A crash course on Terraform
Ramp up on Terraform in minutes via a lightning quick, hands-on crash course where you learn by doing.https://blog.gruntwork.io/a-crash-course-on-terraform-5add0d9ef9b4
Alerts, what are they good for?
https://medium.com/@tophatengblog/alerts-what-are-they-good-for-fe085e9ab4db
https://medium.com/@tophatengblog/alerts-what-are-they-good-for-fe085e9ab4db
Beware of depends_on for Terraform modules. It might bite you!
https://itnext.io/beware-of-depends-on-for-modules-it-might-bite-you-da4741caac70
https://itnext.io/beware-of-depends-on-for-modules-it-might-bite-you-da4741caac70
Amazon EKS IAM roles and policies with Terraform
https://cloudly.engineer/2022/amazon-eks-iam-roles-and-policies-with-terraform/aws
https://cloudly.engineer/2022/amazon-eks-iam-roles-and-policies-with-terraform/aws
terraform-diff
Terraform-diff helps you detect what Terraform projects have changed when changes are made to Terraform modules.https://github.com/contentful-labs/terraform-diff
What is eBPF, anyway, and why should Kubernetes admins care?
Discover the ins and outs of eBPF and why it is particularly exciting when it comes to observing your containers and Kubernetes clustershttps://www.groundcover.com/blog/what-is-ebpf
pixie
Pixie is an open-source observability tool for Kubernetes applications. Use Pixie to view the high-level state of your cluster (service maps, cluster resources, application traffic) and also drill down into more detailed views (pod state, flame graphs, individual full-body application requests).https://github.com/pixie-io/pixie
boopkit
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access.https://github.com/kris-nova/boopkit
kubectl-trace
Schedule bpftrace programs on your kubernetes cluster using the kubectlhttps://github.com/iovisor/kubectl-trace
Introducing workerd: the Open Source Workers runtime
https://blog.cloudflare.com/workerd-open-source-workers-runtime
https://blog.cloudflare.com/workerd-open-source-workers-runtime
tracee
Tracee is a Runtime Security and forensics tool for Linux. It uses Linux eBPF technology to trace your system and applications at runtime, and analyzes collected events in order to detect suspicious behavioral patterns. It is usually delivered as a docker container, but there are other ways you can use it (even create your own customized tracee container).https://github.com/aquasecurity/tracee
parseable
Parseable is an efficient and scalable log storage and management platform. Cloud native by design, Parseable ensures ease of deployment and use. It is compatible with standard logging agents like FluentBit, LogStash etc. With object storage as primary storage for Parseable, you get seamless scale and flexibility for ever growing log data. Parseable also offers a builtin, intuitive GUI for log query and analysis.https://github.com/parseablehq/parseable
Application Architecture: A Quick Guide for Startups
https://www.cockroachlabs.com/blog/startup-reference-architecture
https://www.cockroachlabs.com/blog/startup-reference-architecture
How To Read Flame Charts and Percentiles
https://medium.com/request-metrics/how-to-read-flame-charts-and-percentiles-fafa56024bbe
https://medium.com/request-metrics/how-to-read-flame-charts-and-percentiles-fafa56024bbe
kotal
Kotal operator is a cloud agnostic blockchain deployer that makes it super easy to deploy highly-available, self-managing, self-healing blockchain infrastructure (networks, nodes, storage clusters ...) on any cloud.https://github.com/kotalco/kotal
What You Need To Know To Debug A Preempted Pod On Kubernetes
https://medium.com/codex/what-you-need-to-know-to-debug-a-preempted-pod-on-kubernetes-1c956eec3f35
https://medium.com/codex/what-you-need-to-know-to-debug-a-preempted-pod-on-kubernetes-1c956eec3f35