DevOps & SRE notes – Telegram
DevOps & SRE notes
12K subscribers
41 photos
19 files
2.5K links
Helpful articles and tools for DevOps&SRE

WhatsApp: https://whatsapp.com/channel/0029Vb79nmmHVvTUnc4tfp2F

For paid consultation (RU/EN), contact: @tutunak


All ways to support https://telegra.ph/How-support-the-channel-02-19
Download Telegram
The post discusses key metrics for monitoring CoreDNS, including throughput, performance, scaling and resource, Go, and cache metrics.

https://www.datadoghq.com/blog/coredns-metrics/
The blog post by Lee Briggs, a senior software engineer at Pulumi, who shares his thoughts and principles on how to structure infrastructure as code (IaC) projects in a scalable and maintainable way.

https://leebriggs.co.uk/blog/2023/08/17/structuring-iac
blog post by Robusta, a company that provides multi-cluster observability and auto alerts for Kubernetes. The post discusses the controversy and trade-offs of how different cloud vendors and Kubernetes providers handle burstable CPU instances, which are nodes that can temporarily increase their CPU performance beyond their baseline level. T

https://home.robusta.dev/blog/fairness-kubernetes-pricing-and-burstable-cpus
The article is a blog post by Nathan Peck, a Senior Developer Advocate at AWS, about rethinking infrastructure as code from scratch. In the post, Nathan discusses his thoughts on the current state of infrastructure as code and how it could be improved. He suggests that the current tools and practices for infrastructure as code are too complex and error-prone, and proposes a new approach that focuses on simplicity and ease of use.

https://nathanpeck.com/rethinking-infrastructure-as-code-from-scratch/
The article discusses how to use Kustomize and Helm together to manage Kubernetes manifests in a declarative and dynamic way. It shows how to use the helmChartInflationGenerator feature of Kustomize to integrate Helm charts with Kustomize overlays.
https://medium.com/@brent.gruber77/the-power-of-kustomize-and-helm-5773d0f4d95e
Bridge the gap between security and development teams by sharing valuable context on common web application threats. Check out 5 common threats to address together here:

https://sthwk.com/common-web-threats