Introduction to Kubernetes Admission Controllers
https://pradeepl.com/blog/kubernetes/introduction-to-kubernetes-admission-controllers
https://pradeepl.com/blog/kubernetes/introduction-to-kubernetes-admission-controllers
Manage Secrets on Kubernetes with ArgoCD and Vault
https://piotrminkowski.com/2022/08/08/manage-secrets-on-kubernetes-with-argocd-and-vault
https://piotrminkowski.com/2022/08/08/manage-secrets-on-kubernetes-with-argocd-and-vault
Best Practices for Understanding Kubernetes Costs
https://medium.com/application-driven-infrastructure/best-practices-for-understanding-kubernetes-costs-f3c58a5e1ebf
https://medium.com/application-driven-infrastructure/best-practices-for-understanding-kubernetes-costs-f3c58a5e1ebf
Continuous Deployments of Kubernetes Applications using Argo CD GitOps & Helm Charts
https://faun.pub/continuous-deployments-of-kubernetes-applications-using-argo-cd-gitops-helm-charts-9df917caa2e4
https://faun.pub/continuous-deployments-of-kubernetes-applications-using-argo-cd-gitops-helm-charts-9df917caa2e4
kube-exec-controller
kube-exec-controller is an admission controller for handling container drift (caused by kubectl exec, attach, cp, or other interactive requests) inside a Kubernetes cluster.https://github.com/box/kube-exec-controller
linux-insides
A book-in-progress about the linux kernel and its insides.https://0xax.gitbooks.io/linux-insides/content
Become a Hashicorp Certified Terraform Associate - Preparation Guide
https://blog.kubesimplify.com/become-a-hashicorp-certified-terraform-associate-preparation-guide
https://blog.kubesimplify.com/become-a-hashicorp-certified-terraform-associate-preparation-guide
kubectl-count
kubectl-count uses the dynamic library to find server preferred resources and then leverages the informer mechanism to list and count resources by kind. You can show any kinds counts in kubernetes and group by namespaces.https://github.com/chenjiandongx/kubectl-count
How to extend terraform with direnv
https://medium.com/@senior-devops/how-to-extend-terraform-with-direnv-a4a3fef092c5
https://medium.com/@senior-devops/how-to-extend-terraform-with-direnv-a4a3fef092c5
security-profiles-operator
This project is the starting point for the Security Profiles Operator (SPO), an out-of-tree Kubernetes enhancement which aims to make it easier for users to use SELinux, seccomp and AppArmor in Kubernetes clusters.https://github.com/kubernetes-sigs/security-profiles-operator
Comprehensive IaC comparison: Terraform vs Pulumi vs CloudFormation
https://argonaut.hashnode.dev/comprehensive-iac-comparison-terraform-vs-pulumi-vs-cloudformation
https://argonaut.hashnode.dev/comprehensive-iac-comparison-terraform-vs-pulumi-vs-cloudformation
kube-secrets-init
The kube-secrets-init is a Kubernetes mutating admission webhook, that mutates any K8s Pod that is using specially prefixed environment variables, directly or from Kubernetes as Secret or ConfigMap.https://github.com/doitintl/kube-secrets-init
Terraform Resource Testing 101
Validate code quality with a Terraform plan using JSON and Pytesthttps://betterprogramming.pub/terraform-resource-testing-101-c9da424faaf3
kube2pulumi
Convert Kubernetes YAML to Pulumi programs in Go, TypeScript, Python, C# and Java. Improve your Kubernetes development experience by taking advantage of strong types, compilation errors, full IDE support for features like autocomplete. Declare and manage the infrastructure in any cloud in the same program that manages your Kubernetes resources.https://github.com/pulumi/kube2pulumi
Deep State: Extract Code and Resources From the Terraform State File
https://medium.com/bigpanda-engineering/deep-state-create-terraform-code-from-the-state-file-b64b3c924af3
https://medium.com/bigpanda-engineering/deep-state-create-terraform-code-from-the-state-file-b64b3c924af3
rds-logs-optimizer
https://medium.com/develeap/rds-logs-optimizer-dont-overpay-for-storing-your-logs-83a402d2dd44
RDS Logs Optimizer module is a solution that significantly reduces the cost of storing RDS database logs in AWS.https://github.com/develeap/rds-logs-optimizer
Instead of CloudWatch, the module provides an alternative in a Lambda serverless function that sources database logs from an RDS DB instance (facilitated with MariaDB Audit Plugin - suitable for MariaDB or MySQL only) and puts them into a designed S3 bucket, sorting them on a yearly, monthly, daily, and even hourly rate. Lambda is triggered 4 times an hour (every 15 minutes), lambda run timestamps being saved in a DynamoDB table so as to make sure that only the latest logs are sourced and no logs are lost in the process. Finally, the sorted logs can be easily queried using Athena.
As a result, thanks to the RDS Logs Optimizer module, the overall costs of sourcing, keeping, and querying RDS DB instance audit logs can be decreased approximately tenfold.
https://medium.com/develeap/rds-logs-optimizer-dont-overpay-for-storing-your-logs-83a402d2dd44
Terraform Tools: Comparing Terragrunt and Terraspace
https://nearform.hashnode.dev/terraform-tools-comparing-terragrunt-and-terraspace
https://nearform.hashnode.dev/terraform-tools-comparing-terragrunt-and-terraspace