Cloud Drops Episode #002: Snyk Sysdig and Observability

News of the week

Sysdig teams up with SnykSnyk teams up with Sysdig

CNCF online programs

Locking down your cluster the zero-trust way with mutual TLS and traffic policy

Jason Morgan, Buoyant

Fluent Bit 1.9 - First mile observability - CNCF On Demand Webinar

Eduardo Silva, Calyptia

Your Kubernetes single-pane of glass with Kubescape

Amir Kaushansky, ARMO

Good Reads

****Auto scaling CI agents at Wix

Etamar Joseph Weinberg, Wix

Kubernetes RBAC full tutorial with examples

Anaïs Urlichs, Aqua

How to use cluster mesh for multi-region Kubernetes pod communication

Mike Bookham, Cockroach Labs

https://twitter.com/CloudNativeFdn/status/1494343985825034253?s=20&t=xOTIrxMWim02UzpOlU9hgQ

Security: The value of SBOMs

Daniel Holbach, Flux

Automate Canary analysis on Kubernetes with Argo

Hannah Troisi, Pixie

Best practices for multi-tenancy in Argo CD

Dan Garfield, Codefresh

ValidKube looks to help developers clean and secure Kubernetes YAML code VentureBeat

On-demand webinars

Podcasts & Posts

https://kubernetespodcast.com/episode/169-sysdig-report/

‎Kubernetes Bytes: Kubernetes Observability using Promscale and tobs on Apple Podcasts

https://email.linuxfoundation.org/kubeweekly-295

http://lwkd.info/2022/20220223


ThnkBIG is a global technology services, solutions, and staffing firm specializing in Kubernetes Implementation & Operationalization and DevOps Cloud Services to small medium-sized businesses, smb commercial, and government customers. As the number one DevOps, Kubernetes, and Cloud Managment subject matter experts in Austin Texas; our managed and consulting services are first class and enterprise ready. We scale as your business needs increase. With our cloud native expertise, we operationalize Kubernetes environments both large and small using best practices, automation, cloud-native open-source tools, and technology.

Previous
Previous

Cloud Drops Episode #003 - Kubernetes Documentary, Rakuten acquires Robin, Platform9 and more

Next
Next

Neutralize Your Software Supply Chain From Cyber Attacks - SBOM Security Explained