How conntrack Could Be Limiting Your k8s Gateway
https://blog.miraco.la/how-conntrack-could-be-limiting-your-k8s-gateway
https://blog.miraco.la/how-conntrack-could-be-limiting-your-k8s-gateway
Play with Cilium native routing in Kind cluster
https://medium.com/@nahelou.j/play-with-cilium-native-routing-in-kind-cluster-5a9e586a81ca
https://medium.com/@nahelou.j/play-with-cilium-native-routing-in-kind-cluster-5a9e586a81ca
Hardening Container Images: Best Practices and Examples for Docker
https://medium.com/@SecurityArchitect/hardening-container-images-best-practices-and-examples-for-docker-e941263cab13
https://medium.com/@SecurityArchitect/hardening-container-images-best-practices-and-examples-for-docker-e941263cab13
Unlocking Kubernetes Performance with no CPU Resource Limits
https://medium.com/nordnet-tech/unlocking-kubernetes-performance-with-no-cpu-resource-limits-56d5dc33037b
https://medium.com/nordnet-tech/unlocking-kubernetes-performance-with-no-cpu-resource-limits-56d5dc33037b
How to Work With the Kubectl Debug Command
https://hackernoon.com/how-to-work-with-the-kubectl-debug-command
The Kubectl debug command is a tool that allows developers and operators to troubleshoot Kubernetes applications by connecting a debugging container to a running pod. This feature was introduced in Kubernetes version 1.18 and is available in the kubectl command-line tool.
https://hackernoon.com/how-to-work-with-the-kubectl-debug-command
Scaling a Bare Metal Cluster into the Cloud
https://www.siderolabs.com/blog/scaling-a-bare-metal-cluster-into-the-cloud
With the pendulum of Cloud vs. On-premises swinging slightly towards on-premises again, some might be considering moving their Kubernetes clusters onto bare metal while nursing their scars from the last time they tried managing their control plane using kubeadm. Others have been using bare metal the whole time, but have been hamstrung by lead times on hardware or regulatory pressure to keep sensitive information on-premises.
With a hybrid cluster, you can have your cake and eat it too – running the main cluster on-premises, but allowing it to expand and scale into a public cloud – and Talos Linux makes it easy. Talos is a Linux-based operating system built specifically for running Kubernetes. It lets you manage your entire machine state through a single configuration file, significantly reducing the maintenance burden of running and upgrading your cluster using its talosctl command line utility.
https://www.siderolabs.com/blog/scaling-a-bare-metal-cluster-into-the-cloud
Set up a Kubernetes cluster in under 5 minutes with Proxmox and k3s
https://dev.to/mihailtd/set-up-a-kubernetes-cluster-in-under-5-minutes-with-proxmox-and-k3s-2987
https://dev.to/mihailtd/set-up-a-kubernetes-cluster-in-under-5-minutes-with-proxmox-and-k3s-2987
hull
https://github.com/vidispine/hull
This repository contains the HULL Helm library chart. It is designed to ease building, maintaining and configuring Kubernetes objects in Helm charts and can be added to any Helm chart as an addon to enhance functionality without any risk of breaking existing Helm chart configurations.
https://github.com/vidispine/hull
capsule
https://github.com/projectcapsule/capsule
Capsule implements a multi-tenant and policy-based environment in your Kubernetes cluster. It is designed as a micro-services-based ecosystem with the minimalist approach, leveraging only on upstream Kubernetes.
https://github.com/projectcapsule/capsule
mailpit
https://github.com/axllent/mailpit
Mailpit is a small, fast, low memory, zero-dependency, multi-platform email testing tool & API for developers.
It acts as an SMTP server, provides a modern web interface to view & test captured emails, and includes an API for automated integration testing.
https://github.com/axllent/mailpit
kaytu
https://github.com/kaytu-io/kaytu
The Kaytu CLI improves the efficiency of cloud workloads by analyzing historical usage and providing tailored recommendations, such as changing instance sizes. This ensures you only pay for the resources you actually need without compromising stability.
https://github.com/kaytu-io/kaytu
terraform-plan-comment
https://github.com/borchero/terraform-plan-comment
GitHub Action to post the output of "terraform plan" to a pull request comment.
https://github.com/borchero/terraform-plan-comment
Optimize Kubernetes Pods’ Startup Time Using VolumeSnapshots
https://medium.com/riskified-technology/optimize-kubernetes-pods-startup-time-using-volumesnapshots-c0a2b7d39a29
In this blog post, you will learn how we used VolumeSnapshots to significantly reduce the startup times of static data sources-based applications, specifically within AWS environments.
https://medium.com/riskified-technology/optimize-kubernetes-pods-startup-time-using-volumesnapshots-c0a2b7d39a29
Behind the scenes of Vercel's infrastructure: Achieving optimal scalability and performance
https://vercel.com/blog/behind-the-scenes-of-vercels-infrastructure
Learn how Vercel builds and deploys serverless applications.
https://vercel.com/blog/behind-the-scenes-of-vercels-infrastructure
unleash
https://github.com/Unleash/unleash
Unleash is a powerful open source solution for feature management. It streamlines your development workflow, accelerates software delivery, and empowers teams to control how and when they roll out new features to end users. With Unleash, you can deploy code to production in smaller, more manageable releases at your own pace.
https://github.com/Unleash/unleash
Don’t Get Lost in the Metrics Maze: A Practical Guide to SLOs, SLIs, Error Budgets, and Toil
https://medium.com/@lokesh12/dont-get-lost-in-the-metrics-maze-a-practical-guide-to-slos-slis-error-budgets-and-toil-939ecd0181eb
https://medium.com/@lokesh12/dont-get-lost-in-the-metrics-maze-a-practical-guide-to-slos-slis-error-budgets-and-toil-939ecd0181eb
Terraform — how I split my monolithic state
https://medium.com/@adrianarba/terraform-how-i-split-my-monolithic-state-490916343dba
https://medium.com/@adrianarba/terraform-how-i-split-my-monolithic-state-490916343dba
BPFAgent: eBPF for Monitoring at DoorDash
https://doordash.engineering/2023/08/15/bpfagent-ebpf-for-monitoring-at-doordash
As DoorDash experienced rapid growth over the last few years, we began to see the limits of our traditional methods of monitoring. Metrics, logs, and traces provide vital information about our service ecosystem. But these signals almost entirely rely on application-level instrumentation, which can leave gaps or conflicting semantics across different systems. We decided to seek potential solutions that could provide a more complete and unified picture of our networking topology.
One of these solutions has been monitoring with eBPF, which allows developers to write programs that are injected directly into the kernel and can trace kernel operations. These programs, designed to provide lightweight access to most components of the kernel, are sandboxed and validated for safety by the kernel before execution. DoorDash was particularly interested in tracing network traffic via hooks called kprobes (kernel dynamic tracing) and tracepoints. With these hooks, we can intercept and understand TCP and UDP connections across our multiple Kubernetes clusters.
By building at the kernel level, we can monitor network traffic at the infrastructure level, which gives us new insights into DoorDash’s backend ecosystem that’s independent of the service workflow.
To run these eBPF probes, we have developed a Golang application called BPFAgent, which we run as a daemonset in all of our Kubernetes clusters. Here we will take a look at how we built BPFAgent, the process of building and maintaining its probes, and how various DoorDash teams have used the data collected.
https://doordash.engineering/2023/08/15/bpfagent-ebpf-for-monitoring-at-doordash
Terraform - Understanding Count and For_Each Loops
https://dev.to/pwd9000/terraform-understanding-count-and-foreach-loops-c6i
https://dev.to/pwd9000/terraform-understanding-count-and-foreach-loops-c6i
symphony
https://github.com/microsoft/symphony
Symphony is a framework and set of patterns and best practices for developing, testing, and deploying infrastructure on Azure using Infrastructure as Code (IAC.) It includes modern DevOps practices for IAC such as Main and Pull Request workflows, IaC Code Validation & Linting, Automated Testing, Security Scanning, Multi-environment deployments, modules dependencies and more.
https://github.com/microsoft/symphony