DevOps & SRE notes – Telegram
DevOps & SRE notes
12K subscribers
40 photos
19 files
2.5K links
Helpful articles and tools for DevOps&SRE

WhatsApp: https://whatsapp.com/channel/0029Vb79nmmHVvTUnc4tfp2F

For paid consultation (RU/EN), contact: @tutunak


All ways to support https://telegra.ph/How-support-the-channel-02-19
Download Telegram
In the fast-paced world of Kubernetes and container orchestration, monitoring and metrics play a pivotal role in ensuring the health, efficiency, and reliability of applications. The article provides an insightful exploration into the criticality of pod metrics within the Kubernetes ecosystem
https://komodor.com/blog/harnessing-the-power-of-metrics-four-essential-use-cases-for-pod-metrics/
👍5
The introduction of Kubernetes Gateway API v1.0 marks a significant milestone, promising to enhance how developers and cluster operators manage and expose their services. The article dives deep into the nuances of this new API version, comparing it with the traditional Ingress controllers and highlighting its potential to redefine traffic routing within Kubernetes clusters. F
https://dev.to/apisix/kubernetes-gateway-api-v10-should-you-switch-45c0
👍4
Blog post addresses a critical aspect of container security—the ReadOnlyRootFilesystem flag. This insightful article elucidates the concept of making the root filesystem of a container read-only to prevent unauthorized modifications, which can be a common vector for security breaches.
https://alexandre-vazquez.com/readonlyrootfilesystem/
👍7
This article explores the underutilized Postgres feature of HOT (Heap Only Tuple) updates and the strategic use of fill factor to enhance database performance. It delves into how HOT updates allow for modifications within the same table page, bypassing index updates and reducing system load.
https://www.crunchydata.com/blog/postgres-performance-boost-hot-updates-and-fill-factor
👏5
In this article, the author delves into a critical vulnerability discovered in Argo CD, a popular continuous delivery tool for Kubernetes. The vulnerability poses significant security risks, potentially allowing unauthorized access and manipulation of deployment configurations. Their detailed analysis explains the nature of the vulnerability, its potential impact, and recommended mitigation strategies to secure your Argo CD implementations.

https://cycode.com/blog/revealing-argo-cd-critical-vulnerability/
😱6🔥3😢2