DevOps & SRE notes – Telegram
DevOps & SRE notes
12K subscribers
41 photos
19 files
2.5K links
Helpful articles and tools for DevOps&SRE

WhatsApp: https://whatsapp.com/channel/0029Vb79nmmHVvTUnc4tfp2F

For paid consultation (RU/EN), contact: @tutunak


All ways to support https://telegra.ph/How-support-the-channel-02-19
Download Telegram
The article discusses the ways in which containers within a pod can communicate with each other. It covers two methods of communication: Shared Volumes and Inter-Process Communications.

https://medium.com/@palashgoel/container-to-container-communications-in-kubernetes-35fc08798925
Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.

https://github.com/walidshaari/Certified-Kubernetes-Security-Specialist
🎉82👍2
The post provides a brief history of Inter-Process Communication (IPC) at Netflix. It explains how Netflix was early to the cloud and had to build their own solutions since there were no existing ones available

https://netflixtechblog.com/zero-configuration-service-mesh-with-on-demand-cluster-discovery-ac6483b52a51
OpenAPI is a language-agnostic specification for defining RESTful APIs.
With the advent of Kubernetes 1.27, OpenAPI v3.0 has been made generally available, further enhancing the API functionality of Kubernetes1. This integration provides improved documentation, clear validation rules, and enhanced extensibility1.
https://medium.com/cloud-native-daily/kubernetes-1-27-goes-galactic-with-openapi3-6ea228785c50
The post explains how a request flows from a user’s perspective across the network to reach AWS and then Slack’s internal services

https://github.com/siderolabs/talos
👍3
The post emphasizes that while Kubernetes is a leading container management system, it’s not exempt from malicious attacks. Therefore, understanding Kubernetes’ environment and the different vulnerabilities one can be exposed to while creating, deploying, or running applications in clusters is crucial.
https://goteleport.com/blog/how-to-hack-kubernetes