Docs

Curated Kubernetes content from AKS, EKS, GKE, OpenShift, Rancher/K3s and more—auto‑aggregated daily.

  • 2026-02-12
    Kubernetes.dev Blog

    Blog: Spotlight on SIG Architecture: API Governance

    Spotlight on SIG Architecture: API Governance Introduction Goals and scope of API Governance The impact of Custom Resource Definitions API Governance in context Getting involved This is the fifth interview of a SIG Architecture Spotlight series that covers the different subprojects, and we will be covering SIG Architecture: API Governance. In this SIG Architecture spotlight we talked with Jordan Liggitt , lead of the API Governance sub-project.

    #kubernetes #community
  • 2026-02-12
    Redhat Blog

    Building bridges to European Digital Sovereignty

    Building bridges to European Digital Sovereignty About the author James Lovegrove More like this Sovereign AI architecture: Scaling distributed training with Kubeflow Trainer and Feast on Red Hat OpenShift AI Red Hat Enterprise Linux now available on the AWS European Sovereign Cloud Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share Europe stands at a critical digital crossroads. As the European Commission shapes the European Open Digital Ecosystem Strategy , the conversation has shifted toward a vital objective: achieving true digital sovereignty while driving global competitiveness.

    #kubernetes
  • 2026-02-12
    Redhat Blog

    From challenge to champion: Elevate your vulnerability management strategy

    From challenge to champion: Elevate your vulnerability management strategy Beyond the base score: The art of smart prioritization Gaining clarity: A sharper focus on container security Beyond the patch: Building a culture of resilience Red Hat Product Security About the author Jeremy West More like this What’s new in post-quantum cryptography in RHEL 10.1 Introducing OpenShift Service Mesh 3.2 with Istio’s ambient mode Data Security And AI | Compiler Data Security 101 | Compiler Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share In the world of cybersecurity, vulnerability management is frequently a collaborative effort between vendors, software maintainers, and customers. It's a continuous journey of discovery, prioritization, and remediation that we embark on together.

    #kubernetes
  • 2026-02-12
    Kubernetes Blog

    Spotlight on SIG Architecture: API Governance

    Spotlight on SIG Architecture: API Governance Introduction Goals and scope of API Governance The impact of Custom Resource Definitions API Governance in context Getting involved This is the fifth interview of a SIG Architecture Spotlight series that covers the different subprojects, and we will be covering SIG Architecture: API Governance. In this SIG Architecture spotlight we talked with Jordan Liggitt , lead of the API Governance sub-project.

    #kubernetes
  • 2026-02-11
    VMware Cloud Foundation Blog

    A Closer Look at VMware Cloud Foundation Advanced Services

    Why this series matters The Advanced Services for VCF portfolio Highlights from the discussion How customers should think about advanced services What’s Coming Next Links Mentioned The Virtually Speaking Podcast Discover more from VMware Cloud Foundation (VCF) Blog Related Articles Advanced Cyber Compliance: Security, Compliance, and Resilience for VCF A Closer Look at VMware Cloud Foundation Advanced Services Extreme Performance Series 2026: Using vTopology in VCF 9 VMware Cloud Foundation (VCF) is widely recognized as the foundation for modern private cloud. What’s less widely understood is the growing portfolio of advanced services designed to extend VCF far beyond core infrastructure and solve some of the most pressing challenges customers face today.

    #vmware #cloud-foundation #kubernetes
  • 2026-02-11
    Tigera

    Kubernetes Network Observability: Comparing Calico, Cilium, Retina, and Netobserv

    Feature Comparison Matrix Understanding Flow Types Aggregated Flows Individual Flows Calico Observability Stack How it works Key Data Types Cilium Observability Stack How it Works Key Data Types Microsoft Retina How it Works Key Data Types Netobserv (Red Hat) How it Works Key Data Types Conclusion The 3 Rules of Kubernetes Network Observability 1. The Native Stack Rule 2.

    #tigera
  • 2026-02-11
    CNCF

    Security Slam Returns for 2026 — Now Open to All Open Source Projects

    Posted on February 11, 2026 by Eddie Knight, Sonatype The CNCF Technical Advisory Group for Security & Compliance is excited to announce the upcoming 2026 Security Slam at KubeCon + CloudNativeCon Europe, in partnership with Sonatype and OpenSSF. The event will run from Friday, February 20th until Friday, March 20th.

    #cncf
  • 2026-02-11
    VMware Cloud Foundation Blog

    Extreme Performance Series 2026: Using vTopology in VCF 9

    Discover more from VMware Cloud Foundation (VCF) Blog Related Articles Newly Updated Technical Guides: MS SQL Server and ADDS on VMware Cloud Foundation Advanced Cyber Compliance: Security, Compliance, and Resilience for VCF A Closer Look at VMware Cloud Foundation Advanced Services The Extreme Performance Series is back for 2026! This video blog series covers the highlights of recent performance work on VMware technology. Todd Muirhead talks with Mark Achtemichuk about using the automatic vTopology setting in VMware Cloud Foundation 9 to get the best configuration for virtual CPUs and virtual NUMA nodes.

    #vmware #cloud-foundation #kubernetes
  • 2026-02-11
    VMware Cloud Foundation Blog

    VMware vSphere Kubernetes Service 3.6: Making Enterprise Kubernetes Safer, More Flexible, and Easier to Operate

    At a Glance: What’s New in VKS 3.6 Kubernetes 1.35, Built for Enterprise Operations Smoother Upgrades and Safer Day-2 Operations Performance and Data-Intensive Workloads Security, Compliance, and Governance Platform UX and Ecosystem Enablement Your Network, Your Choice Your Firewall, Your Choice Your OS, Your Choice Kubernetes, with Fewer Surprises Resources Available Now: Coming Soon to VMware Blogs: Upstream Kubernetes and Open Source References: Discover more from VMware Cloud Foundation (VCF) Blog Related Articles Newly Updated Technical Guides: MS SQL Server and ADDS on VMware Cloud Foundation Advanced Cyber Compliance: Security, Compliance, and Resilience for VCF Implementing Cross-Region Replication with Harbor in VMware Cloud Foundation As Kubernetes adoption matures inside the enterprise, the challenges platform teams face have shifted. Standing up clusters is no longer the challenge.

    #vmware #cloud-foundation #kubernetes
  • 2026-02-11
    Redhat Blog

    Simplifying modern defence operations with Red Hat Edge Manager

    Simplifying modern defence operations with Red Hat Edge Manager The challenge: Scale without complexity A "green means go" philosophy A security-first view of edge devices Red Hat’s vision: Platforms, not products, at the edge Red Hat Learning Subscription | Product Trial About the authors Neil Perkins Sam Richman More like this Deterministic performance with Red Hat Enterprise Linux for industrial edge Red Hat Enterprise Linux delivers deterministic performance for industrial TSN What Can Video Games Teach Us About Edge Computing? | Compiler How Do Roads Become Smarter? | Compiler Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share The modern front line has evolved into a hyperconnected, software-driven ecosystem. From reconnaissance drones to thousands of sensors embedded across the theatre, the network’s edge is the new digital frontier.

    #kubernetes