DevOps & SRE notes – Telegram
DevOps & SRE notes
12K subscribers
41 photos
19 files
2.5K links
Helpful articles and tools for DevOps&SRE

WhatsApp: https://whatsapp.com/channel/0029Vb79nmmHVvTUnc4tfp2F

For paid consultation (RU/EN), contact: @tutunak


All ways to support https://telegra.ph/How-support-the-channel-02-19
Download Telegram
The blog post is a hands-on guide to building a basic Docker-like environment using Linux namespaces, cgroups, and chroot12. It shows how to create an isolated container with its own file system, network, and resource limits. It also explains the concepts and commands behind each step of the process.
https://qovery.com/blog/the-cost-of-upgrading-hundreds-of-kubernetes-clusters
👍2
The article describes how DoorDash built an eBPF-powered agent called BPFAgent to monitor network traffic within their Kubernetes clusters. The article explains the benefits, challenges, and use cases of using eBPF probes to capture and enrich network events at the kernel level.


https://doordash.engineering/2023/08/15/bpfagent-ebpf-for-monitoring-at-doordash/
👍31
The article is about how Adevinta, a company that provides an internal developer platform based on Kubernetes, enabled mixed-architecture deployments with ARM and x86 nodes. The article describes the challenges, solutions, and benefits of using a mutating webhook called Noe to automatically adjust node affinities based on the container images' supported architectures. The article also announces that Noe is open-sourced and invites the community to collaborate and improve it.

https://medium.com/adevinta-tech-blog/transparently-providing-arm-nodes-to-4-000-engineers-c09c92314f2f
👍3🔥21
The article is about how to use Istio, a service mesh for Kubernetes, to implement authentication and authorization policies for microservices. The article demonstrates how to enable mutual TLS encryption, JWT authentication, and RBAC policies to secure service-to-service communication. The article also provides code examples and commands to configure and test the policies.

https://www.infracloud.io/blogs/istio-authentication-authorization-policies/
👍4👏2🤯2
The challenges and solutions of gRPC load balancing in Kubernetes, a platform for deploying microservice applications.
The authors describe how they implemented a custom DNS resolver class that uses a push-based mechanism to update the IP list of available backend servers, instead of relying on the default pull-based DNS resolution that is inefficient and unsynchronized.

https://citymall.engineering/redefining-grpc-load-balancing-the-power-of-custom-dns-in-kubernetes-126ecc3cfb6c
👍3🔥21🎉1
The article delves into how chaos engineering helps in proactively identifying potential system failures in modern cloud applications, thereby averting costly outages. It further elaborates on the application of chaos engineering in security testing, dubbed Security Chaos Engineering (SCE), to ensure systems respond appropriately to common threats by conducting controlled experiments that inject failures into various components like servers and database
https://www.datadoghq.com/blog/chaos-engineering-for-security/
👍4🔥21❤‍🔥1