Systems | Development | Analytics | API | Testing

Containers

How to Use Confluent for Kubernetes to Manage Resources Outside of Kubernetes

Apache Kafka® cluster administrators often need to solve problems like how to onboard new teams, manage resources like topics or connectors, and maintain permission control over these resources. In this post, we will demonstrate how to use Confluent for Kubernetes (CfK) to enable GitOps with a CI/CD pipeline and delegate resource creation to groups of people without distributing admin permission passwords to other people in the organization.

Streamlining Cloud Native App Development in Kubernetes with Prioritized API Management

For years, we've witnessed how applications have shifted to the cloud, driven by cost savings, flexibility, on-demand access, scalability, and faster deployment times. During that time, new architectural best practices for building cloud native applications have emerged. (For more insights, refer to this whitepaper.) Yet despite these advances, it remains difficult to build cloud native applications that fully take advantage of Kubernetes, the platform of choice for most cloud deployments.

Accelerate Gen AI Securely With Snowflake Cortex And Snowpark Container Services

Fueled by vast data volumes and powerful computing, AI is revolutionizing work. To capture the value of Generative AI for business, companies need to customize LLMs with their enterprise data. But feeding sensitive data into externally hosted LLMs poses security and exposure risks, and self-hosting LLMs carry a heavy operational burden from maintaining complex environments.

Kong Konnect Data Plane Elasticity on Amazon EKS 1.29: Pod Autoscaling with VPA

In this series of posts, we will look closely at how Kong Konnect Data Planes can take advantage of Autoscalers running on Amazon Elastic Kubernetes Services (EKS) 1.29 to support the throughput the demands API consumers impose on it at the lowest cost. The series comprises four parts.

Gateway API vs Ingress: The Future of Kubernetes Networking

As Kubernetes has become the de facto orchestration platform for deploying cloud native applications, networking and traffic management have emerged as pivotal challenges when managing access to services and infrastructure. The core Kubernetes Ingress resource addresses basic Layer 7 (L7) routing needs but has limitations in terms of flexibility, functionality, and standardization.

Announcing the Kong Konnect Mesh EKS Blueprint Add-on

We’re excited to announce a new addition to our Kong Konnect EKS Blueprint Family: the Kong Konnect Mesh EKS Blueprint Add-on to deploy your Mesh Zones. Deploy your zones securely on AWS with the new Mesh Manager offering in Kong Konnect. It gives you an opinionated install of Kong Mesh to quickly ramp up on Kong Konnect’s Mesh Manager on Amazon EKS. Let’s dive in.

Evolving Security From "Time Suck" to Productivity Creator

The challenge with security around the development process is that too often it has felt like it was bolted on after the fact, because it was. It’s no wonder that an announcement that a new security tool has been added to the process is likely to elicit a collective eye roll from a development team. To be clear, developers are not against security, but they are skeptical of new processes and tools being added by security teams with no development experience.