Overcoming the downsides of mutating webhooks: Our journey to an alternative
https://engineering.uipath.com/overcoming-the-downsides-of-mutating-webhooks-our-journey-to-an-alternative-5b0fbea83c59
UiPath Automation Suite has many services that communicate using FQDN (Fully Qualified Domain Name). As this suite operates on the premises of our customers, it provides them with the freedom to select their own FQDN. Often, the certificate required for their chosen FQDN is not signed by a known authority. To talk securely using the HTTPS protocol, all the services must trust the FQDN’s certificate. However, these services are owned by multiple teams. Asking each team to handle this individually is cumbersome and makes managing future certificate trust requests more challenging.
https://engineering.uipath.com/overcoming-the-downsides-of-mutating-webhooks-our-journey-to-an-alternative-5b0fbea83c59
Scaling Batch Jobs for Reliable and Efficient Processing
https://engineering.traderepublic.com/scaling-batch-jobs-for-reliable-and-efficient-processing-da6242cdb9f9
https://engineering.traderepublic.com/scaling-batch-jobs-for-reliable-and-efficient-processing-da6242cdb9f9
Optimizing Distributed Tracing with Jaeger DaemonSet: A Comprehensive Guide to Log Collection
https://medium.datadriveninvestor.com/optimizing-distributed-tracing-with-jaeger-daemonset-a-comprehensive-guide-to-log-collection-1963cebee37
https://medium.datadriveninvestor.com/optimizing-distributed-tracing-with-jaeger-daemonset-a-comprehensive-guide-to-log-collection-1963cebee37
Submariner Lighthouse: Multi-Cluster Service Discovery for Kubernetes
https://dev.to/reoring/submariner-lighthouse-multi-cluster-service-discovery-for-kubernetes-4fj7
https://dev.to/reoring/submariner-lighthouse-multi-cluster-service-discovery-for-kubernetes-4fj7
HAMi
https://github.com/Project-HAMi/HAMi
HAMi, formerly known as 'k8s-vGPU-scheduler', is a Heterogeneous device management middleware for Kubernetes. It can manage different types of heterogeneous devices (like GPU, NPU, etc.), share heterogeneous devices among pods, make better scheduling decisions based on topology of devices and scheduling policies.
https://github.com/Project-HAMi/HAMi
From Linux Primitives to Kubernetes Security Contexts
https://learnkube.com/security-contexts
In Kubernetes, containers typically start with root privileges.
This happens because, by default, container processes run as UID 0 unless overridden.
Kubernetes does not impose a non-root policy; it inherits whatever the image defines.
This isn't a bug, it's a design choice carried over from Docker.
While convenient during development, it introduces unnecessary risk in production environments.
If an attacker compromises the container, root access increases the likelihood of privilege escalation to the host.
The Kubernetes API offers several ways to restrict container privileges using the Security Context.
With it, you can control the user a container runs as, manage Linux capabilities, enforce read-only filesystems, and block privilege escalation.
However, despite its importance, Security Contexts are often misunderstood or misapplied.
Many teams discover these controls only after a security audit or scanner flags a running container.
The next steps are usually reactively patching the config, suppressing the warning and moving on.
Before we get into Kubernetes SecurityContexts, we need to understand what they're actually configuring under the hood.
https://learnkube.com/security-contexts
When PostgreSQL performance slows down, here is where to look first
https://stormatics.tech/blogs/when-postgresql-performance-slows-down-here-is-where-to-look-first
https://stormatics.tech/blogs/when-postgresql-performance-slows-down-here-is-where-to-look-first
Terraformer: Reverse Engineering Infrastructure as Code
https://blog.stackademic.com/terraformer-reverse-engineering-infrastructure-as-code-a4542ab44ba9
As infrastructure as code (IaC) becomes a foundational pillar of modern cloud-native and DevOps practices, tools that bridge the gap between existing infrastructure and code are increasingly valuable. One such powerful utility is Terraformer, an open-source tool developed by Google that helps users generate Terraform configurations from existing infrastructure resources. This article thoroughly explores Terraformer, including its architecture, use cases, benefits, challenges, and practical examples.
https://blog.stackademic.com/terraformer-reverse-engineering-infrastructure-as-code-a4542ab44ba9
Writing an internal Terraform provider from A to Z
https://medium.com/typeforms-engineering-blog/writing-an-internal-terraform-provider-from-a-to-z-c5704a5f584b
We recently wrote a Terraform provider for an internal API at Typeform. This allowed us to manage mutable runtime data stored in an API through source files, with good change control, and a nice developer experience. Some of the steps were a little tricky, or required us to trawl through documentation, and I thought to myself: “I hope this is easier next time we do it!”
https://medium.com/typeforms-engineering-blog/writing-an-internal-terraform-provider-from-a-to-z-c5704a5f584b
Modern Kubernetes: Can we replace Helm?
https://yokecd.github.io/blog/posts/helm-compatibility
For a long time, Kubernetes resource management has been synonymous with Helm.
There have been plenty of attempts to replace Helm and its templating miasma known as Charts. But those attempts never seem to stick, sometimes because they’re not different enough, or more often because the size and mass of the Helm ecosystem creates an inertia that’s hard to overcome.
This post explores how Yoke is trying to do the impossible: introducing Flights, a complete alternative to Helm Charts, while bringing Helm along for the ride.
https://yokecd.github.io/blog/posts/helm-compatibility
Hot-Patching Pods in Kubernetes 1.33: What Breaks, What Works, and How We’re Making It Usable
https://www.cloudbolt.io/blog/hot-patching-pods-in-kubernetes-1-33
https://www.cloudbolt.io/blog/hot-patching-pods-in-kubernetes-1-33
Complete Guide: Using Kubernetes Secrets Store CSI Driver with HashiCorp Vault
https://engineering.clearroute.io/complete-guide-using-kubernetes-secrets-store-csi-driver-with-hashicorp-vault-1a6d104e9e5b
https://engineering.clearroute.io/complete-guide-using-kubernetes-secrets-store-csi-driver-with-hashicorp-vault-1a6d104e9e5b
kubernetes-controller-sharding
Make Kubernetes controllers horizontally scalable by distributing reconciliation of API objects across multiple controller instances. Remove the limitation to have only a single active replica (leader) per controller.
https://github.com/timebertt/kubernetes-controller-sharding
Make Kubernetes controllers horizontally scalable by distributing reconciliation of API objects across multiple controller instances. Remove the limitation to have only a single active replica (leader) per controller.
https://github.com/timebertt/kubernetes-controller-sharding
Kwatcher
https://github.com/Berg-it/Kwatcher
Kwatcher is a Kubernetes operator that:
1. Automatically creates a ConfigMap from data fetched from an external URL using a secured Secret,
2. Periodically polls the URL (based on refreshInterval),
3. Updates the ConfigMap when the data changes,
4. And automatically triggers pod redeployment via annotations in the related Deployments.
https://github.com/Berg-it/Kwatcher
ctrlplane
https://github.com/ctrlplanedev/ctrlplane
A deployment orchestration tool that simplifies multi-cloud, multi-region, and multi-service deployments.
https://github.com/ctrlplanedev/ctrlplane
kubean
https://github.com/kubean-io/kubean
Product ready cluster lifecycle management toolchains based on kubespray and other cluster LCM engine.
https://github.com/kubean-io/kubean
docker-volume-backup
https://github.com/offen/docker-volume-backup
Backup Docker volumes locally or to any S3, WebDAV, Azure Blob Storage, Dropbox, Google Drive or SSH compatible storage
https://github.com/offen/docker-volume-backup
DockFlare
https://github.com/ChrispyBacon-dev/DockFlare
DockFlare is a powerful, self-hosted ingress controller that simplifies Cloudflare Tunnel and Zero Trust management. It uses Docker labels for automated configuration while providing a robust web UI for manual service definitions and policy overrides.
https://github.com/ChrispyBacon-dev/DockFlare
Termix
https://github.com/LukeGus/Termix
Termix is an open-source, forever-free, self-hosted all-in-one server management platform. It provides a web-based solution for managing your servers and infrastructure through a single, intuitive interface. Termix offers SSH terminal access, SSH tunneling capabilities, and remote file configuration editing, with many more tools to come.
https://github.com/LukeGus/Termix
arbok
https://github.com/mr-karan/arbok
Secure HTTP tunnels to localhost using WireGuard - Share your local dev server instantly
https://github.com/mr-karan/arbok