The post discusses key metrics for monitoring CoreDNS, including throughput, performance, scaling and resource, Go, and cache metrics.
https://www.datadoghq.com/blog/coredns-metrics/
https://www.datadoghq.com/blog/coredns-metrics/
Datadog
Key metrics for CoreDNS monitoring | Datadog
Monitor these key metrics to gain visibility into CoreDNS.
The post discusses how to collect and visualize CoreDNS metrics using the CoreDNS Prometheus plugin, which exposes metrics in the OpenMetrics format
https://www.datadoghq.com/blog/coredns-monitoring-tools/
https://www.datadoghq.com/blog/coredns-monitoring-tools/
Datadog
Tools for collecting metrics and logs from CoreDNS | Datadog
Learn how you can collect metrics and logs that give you visibility into the performance and status of your CoreDNS servers.
The blog post by Lee Briggs, a senior software engineer at Pulumi, who shares his thoughts and principles on how to structure infrastructure as code (IaC) projects in a scalable and maintainable way.
https://leebriggs.co.uk/blog/2023/08/17/structuring-iac
https://leebriggs.co.uk/blog/2023/08/17/structuring-iac
lbr.
Structuring your Infrastructure as Code | lbr.
If you’re thinking of migrating to another infrastructure as code tool (and why would you, everything is great in the IaC world now, right?!) you might find yourself asking yourself
blog post by Robusta, a company that provides multi-cluster observability and auto alerts for Kubernetes. The post discusses the controversy and trade-offs of how different cloud vendors and Kubernetes providers handle burstable CPU instances, which are nodes that can temporarily increase their CPU performance beyond their baseline level. T
https://home.robusta.dev/blog/fairness-kubernetes-pricing-and-burstable-cpus
https://home.robusta.dev/blog/fairness-kubernetes-pricing-and-burstable-cpus
home.robusta.dev
Fairness, Kubernetes Pricing, and Burstable CPUs | Robusta
Updates to our benchmark on Kubernetes Node Efficiency
In recent years, cellular architectures have become increasingly popular for large online services as a way to increase redundancy and limit the blast radius of site failures.
https://slack.engineering/slacks-migration-to-a-cellular-architecture/
https://slack.engineering/slacks-migration-to-a-cellular-architecture/
slack.engineering
Slack’s Migration to a Cellular Architecture
Summary In recent years, cellular architectures have become increasingly popular for large online services as a way to increase redundancy and limit the blast radius of site failures. In pursuit of these goals, we have migrated the most critical user-facing…
The article is a blog post by Nathan Peck, a Senior Developer Advocate at AWS, about rethinking infrastructure as code from scratch. In the post, Nathan discusses his thoughts on the current state of infrastructure as code and how it could be improved. He suggests that the current tools and practices for infrastructure as code are too complex and error-prone, and proposes a new approach that focuses on simplicity and ease of use.
https://nathanpeck.com/rethinking-infrastructure-as-code-from-scratch/
https://nathanpeck.com/rethinking-infrastructure-as-code-from-scratch/
Nathan Peck
Rethinking infrastructure as code from scratch
Recently I’ve been thinking a lot about infrastructure complexity, and the current state of infrastructure as code.
This is problem space that many talented people are tackling.
This is problem space that many talented people are tackling.
Bash noscript to tail Kubernetes logs from multiple pods at the same time
https://github.com/johanhaleby/kubetail
https://github.com/johanhaleby/kubetail
GitHub
GitHub - johanhaleby/kubetail: Bash noscript to tail Kubernetes logs from multiple pods at the same time
Bash noscript to tail Kubernetes logs from multiple pods at the same time - johanhaleby/kubetail
A new type of DDoS attack has been discovered
https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
The Cloudflare Blog
HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks
The “HTTP/2 Rapid Reset” attack exploits a weakness in the HTTP/2 protocol to generate enormous, hyper-volumetric DDoS attacks. Cloudflare has mitigated a barrage of these attacks in recent months, including an attack three times larger than any previous…
👍1
A post looking at how to ensure platform and product teams work well together, by aligning around business metrics and using incidents as a learning opportunity.
https://firehydrant.com/blog/align-platform-and-product-engineering-teams-over-incidents/
https://firehydrant.com/blog/align-platform-and-product-engineering-teams-over-incidents/
Firehydrant
Align platform and product engineering teams over incidents
In this blog post, I'll talk about how to align platform and product engineering teams by implementing business value proxy metrics and using incidents to inform them.
A discussion of opinionated infrastructure and platform engineering. The importance of golden paths and guardrails, and some discussion of the importance of frictionless onboarding.
https://redmonk.com/videos/opinionated-infrastructure-platform-engineering-for-productivity-golden-paths-and-guardrails/
https://redmonk.com/videos/opinionated-infrastructure-platform-engineering-for-productivity-golden-paths-and-guardrails/
RedMonk
Opinionated Infrastructure: Platform Engineering for Productivity. Golden Paths and Guardrails
Discover how Golden Paths revolutionize software development in this episode of Opinionated Infrastructure. Unveiling the challenges faced by the industry, James Governor emphasizes the need for platform teams to simplify complexity, optimize workflows, and…
Build your cloud asset inventory and break down your cost at the resource level 💰
https://github.com/tailwarden/komiser
https://github.com/tailwarden/komiser
GitHub
GitHub - tailwarden/komiser: Open-source cloud-environment inspector. Supporting AWS, GCP, Azure, and more! Your cloud resources…
Open-source cloud-environment inspector. Supporting AWS, GCP, Azure, and more! Your cloud resources will have nowhere to hide! - tailwarden/komiser
The article discusses how to use Kustomize and Helm together to manage Kubernetes manifests in a declarative and dynamic way. It shows how to use the helmChartInflationGenerator feature of Kustomize to integrate Helm charts with Kustomize overlays.
https://medium.com/@brent.gruber77/the-power-of-kustomize-and-helm-5773d0f4d95e
https://medium.com/@brent.gruber77/the-power-of-kustomize-and-helm-5773d0f4d95e
Medium
The Power of Kustomize and Helm
If you are new to Kubernetes, one of the first things you might do after securing your cluster, setting up your local kubectl config and…
Bridge the gap between security and development teams by sharing valuable context on common web application threats. Check out 5 common threats to address together here:
https://sthwk.com/common-web-threats
https://sthwk.com/common-web-threats
DevOps.com
Communicating Common Web App Security Threats to Developers
Safeguarding applications and a sound security posture requires security and developer teams to have an understanding of common threats.
Comprehensive comparison for k8s authentication https://www.tremolosecurity.com/post/kubernetes-authentication-comparing-solutions
www.tremolo.io
Kubernetes Authentication - Comparing Solutions
Compare multiple Kubernetes authentication options: OpenUnison, KeyCloak, Dex, and Pinniped. This post deploys each with common enterprise requirements, including manifests with step-by-step instructions for each project. .
A slim open-source workload manager for Kubernetes with team collaboration, WebApp, and CLI.
https://github.com/mogenius/punq
https://github.com/mogenius/punq
GitHub
GitHub - mogenius/punq: A slim open-source workload manager for Kubernetes with team collaboration, WebApp, and CLI.
A slim open-source workload manager for Kubernetes with team collaboration, WebApp, and CLI. - mogenius/punq
Good talk about security problems that can be caused of using opensource in you company.
https://www.youtube.com/watch?v=vU2rkVRuuTc
https://www.youtube.com/watch?v=vU2rkVRuuTc
YouTube
AWS re:Inforce 2022 - Open-source software supply chain: Your weakest link (Checkmarx) (DEM-204-S)
The concept of shared security responsibility is increasingly applicable to application security. Security teams safeguard the environments in which applications run, and developers are responsible for the security within applications. Because about 80–95…
👍2❤1👎1