Have you ever herd about Geospatial database, https://tech.marksblogg.com/duckdb-geospatial-gis.html
Marksblogg
Geospatial DuckDB
Benchmarks & Tips for Big Data, Hadoop, AWS, Google Cloud, PostgreSQL, Spark, Python & More...
Good guide for writing a kubernetes operator https://shahin-mahmud.medium.com/write-your-first-kubernetes-operator-in-go-177047337eae
Medium
Write your first Kubernetes operator in go
What you need to know to get started
Another good article about security in k8s https://moshe-beladev-mb.medium.com/secure-your-kubernetes-workloads-with-gvisor-f189321792e1
Medium
Secure your Kubernetes Workloads with gVisor
We are all familiar with and love containers. Containers share the same host kernel which makes them a pretty portable and lightweight…
AWS telegram emoji pack
https://news.1rj.ru/str/addemoji/qcloudy_aws
https://news.1rj.ru/str/addemoji/qcloudy_aws
Good guide for understanding kubernetes network policies https://medium.com/geekculture/a-beginners-guide-to-understanding-kubernetes-network-policies-bc8f55fb9c0
Medium
A Beginners Guide to Understanding Kubernetes: Network Policies
A high-level beginner-friendly overview of Network Policies in Kubernetes and why you should care about them.
A wireguard operator created to easily provision a VPN in a k8s cluster
https://github.com/jodevsa/wireguard-operator
https://github.com/jodevsa/wireguard-operator
GitHub
GitHub - devops-land/wireguard-operator: Project is now maintained by Namecheap on https://github.com/nccloud/wireguard-operator.…
Project is now maintained by Namecheap on https://github.com/nccloud/wireguard-operator. This repo is archived. - devops-land/wireguard-operator
Network mapping could help you with debug problems and understand real network interaction between your microservices. So this implementation with Grafana https://betterprogramming.pub/improve-cluster-monitoring-with-network-mapping-in-grafana-fa8bb479fd47
Medium
Improve Cluster Monitoring With Network Mapping in Grafana
A deep dive into obtaining network maps and correlating IP with cluster workloads to speed up debugging
Good article about Cgroups in Linux https://towardsdatascience.com/the-power-of-linux-cgroups-how-containers-take-control-of-their-resources-ba564fef13b0
All we know that "at least privileges model" one of the most important parts the security. But why people still struggle with it? https://sysdig.com/blog/identity-access-management-difficult-cloud/
Sysdig
Why Companies Still Struggle with Least Privilege in the Cloud | Sysdig
According to the Sysdig 2023 Cloud-Native Usage Report, misconfigurations are still the biggest player in security incidents and, therefore, should be one of the greatest causes for concern in organizations.
Guy share the company experience about building Infrastructure platform with k8s https://betterprogramming.pub/how-we-built-an-infrastructure-platform-on-top-of-kubernetes-a39e67d85680
Medium
How We Built an Infrastructure Platform on Top of Kubernetes
How and why we used kubernetes for our infrastructure platform and some lessons learned along the way
Linkedin engineering team's article about autoscaling builds https://engineering.linkedin.com/blog/2023/scaling-autobuild--our-journey-towards-delivering-an-enhanced-cu
Linkedin
Scaling AutoBuild: Our Journey Towards Delivering An Enhanced Customer Experience
Never forget about security in your cluster https://medium.com/@badawekoo/harden-kubernetes-cluster-with-pod-and-container-security-contexts-119639dbb6ce
Medium
Harden Kubernetes cluster with Pod and container security contexts
When it comes to security in Kubernetes, It is very vital to secure the individual resources of the cluster. Pods and containers are…
Continuous profiling for Python applications https://medium.com/@martin.heinz/boost-your-python-application-performance-using-continuous-profiling-7eb993e68d23
Medium
Boost Your Python Application Performance Using Continuous Profiling
Learn how to use Grafana Phlare and continuous profiling to discover bottlenecks in you code and boost the performance of your Python apps
Good article about scaning vulnerabilities
https://semaphoreci.com/blog/govulncheck
https://semaphoreci.com/blog/govulncheck
The article discusses how to use eBPF (extended Berkeley Packet Filter) to collect telemetry data from a service without code changes and without requesting engineering efforts. eBPF provides the ability to execute programs on the Operational System Kernel, extending the OS capabilities and leveraging the kernel's privileged ability to control the system. The author explains how to use Pixie, an open-source observability solution for Kubernetes applications that uses eBPF to collect telemetry data automatically. Pixie offers features such as network monitoring, database query profiling, continuous application profiling, and Kafka monitoring. However, Pixie has two drawbacks, long-term data retention, and a lack of support for ARM architectures. The article concludes by suggesting other tools that offer similar features to Pixie, such as Cilium Hubble.
https://itnext.io/observability-strategies-to-not-overload-engineering-teams-ebpf-b034b26d7f1d
https://itnext.io/observability-strategies-to-not-overload-engineering-teams-ebpf-b034b26d7f1d
Medium
Observability strategies to not overload engineering teams – eBPF
eBPF is a powerful technology since it allows you to inject custom user-definition programs in the kernel without having to install…