There’s No Such Thing as a Free Lunch!
https://slack.engineering/theres-no-such-thing-as-a-free-lunch
How Slack trains engineers in incident response by ordering lunch together.
https://slack.engineering/theres-no-such-thing-as-a-free-lunch
lla
https://github.com/triyanox/lla
lla is a high-performance, extensible alternative to the traditional ls command, written in Rust. It offers enhanced functionality, customizable output, and a plugin system for extended capabilities.
https://github.com/triyanox/lla
wesql
https://github.com/wesql/wesql
WeSQL is an innovative MySQL distribution that adopts a compute-storage separation architecture, with storage backed by S3 (and S3-compatible systems). It can run on any cloud, ensuring no vendor lock-in.
WeSQL has completely replaced MySQL’s traditional disk storage with S3. All MySQL data—binlogs, schemas, storage engine metadata, WAL, and data files—are entirely (not partially!) stored as objects in S3. The 11 nines of durability provided by S3 significantly enhances data reliability. Additionally, WeSQL can start from a clean, empty instance, connect to S3, load the data, and begin serving immediately with no additional setup required.
It is ideal for users who need an easy-to-manage, cost-effective, and developer-friendly MySQL database solution, especially for those needing support for both Serverless and BYOC (Bring Your Own Cloud).
https://github.com/wesql/wesql
10 Essential AWS Security Steps for Your AWS Account
https://cloudnature.net/blog/10-essential-aws-security-steps-for-your-aws-account
After spending years helping teams set up their AWS infrastructure, I've noticed something interesting: many of us face the same security challenges when starting out. You know what I mean if you've ever wondered "Wait, is my S3 bucket actually secure?" or "Should I really be using the root account for this?" (Spoiler: probably not!)
The good news? I've put together this guide to help you build a rock-solid AWS security foundation from day one. We'll cover 10 essential security measures that I've seen make a real difference in protecting AWS environments. While absolute security is a journey rather than a destination, implementing these steps will put you way ahead of the game in defending against common attack vectors.
And I've also created a Terraform project that you can use as baseline for your securing your AWS account!
The best part? It's all under the AWS free tier! 😉
Essentially, I got tired or reading the same posts regarding people (or organizations) getting their account hacked, here's my solution for that!
https://cloudnature.net/blog/10-essential-aws-security-steps-for-your-aws-account
terrateam
https://github.com/terrateamio/terrateam
Terrateam is an open-source GitOps CI/CD platform for automating infrastructure workflows. It integrates with GitHub to orchestrate Terraform, OpenTofu, CDKTF, and Terragrunt operations via pull requests. Use our hosted service or run on-premise.
https://github.com/terrateamio/terrateam
How I came to build a cheap server cluster for VDI
https://medium.com/@mnl_584/how-i-came-to-build-a-cheap-server-cluster-for-vdi-ca2ed6028eb2
https://medium.com/@mnl_584/how-i-came-to-build-a-cheap-server-cluster-for-vdi-ca2ed6028eb2
DevOps&SRE Library
Service Meshes Decoded Part One: A performance comparison of Istio vs Linkerd vs Cilium A service mesh is a dedicated infrastructure layer that facilitates service-to-service communications between services or microservices using a proxy. https://livewy…
Service Meshes Decoded Part Two: Is Istio Ambient worth it?
https://livewyer.io/blog/2024/06/06/comparison-of-service-meshes-part-two
https://livewyer.io/blog/2024/06/06/comparison-of-service-meshes-part-two
Using Sealed Secrets with Your Kubernetes Applications
https://devoriales.com/post/351/using-sealed-secrets-with-your-kubernetes-applications
This blog post walks you through working with Sealed Secrets by Bitnami.
https://devoriales.com/post/351/using-sealed-secrets-with-your-kubernetes-applications
FRR-k8s as a BGP backend for MetalLB
https://www.redhat.com/en/blog/frr-k8s-bgp-backend-metallb
The FRR-k8s API provides important Border Gateway Protocol (BGP) features required by the MetalLB load balancer with the ability to selectively accept routes and to inject raw FRR configuration options. It's built on FRRouting (FRR), a free and open source internet routing protocol suite for Linux and Unix platforms that implements Border Gateway Protocol (BGP) and Bidirectional Forwarding Detection (BFD).
https://www.redhat.com/en/blog/frr-k8s-bgp-backend-metallb
Monitoring, troubleshooting, and query analytics for PostgreSQL on Kubernetes
https://dev.to/dbazhenov/monitoring-troubleshooting-and-query-analytics-for-postgresql-on-kubernetes-2onj
https://dev.to/dbazhenov/monitoring-troubleshooting-and-query-analytics-for-postgresql-on-kubernetes-2onj
kubeblocks
https://github.com/apecloud/kubeblocks
KubeBlocks is an open-source control plane software that runs and manages databases, message queues and other stateful applications on K8s.
https://github.com/apecloud/kubeblocks
Kuzco
https://github.com/RoseSecurity/Kuzco
Kuzco reviews your Terraform and OpenTofu resources, compares them to the provider schema to detect unused parameters, and uses AI to suggest improvements and fixes
https://github.com/RoseSecurity/Kuzco
Load testing Kubernetes clients without breaking the bank
https://itnext.io/load-testing-kubernetes-clients-without-breaking-the-bank-f43332faa6ce
What if I told you can do performance tests on Kubernetes Clients without spending too much money, and much faster than conventional methods?
https://itnext.io/load-testing-kubernetes-clients-without-breaking-the-bank-f43332faa6ce
Terminating Elegantly: A Guide to Graceful Shutdowns
https://packagemain.tech/p/graceful-shutdowns-k8s-go
For applications deployed in orchestrated environments (e.g., Kubernetes), graceful handling of termination signals is crucial.
https://packagemain.tech/p/graceful-shutdowns-k8s-go
A wizard's journey through the technical inner workings of Kubernetes resource management
Chapter 1: How Kubernetes Requests and Limits Really Work
Chapter 2: How K8s CPU Requests and Limits Actually Work
Chapter 3: How Kubernetes Memory Requests and Limits Actually Work
Chapter 4: How K8s Eviction Works: Resource Management Gone Wrong
Chapter 1: How Kubernetes Requests and Limits Really Work
Chapter 2: How K8s CPU Requests and Limits Actually Work
Chapter 3: How Kubernetes Memory Requests and Limits Actually Work
Chapter 4: How K8s Eviction Works: Resource Management Gone Wrong
Pod Disruption In Kubernetes
https://dev.to/alpharm/pod-disruption-in-kubernetes-2cmb
In the world of Kubernetes, ensuring high availability of application during maintenance and upgrades can be a frustrating this has happened to me most times. As you scale and manage containerized applications, minimizing downtime and maintaining service continuity becomes a huge challenge especially when a simple human error can cause service disruption. This is where the concept of Pod Disruption Budgets (PDBs) comes into play, today we will dive deep into the fundamentals of Pod Disruption Budget explore how to implement them in your Kubernetes clusters.
https://dev.to/alpharm/pod-disruption-in-kubernetes-2cmb
Using mirrord for Local Development and Debugging
https://uthy.hashnode.dev/using-mirrord-for-local-development-and-debugging
https://uthy.hashnode.dev/using-mirrord-for-local-development-and-debugging
Understanding the Extension of Kubernetes APIs with Custom Resource Definition
https://alpharm.hashnode.dev/understanding-the-extension-of-kubernetes-apis-with-custom-resource-definition
https://alpharm.hashnode.dev/understanding-the-extension-of-kubernetes-apis-with-custom-resource-definition
Generate a custom type-safe Helm Chart construct with cdk8s
https://medium.com/@andrzejkomarnicki/generate-a-custom-type-safe-helm-chart-construct-with-cdk8s-88dd27f486c0
https://medium.com/@andrzejkomarnicki/generate-a-custom-type-safe-helm-chart-construct-with-cdk8s-88dd27f486c0
Autoscaling with Keda and Prometheus Using Custom Metrics in Go
https://medium.com/vakifbank-teknoloji/autoscaling-with-keda-and-prometheus-using-custom-metrics-in-go-558a64668fc4
https://medium.com/vakifbank-teknoloji/autoscaling-with-keda-and-prometheus-using-custom-metrics-in-go-558a64668fc4
namespace-configuration-operator
https://github.com/redhat-cop/namespace-configuration-operator
The namespace-configuration-operator helps keeping configurations related to Users, Groups and Namespaces aligned with one of more policies specified as a CRs
https://github.com/redhat-cop/namespace-configuration-operator