DevOps drawer
@DevOps101
395
subscribers
9
photos
2
files
9.17K
links
Curated DevOps resources from trustworthy sources.
Download Telegram
Join
DevOps drawer
395 subscribers
DevOps drawer
https://www.techrepublic.com/article/10-new-vm-escape-vulnerabilities-discovered-in-virtualbox/
TechRepublic
10 new VM escape vulnerabilities discovered in VirtualBox
While virtualization platforms are intended to provide full isolation between guest and host operating systems, VM escape vulnerabilities have seen increased scrutiny.
DevOps drawer
https://hackernoon.com/7-ways-to-do-containers-on-aws-532f812196f1
Hacker Noon
7 ways to do containers on AWS
Someone recently asked me about options and pros/cons of different ways to run containers on AWS. Once I was done explaining I thought it…
DevOps drawer
https://opensource.com/article/18/1/history-low-level-container-runtimes
Opensource.com
A history of low-level Linux container runtimes
"Container runtime" is an overloaded term.
DevOps drawer
https://codeengineered.com/blog/2018/kubernetes-change-feature-dev/
Codeengineered
A Shift In Kubernetes Feature Development
How the shift in new feature development impacts Kubernetes devs.
DevOps drawer
https://eng.lyft.com/announcing-cni-ipvlan-vpc-k8s-ipvlan-overlay-free-kubernetes-networking-in-aws-95191201476e
Medium
Announcing cni-ipvlan-vpc-k8s: IPvlan overlay-free Kubernetes Networking in AWS
Lyft is pleased to announce the initial open source release of our IPvlan-based CNI networking stack for running Kubernetes at scale in…
DevOps drawer
https://medium.com/devopslinks/announcing-eliot-container-platform-for-iot-devices-ad071e1917fd
Medium
Announcing Eliot — Container platform for IoT devices
I’m super excited to tell about project that I have been doing in my free time past months. Eliot is Docker and Kubernetes inspired…
DevOps drawer
https://www.weave.works/blog/cluster-monitoring-at-scale-on-aws
www.weave.works
Architecture Overview: Cluster Monitoring at Scale on AWS
Architecture Video: Cluster Monitoring at Scale on AWS
DevOps drawer
https://bloggeek.me/aws-deeplens-ai-vision/
BlogGeek.me
AWS DeepLens and the Future of AI Cameras and Vision • BlogGeek.me
AWS DeepLens is a new product for developers that is going to change the way we think and architect machine vision related applications.
DevOps drawer
https://blog.patricktriest.com/text-search-docker-elasticsearch/
Break | Better
Building a Full-Text Search App Using Docker and Elasticsearch
Adding fast, flexible full-text search to apps can be a challenge. In this tutorial, we'll walk through setting up a full-text search application using Docker, Elasticsearch, and 100 classic novels.
DevOps drawer
https://www.serverwatch.com/server-news/cisco-debuts-its-own-kubernetes-container-platform.html
Serverwatch
Cisco Debuts Its Own Kubernetes Container Platform
Even though Cisco has a partnership with Docker Inc, the IT giant sees a need for its own container platform to enable multicloud deployments.
DevOps drawer
https://clementc.github.io/blog/2018/01/25/moving_cli/
clementc.github.io
Clément Chastagnol ~ Moving efficiently in the CLI
A cheatsheet for moving efficiently in the CLI!
DevOps drawer
https://medium.com/ingeniouslysimple/deploying-kubernetes-applications-with-helm-81c9c931f9d3
Medium
Deploying Kubernetes applications with Helm
In our first Kubernetes blog post, we discussed what Kubernetes has to offer and why you might want to use it.
DevOps drawer
https://www.oreilly.com/ideas/finding-vulnerable-open-source-packages
O'Reilly Media
Finding vulnerable open source packages
When and how to test your application for open source vulnerabilities.
DevOps drawer
https://engineering.opsgenie.com/how-does-proportional-cpu-allocation-work-with-aws-lambda-41cd44da3cac
Medium
How does proportional CPU allocation work with AWS Lambda?
Find out how CPU time allocation works in AWS Lambda compared to Docker containers using Golang and Cgroups
DevOps drawer
https://engineering.tumblr.com/post/170040992289/how-i-review-code
cyle
How I review code
Reviewing code is one of the most important parts of an engineer's job at Tumblr, even more so than writing code. Our codebases are shared by hundreds of engineers, so it's critical to make sure we're...
DevOps drawer
https://jaxenter.com/set-continuous-integration-process-cloud-140328.html
JAXenter
How to set up a continuous integration process in the cloud - JAXenter
In this tutorial, Denis Kuniß explains how you can set up a continuous integration process to get a library into repositories like Maven Central or Bintray.
DevOps drawer
https://medium.com/meilleursagents-engineering/how-we-monitor-asynchronous-tasks-da25728173d6
Medium
How we monitor asynchronous tasks
In this post, I will walk you through how we monitor our celery workers. We use Bucky to collect metrics and push them into Graphite which…
DevOps drawer
https://dev.to/danielkun/kubernetes-its-alive-2ndc
The Practical Dev
Kubernetes: It's alive!
See how I built a few live experiments for Kubernetes to see how Kubernetes behaves in action - from load balancing to auto scaling.
DevOps drawer
https://www.enterpriseirregulars.com/124364/microservices-what-have-we-learned/
Enterprise Irregulars
Microservices – What have we learned ? - Enterprise Irregulars
Yesterday, I shared some of my thoughts on serverless architecture and ended up getting a lot of feedback and a lot of it went back to SOA and then logically on to Microservices. So I thought it may be worth penning some thoughts on this topic as well. Microservices…
DevOps drawer
https://www.digitalocean.com/community/tutorials/monitoring-for-distributed-and-microservices-deployments
Digitalocean
Monitoring for Distributed and Microservices Deployments | DigitalOcean
In this guide, we will take a look at how monitoring and metrics collection changes for highly distributed architectures and microservices. The growing popu…
DevOps drawer
https://www.hackread.com/most-threatening-dns-security-risks-how-to-avoid-them/
HackRead
Most Threatening DNS Security Risks And How To Avoid Them
The DNS or Domain Name System is one of the most necessary components for the internet functionality but how to protect it against attacks? Here's how.