44% of organizations stated that they are already using containers for almost all of their applications and business segments while another 35% reported that containers are used for at least a few production applications. This is according to the CNCF Annual Survey 2022, conducted by the Cloud Native Computing Foundation (CNCF) and Linux Research Foundation. … continue reading
The cloud native guide is a listing of cloud-native security tool providers, along with a brief description of their offerings. … continue reading
Otomi is intended to act as an extension of Kubernetes to turn it into a “full blown container platform.” It provides an advanced ingress architecture, a suite of integrated pre-configured applications, multi-tenancy, and governance and security policies. One of the goals of the project is to support common DevOps use cases. It strongly relies on … continue reading
The Cloud Security Alliance announced the release of the Enterprise Architecture Reference Guide v2, which provides users with a compilation of every domain and container within the CSA Enterprise Architecture v2.3. “This reference guide is fundamentally important for risk managers in evaluating opportunities for improvement, creating road maps for technology adoption, identifying reusable security patterns, … continue reading
Longhorn is an open-source distributed block storage system for Kubernetes. It is built using Kubernetes and container primitives, making it cloud-native storage, according to the team. “Longhorn implements distributed block storage using containers and microservices. Longhorn creates a dedicated storage controller for each block device volume and synchronously replicates the volume across multiple replicas stored … continue reading
Despite having become mainstream over the past few years, many organizations still struggle with actually releasing microservices into production. According to the State of Cloud-Native Release Orchestration 2021 report from Vamp, 72% of respondents use Kubernetes and 81% use microservices in production, but nearly 9 in 10 respondents report challenges and issues when releasing microservices … continue reading
Red Hat has entered into an agreement to acquire StackRox for its container and Kubernetes-native security capabilities. According to Red Hat, bringing StackRox to its container application platform OpenShift will help users build, deploy and securely run apps across the hybrid cloud from a single platform. In addition, Red Hat plans to use StackRox to … continue reading
Podman is a tool for managing OCI containers and pods that are made from groups of containers. It provides APIs for managing containers, pods, container images, and more. Podman’s GitHub documentation states that the project is based on libpod, a library for container lifecycle management that is also contained in this repository. The latest 2.2.1 … continue reading
Today, the Cloud Foundry Foundation announced cf-for-k8s release, KubeCF 2.5 and Stratos 4.2 to ensure that Cloud Foundry’s architecture includes the most modern and cloud-native infrastructure technology. Cf-for-k8s is a Kubernetes-native distribution of Cloud Foundry that blends the Cloud Foundry developer API with popular Kubernetes technologies including Istio, Envoy, Fluentd, and Kubernetes. Version 1.0 also … continue reading
The backup solution provider for cloud data management has announced it is acquiring Kasten for approximately $150 million. Kasten is a provider of Kubernetes backup and disaster recovery solutions. Veeam hopes the acquisition will help strengthen its data protection services, and help businesses with future-ready architectures. The news comes after Veeam and Kasten’s recent partnership … continue reading
Security continues to be a concern for container strategies. A recent report by the container security company StackRox found that 44% of respondents delayed rolling out applications into production because of security concerns and that security incidents among respondents remain high at 90%. “Rolling out an application that hasn’t passed a security assessment puts the business … continue reading