The blog post "Serverless OpenTelemetry at Scale: The PostNL Context" by Luc van Donkersgoed is focused on implementing OpenTelemetry in a serverless environment at a large scale, particularly in the setting of PostNL. The article likely provides insights into the technical intricacies and challenges associated with this implementation, offering valuable perspectives for professionals in cloud computing and serverless technologies.
https://lucvandonkersgoed.com/2023/11/10/serverless-opentelemetry-at-scale-the-postnl-context/
https://lucvandonkersgoed.com/2023/11/10/serverless-opentelemetry-at-scale-the-postnl-context/
Luc van Donkersgoed's Notes
Serverless OpenTelemetry at scale: the PostNL context
In the first installment of the Serverless OpenTelemetry at scale series we will cover the PostNL context and need for observability.
👍4
The article "Engineering Transformations - Adopting Automated Testing As A Practice" delves into the critical role of automated testing in software development. It focuses on how leadership can spearhead the integration of automated testing into development workflows. The piece explores the challenges encountered and strategies needed for effective implementation, especially in startup and growth-stage company environments. It emphasizes the combination of technical and sociological elements necessary for this engineering transformation.
https://vaidik.in/engineering-transformations-adopting-automated-testing/
https://vaidik.in/engineering-transformations-adopting-automated-testing/
Vaidik Kapoor
Engineering Transformations - Adopting Automated Testing As A Practice
Leadership, in a way, is about finding and using levers that help the business take step jumps in making progress towards the vision of the company. Engineering leadership is similar but limited to engineering and product development. As engineering leaders…
👍4
Hubble - Network, Service & Security Observability for Kubernetes using eBPF
https://github.com/cilium/hubble
https://github.com/cilium/hubble
GitHub
GitHub - cilium/hubble: Hubble - Network, Service & Security Observability for Kubernetes using eBPF
Hubble - Network, Service & Security Observability for Kubernetes using eBPF - cilium/hubble
❤3
The blog post "Cybersecurity Isn't Special" challenges the notion that cybersecurity is a uniquely complex field. It critiques the idea that cybersecurity problems are more esoteric and difficult than those faced by other teams like SRE or platform engineering. The post argues for integrating cybersecurity into broader software resilience strategies rather than treating it as a separate, special area. It suggests practical steps for cybersecurity teams to collaborate more effectively with other engineering teams and to focus on building resilience into software systems.
https://kellyshortridge.com/blog/posts/cybersecurity-isnt-special/
https://kellyshortridge.com/blog/posts/cybersecurity-isnt-special/
Sensemaking by Shortridge
Cybersecurity Isn't Special
This blog post explains why cybersecurity shouldn’t be a special stream of work in organizations, and presents opportunities for security programs to become more constructive and less gatekeepy.
👍3
The blog post "Speed Up Container Image Builds in Tekton Pipelines," outlines techniques for accelerating container image construction in Tekton Pipelines. It focuses on the utilization of Kaniko caching capabilities to enhance build speeds in a Tekton Pipeline environment, especially when dealing with non-persistent containers in Kubernetes. The article provides a comprehensive guide, including examples and instructions, for effectively implementing these techniques to optimize container image building processes.
https://cd.foundation/blog/2023/10/12/speed-up-container-image-builds-tekton-pipelines/
https://cd.foundation/blog/2023/10/12/speed-up-container-image-builds-tekton-pipelines/
CD Foundation
Speed Up Container Image Builds in Tekton Pipelines - CD Foundation
Use Kaniko caching capabilities to speed up builds in your Tekton Pipeline.
❤🔥2👍2
ControlPlane, a leader in Kubernetes and cloud-native consulting, has announced its support for the CNCF Flux Project by hiring key maintainers. This move underscores the firm's commitment to the open-source project's sustainability and growth following WeaveWorks' closure. By integrating Flux maintainers Stefan Prodan and Soule Ba into its team, ControlPlane aims to bolster the project's development and enhance GitOps security practices. This support includes funding, infrastructure for testing, community engagement, and the release of resources like Hardening Guides and Policy Packs, reinforcing the mutual success of Flux CD technology and its users.
https://control-plane.io/posts/controlplane-backs-the-cncf-flux-project-by-employing-maintainers
https://control-plane.io/posts/controlplane-backs-the-cncf-flux-project-by-employing-maintainers
control-plane.io
ControlPlane backs the CNCF Flux Project by Employing Maintainers
ControlPlane's support for the CNCF Flux project ensures the sustainability and security of critical systems through open source maintenance and innovative enterprise solutions
👍4🎉3❤2
Module to Automatically maximize the utilization of GPU resources in a Kubernetes cluster through real-time dynamic partitioning and elastic quotas - Effortless optimization at its finest!
https://github.com/nebuly-ai/nos
https://github.com/nebuly-ai/nos
GitHub
GitHub - nebuly-ai/nos: Module to Automatically maximize the utilization of GPU resources in a Kubernetes cluster through real…
Module to Automatically maximize the utilization of GPU resources in a Kubernetes cluster through real-time dynamic partitioning and elastic quotas - Effortless optimization at its finest! - nebuly...
👍3👏3
Kilo is a multi-cloud network overlay built on WireGuard and designed for Kubernetes (k8s + wg = kg)
https://github.com/squat/kilo
https://github.com/squat/kilo
GitHub
GitHub - squat/kilo: Kilo is a multi-cloud network overlay built on WireGuard and designed for Kubernetes (k8s + wg = kg)
Kilo is a multi-cloud network overlay built on WireGuard and designed for Kubernetes (k8s + wg = kg) - squat/kilo
👍4
The blog post "Architects & Tech Leads" explores the distinct roles of software architects and tech leads in product development teams. It discusses how these roles interact and work with product managers and engineering managers. The post delves into the challenges of defining these roles and the potential areas of conflict, emphasizing the importance of flexibility and collaboration in modern software development. It advocates for a synergistic approach, where each role complements the other, contributing to the overall success of the team.
https://mikefisher.substack.com/p/architects-and-tech-leads
https://mikefisher.substack.com/p/architects-and-tech-leads
Substack
Architects & Tech Leads
What do they do and how do they work together?
👍4
🪱 Kermoo offers resilience testing with Process Delays, Back-end Failures, CPU Simulations, and Memory Leaks. Boost your system reliability effortlessly.
https://github.com/evryn/kermoo
https://github.com/evryn/kermoo
GitHub
GitHub - evryn/kermoo: 🪱 Kermoo offers resilience testing with Process Delays, Back-end Failures, CPU Simulations, and Memory Leaks.…
🪱 Kermoo offers resilience testing with Process Delays, Back-end Failures, CPU Simulations, and Memory Leaks. Boost your system reliability effortlessly. - evryn/kermoo
👍4
Kubernetes Cluster API Provider for Terraform Cloud
https://github.com/hashicorp/cluster-api-provider-terraform-cloud
https://github.com/hashicorp/cluster-api-provider-terraform-cloud
GitHub
GitHub - hashicorp/cluster-api-provider-terraform-cloud: Kubernetes Cluster API Provider for Terraform Cloud
Kubernetes Cluster API Provider for Terraform Cloud - hashicorp/cluster-api-provider-terraform-cloud
👍4
The blog post "Bootstrap an Air Gapped Cluster With Kubeadm" provides a comprehensive guide on setting up a Kubernetes cluster in an air-gapped environment using Kubeadm. It covers the challenges of deploying in a network-isolated environment and offers detailed steps and strategies to effectively overcome these obstacles. The guide is particularly useful for those looking to deploy Kubernetes in secure, restricted-access environments.
https://kubernetes.io/blog/2023/10/12/bootstrap-an-air-gapped-cluster-with-kubeadm/
https://kubernetes.io/blog/2023/10/12/bootstrap-an-air-gapped-cluster-with-kubeadm/
Kubernetes
Bootstrap an Air Gapped Cluster With Kubeadm
Ever wonder how software gets deployed onto a system that is deliberately disconnected from the Internet and other networks? These systems are typically disconnected due to their sensitive nature. Sensitive as in utilities (power/water), banking, healthcare…
👍2
The blog post details a case study on migrating Kubernetes clusters between AWS accounts using Velero. It covers the migration process, including the transfer of both Kubernetes and non-Kubernetes resources, and outlines specific steps and strategies adopted for this task. The post also shares lessons learned and insights gained during the migration, making it a useful resource for those looking to undertake similar projects.
https://devopsdirective.com/posts/2023/11/velero-aws-account-migration/index.html
https://devopsdirective.com/posts/2023/11/velero-aws-account-migration/index.html
Devopsdirective
Velero AWS Account Migration [Case Study]
TL;DR: I recently helped an organization migrate a set of applications deployed in Kubernetes (EKS) across AWS accounts using Velero. This case study describes that process.
Please start with multiple AWS accounts so you don't have to hire someone like…
Please start with multiple AWS accounts so you don't have to hire someone like…
👍4
Burrito is a TACoS (Terraform Automation Collaboration Software) Kubernetes Operator.
https://github.com/padok-team/burrito
https://github.com/padok-team/burrito
GitHub
GitHub - padok-team/burrito: 🌯 Burrito is a TACoS Kubernetes Operator - "Argo CD for Terraform"
🌯 Burrito is a TACoS Kubernetes Operator - "Argo CD for Terraform" - padok-team/burrito
❤2👍2💩1
Perfect presentation about zero-trust
https://www.youtube.com/watch?v=0fkFj5XVnpY
https://www.youtube.com/watch?v=0fkFj5XVnpY
YouTube
AWS re:Invent 2023 - Zero Trust access with zero waiting, zero pain, and zero compromises (SEC329)
Dynamic and contextual access is the foundation for building a Zero Trust architecture, but it takes work to get it right. It is challenging to create and manage access policies and controls that meet security and compliance requirements, and gathering evidence…
👍2
This post provides a comprehensive overview of Cloudflare's logging pipeline, detailing the various components and processes involved in managing, improving, and maintaining the internal logging systems. It covers the journey of logs from their inception to their storage, explaining the role of different technologies and methods used in this process. The article highlights Cloudflare's focus on scalability, high availability, and meeting service level objectives while handling immense volumes of log data.
https://blog.cloudflare.com/an-overview-of-cloudflares-logging-pipeline/
https://blog.cloudflare.com/an-overview-of-cloudflares-logging-pipeline/
The Cloudflare Blog
An overview of Cloudflare's logging pipeline
In this post, we’re going to go over what that looks like, how we achieve high availability, and how we meet our Service Level Objectives (SLOs) while shipping close to a million log lines per second.
👍4
Good article about k8s and Zero-Downtime applications
https://www.qovery.com/blog/how-to-achieve-zero-downtime-application-with-kubernetes
https://www.qovery.com/blog/how-to-achieve-zero-downtime-application-with-kubernetes
Qovery
How to Achieve Zero-Downtime Application with Kubernetes
In this article, I’ll explain why and how you can achieve a zero-downtime application with Kubernetes and what Qovery handles for you if you use it.
👍5
Diagram as code
https://diagrams.mingrammer.com/docs/getting-started/examples
from diagrams import Cluster, Diagram
from diagrams.aws.compute import ECS, EKS, Lambda
from diagrams.aws.database import Redshift
from diagrams.aws.integration import SQS
from diagrams.aws.storage import S3
with Diagram("Event Processing", show=False):
source = EKS("k8s source")
with Cluster("Event Flows"):
with Cluster("Event Workers"):
workers = [ECS("worker1"),
ECS("worker2"),
ECS("worker3")]
queue = SQS("event queue")
with Cluster("Processing"):
handlers = [Lambda("proc1"),
Lambda("proc2"),
Lambda("proc3")]
store = S3("events store")
dw = Redshift("analytics")
source >> workers >> queue >> handlers
handlers >> store
handlers >> dw
https://diagrams.mingrammer.com/docs/getting-started/examples