DevOps & SRE notes – Telegram
DevOps & SRE notes
12K subscribers
41 photos
19 files
2.5K links
Helpful articles and tools for DevOps&SRE

WhatsApp: https://whatsapp.com/channel/0029Vb79nmmHVvTUnc4tfp2F

For paid consultation (RU/EN), contact: @tutunak


All ways to support https://telegra.ph/How-support-the-channel-02-19
Download Telegram
The article is about how Adevinta, a company that provides an internal developer platform based on Kubernetes, enabled mixed-architecture deployments with ARM and x86 nodes. The article describes the challenges, solutions, and benefits of using a mutating webhook called Noe to automatically adjust node affinities based on the container images' supported architectures. The article also announces that Noe is open-sourced and invites the community to collaborate and improve it.

https://medium.com/adevinta-tech-blog/transparently-providing-arm-nodes-to-4-000-engineers-c09c92314f2f
👍3🔥21
The article is about how to use Istio, a service mesh for Kubernetes, to implement authentication and authorization policies for microservices. The article demonstrates how to enable mutual TLS encryption, JWT authentication, and RBAC policies to secure service-to-service communication. The article also provides code examples and commands to configure and test the policies.

https://www.infracloud.io/blogs/istio-authentication-authorization-policies/
👍4👏2🤯2
The challenges and solutions of gRPC load balancing in Kubernetes, a platform for deploying microservice applications.
The authors describe how they implemented a custom DNS resolver class that uses a push-based mechanism to update the IP list of available backend servers, instead of relying on the default pull-based DNS resolution that is inefficient and unsynchronized.

https://citymall.engineering/redefining-grpc-load-balancing-the-power-of-custom-dns-in-kubernetes-126ecc3cfb6c
👍3🔥21🎉1
The article delves into how chaos engineering helps in proactively identifying potential system failures in modern cloud applications, thereby averting costly outages. It further elaborates on the application of chaos engineering in security testing, dubbed Security Chaos Engineering (SCE), to ensure systems respond appropriately to common threats by conducting controlled experiments that inject failures into various components like servers and database
https://www.datadoghq.com/blog/chaos-engineering-for-security/
👍4🔥21❤‍🔥1
The blog post discusses the application of chaos engineering to intentionally induce failures in distributed systems, aiding in assessing their resilience and improving the observability stack at Coroot. Through simulated network failures, the post explores how such disruptions can be detected in a distributed environment, providing insights into ensuring accurate identification of different failure scenarios
https://coroot.com/blog/chaos-driven-observability-spotting-network-failures
3👍3❤‍🔥2
The blog post recounts a real-world scenario where a Kubernetes API was overwhelmed by numerous requests, detailing the troubleshooting process and the implemented solution to stabilize the system. Through creating and deploying FlowSchema and PriorityLevelConfiguration manifests, the authors were able to manage request flows efficiently, thereby restoring and optimizing the Kubernetes cluster's performance

https://blog.palark.com/kubernetes-api-flow-control-management/
🔥6👍2👏2
The blog post elucidates the author's journey with Argo Workflows, highlighting its effectiveness for infrastructure automation and its advantage over Jenkins. Through personal experiences, the author shares mistakes made, lessons learned, and certain developed patterns to assist readers in avoiding similar pitfalls. The blog's objective is to impart the acquired knowledge and patterns which are conducive to a more efficient utilization of Argo Workflows
https://hodgkins.io/argo-workflow-proven-patterns-from-production
👍32❤‍🔥1💯1