The HeadlinesEditor’s picks of the highlights from the past week.
Kubernetes Design and Development Explained
Saad Ali, Google
Kubernetes is quickly becoming the de facto way to deploy workloads on distributed systems. In this post, you will develop a deeper understanding of Kubernetes by taking a deep dive into some of the principles underpinning its design. This article is part of a series by speakers at the upcoming Open Source Summit, coming to Vancouver August 29-31.
Line-up for Inaugural KubeCon + CloudNativeCon China Announced
Kristen Evans, CNCF
The agenda features an impressive mix of topics, including technical sessions, deep-dives and case studies covering Apache Spark on Kubernetes, Modern Data Science in a Cloud Native World, Canary Deployment With Prometheus, Navigating the Service Mesh Ecosystem, Running Vitess on Kubernetes at Massive Scale, and more.
Filter Secrets from Kubernetes Logs
Radu Matei, Microsoft
Running any non-trivial application on Kubernetes will most likely require authorized access to other components – databases, storage buckets, APIs – all of which require a connection string or some sort of access key, which is done through secrets in Kubernetes. This article explores how to filter any Kubernetes secrets that end up in application logs, including a sample application.