernetes installation.
Learn Nomad, Hashicorp’s scheduler. Knowing what you need to know is the hardest part. Our guided pathways help build your knowledge around real-world scenarios.
At AWS, the security, privacy, and protection of customer data always comes first, which is why I am pleased to share the news that AWS has achieved “Hébergeur de Données de Santé” (HDS) certification.
In this post, we will walk through how to connect GitLab’s Auto DevOps feature with a Rancher-managed Kubernetes cluster, making use of a feature introduced in Rancher v2.2.0 called Authorized Cluster Endpoint.
Approximately 9 months ago, the Kubernetes community agreed to form the Cloud Provider Special Interest Group (SIG). The justification was to have a single governing SIG to own and shape the integration points between Kubernetes and the many cloud providers it supported.
In this post, I wanted to identify a few high-level security tips and best practices to consider when working with container images. Before diving into that, a very brief summary on the advantages of containers: Containers help organizations become more consistent, agile, and secure.