This article provides a comprehensive guide on implementing a Kubernetes webhook admission controller for custom authorization logic. It covers the process of creating an authorization service using Golang, setting up TLS certificates for secure communication, and configuring the necessary Kubernetes resources
https://itnext.io/kubernetes-webhook-admission-controller-3271d041c636
https://itnext.io/kubernetes-webhook-admission-controller-3271d041c636
Medium
Kubernetes Webhook Admission Controller
How to use k8s admission controller for authorize externally
👍6
The article demonstrates how TAR can cause a complete service outage in one zone if pods become unavailable, despite the presence of healthy pods in other zones1
. It also highlights additional limitations of TAR, such as inconsistent behavior with fewer than three pods per zone and potential conflicts with other Kubernetes features like horizontal pod autoscaling
https://buoyant.io/blog/the-trouble-with-topology-aware-routing-sacrificing-reliability-to-avoid-cross-zone-traffic
. It also highlights additional limitations of TAR, such as inconsistent behavior with fewer than three pods per zone and potential conflicts with other Kubernetes features like horizontal pod autoscaling
https://buoyant.io/blog/the-trouble-with-topology-aware-routing-sacrificing-reliability-to-avoid-cross-zone-traffic
www.buoyant.io
The trouble with Topology Aware Routing: Sacrificing reliability in the name of cost savings
Topology Aware Routing is a feature of Kubernetes that prevents cluster traffic within one availability zone from crossing to another availability zone. For high-traffic applications deployed in multi-zone clusters, this can provide significant cost savings.…
👍5
Forwarded from Best Channels for Tech guys
🐍 Python Notes 🐍
Stay on top of your Python skills with concise notes, tips, and tricks for every level of developer! Whether you're a beginner or advanced, these notes cover everything from basic syntax to advanced libraries and real-world applications.
📘 Comprehensive Python Guides
⚙️ Practical Coding Tips & Tricks
🚀 Master Python, Step by Step
✨ Subscribe now and boost your Python knowledge! 📲
Stay on top of your Python skills with concise notes, tips, and tricks for every level of developer! Whether you're a beginner or advanced, these notes cover everything from basic syntax to advanced libraries and real-world applications.
📘 Comprehensive Python Guides
⚙️ Practical Coding Tips & Tricks
🚀 Master Python, Step by Step
✨ Subscribe now and boost your Python knowledge! 📲
🔥5
This article details the author's experience integrating a MongoDB NoSQL database into a Kubernetes cluster and connecting it with a Spring Boot application. It provides a step-by-step guide on setting up a local Kind Kubernetes cluster, installing the MongoDB operator, creating a MongoDB cluster, and developing a Spring Boot application that interacts with the database
https://medium.com/@martin.hodges/my-experience-adding-a-mongodb-no-sql-database-to-my-kubernetes-cluster-f43fe72fa0ba
https://medium.com/@martin.hodges/my-experience-adding-a-mongodb-no-sql-database-to-my-kubernetes-cluster-f43fe72fa0ba
Medium
My experience adding a MongoDB No-SQL database to my Kubernetes cluster
If you have read my article on how to decide between SQL and No-SQL databases, you may be wondering if you can add a No-SQL MongoDB…
👍4
This blog post provides an in-depth exploration of the new mseal system call introduced in Linux kernel 6.10. The mseal syscall implements "memory sealing," allowing developers to make memory regions immutable during program runtime1
. It prevents attackers from modifying sealed memory areas, even with code execution capabilities1
https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/
. It prevents attackers from modifying sealed memory areas, even with code execution capabilities1
https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/
The Trail of Bits Blog
A deep dive into Linux’s new mseal syscall
If you love exploit mitigations, you may have heard of a new system call named mseal landing into the Linux kernel’s 6.10 release, providing a protection called “memory sealing.” Beyond notes from the authors, very little information about this mitigation…
👍3
An extensible framework for application-level data management on Kubernetes, Kanister is a Cloud Native Computing Foundation sandbox project and was originally created by the Veeam Kasten team.
https://github.com/kanisterio/kanister
https://github.com/kanisterio/kanister
GitHub
GitHub - kanisterio/kanister: An extensible framework for application-level data management on Kubernetes, Kanister is a Cloud…
An extensible framework for application-level data management on Kubernetes, Kanister is a Cloud Native Computing Foundation sandbox project and was originally created by the Veeam Kasten team. - k...
👍2
This article provides an in-depth exploration of OpenTelemetry logs, a powerful open-source observability framework. It discusses how OpenTelemetry simplifies the collection and management of telemetry data at scale, offering developers better insights into application performance and behavior.
https://manassharma.hashnode.dev/opentelemetry-logs-deep-dive
https://manassharma.hashnode.dev/opentelemetry-logs-deep-dive
👍5
This blog post discusses preemptible pods in Kubernetes, a feature that allows for more efficient resource utilization in cluster environments. It likely explores how PerfectScale's solutions can help users optimize their Kubernetes deployments by leveraging preemptible pods effectively.
https://www.perfectscale.io/blog/preemptible-pods
https://www.perfectscale.io/blog/preemptible-pods
www.perfectscale.io
Preemptible Pods
Learn how preemptible pods prioritize critical workloads, optimize node utilization, set up PriorityClasses, and implement pod preemption.
👍3
This author explores two primary collaboration styles in software development: individual stewardship and shared stewardship. It delves into the characteristics, strengths, and weaknesses of each approach, providing insights into their application in various work environments
https://rethinkingsoftware.substack.com/p/programmer-collaboration-styles
https://rethinkingsoftware.substack.com/p/programmer-collaboration-styles
Substack
Programmer Collaboration Styles
In software development, two collaboration styles have proven to be most effective.
👍4
This article details Cloudflare's successful migration of billions of DNS records from their main database cluster to a new dedicated DNS database. The migration involved moving 1.7 billion records from the primary DNS table and 4.3 billion records from an archive table, while ensuring zero data loss and minimal downtime
https://blog.cloudflare.com/migrating-billions-of-records-moving-our-active-dns-database-while-in-use/
https://blog.cloudflare.com/migrating-billions-of-records-moving-our-active-dns-database-while-in-use/
The Cloudflare Blog
Migrating billions of records: moving our active DNS database while it’s in use
According to a survey done by W3Techs, as of October 2024, Cloudflare is used as an authoritative DNS provider by 14.5% of all websites
👍3
Ohayou(おはよう), HTTP load generator, inspired by rakyll/hey with tui animation.
https://github.com/hatoo/oha
https://github.com/hatoo/oha
GitHub
GitHub - hatoo/oha: Ohayou(おはよう), HTTP load generator, inspired by rakyll/hey with tui animation.
Ohayou(おはよう), HTTP load generator, inspired by rakyll/hey with tui animation. - hatoo/oha
👏4👍1
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
https://github.com/sshuttle/sshuttle
https://github.com/sshuttle/sshuttle
GitHub
GitHub - sshuttle/sshuttle: Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin.…
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling. - sshuttle/sshuttle
👍3
This author explores how Otterize simplifies workload IAM integration in Kubernetes on Azure. It demonstrates how developers can manage IAM changes directly from within the cluster, using Otterize's open-source solution to automate managed identity and policy creation
https://itnext.io/kubernetes-automate-workload-iam-on-azure-with-otterize-860faa221eac
https://itnext.io/kubernetes-automate-workload-iam-on-azure-with-otterize-860faa221eac
Medium
Kubernetes — Automate workload IAM on Azure with Otterize
Simplifying Network and Workload IAM Integration in Kubernetes with Otterize
👍3
This article explores the key areas of responsibility for engineering managers, providing insights into their multifaceted role within an organization. It likely delves into topics such as team leadership, project management, technical guidance, and strategic planning, offering valuable perspectives for both aspiring and current engineering managers.
https://levelup.gitconnected.com/the-engineering-managers-areas-of-responsibility-e25fe6c6fbb7
https://levelup.gitconnected.com/the-engineering-managers-areas-of-responsibility-e25fe6c6fbb7
Medium
The Engineering Manager’s Areas of Responsibility
What exactly do they have to do?
👍6