10
descheduler
https://github.com/kubernetes-sigs/descheduler
Scheduling in Kubernetes is the process of binding pending pods to nodes, and is performed by a component of Kubernetes called kube-scheduler. The scheduler's decisions, whether or where a pod can or can not be scheduled, are guided by its configurable policy which comprises of set of rules, called predicates and priorities. The scheduler's decisions are influenced by its view of a Kubernetes cluster at that point of time when a new pod appears for scheduling. As Kubernetes clusters are very dynamic and their state changes over time, there may be desire to move already running pods to some other nodes for various reasons:
- Some nodes are under or over utilized.
- The original scheduling decision does not hold true any more, as taints or labels are added to or removed from nodes, pod/node affinity requirements are not satisfied any more.
- Some nodes failed and their pods moved to other nodes.
- New nodes are added to clusters.
Consequently, there might be several pods scheduled on less desired nodes in a cluster. Descheduler, based on its policy, finds pods that can be moved and evicts them. Please note, in current implementation, descheduler does not schedule replacement of evicted pods but relies on the default scheduler for that.
https://github.com/kubernetes-sigs/descheduler
kubelet-csr-approver
https://github.com/postfinance/kubelet-csr-approver
Kubelet CSR approver is a Kubernetes controller whose sole purpose is to auto-approve kubelet-serving Certificate Signing Request (CSR), provided these CSRs comply with a series of configurable, provider-specific, checks/verifications.
https://github.com/postfinance/kubelet-csr-approver
murex
https://github.com/lmorg/murex
Murex is a shell, like bash / zsh / fish / etc however Murex supports improved features and an enhanced UX.
https://github.com/lmorg/murex
Why I Ditched Docker for Podman (And You Should Too)
https://codesmash.dev/why-i-ditched-docker-for-podman-and-you-should-too
I'm old enough to remember when Vagrant looked like a promised land where every development environment would look the same. Differences between language versions, as well as some unusual OS version differences, resulted in a few days of unproductive debugging of your development environment. I've had similar excitement when I started my first Docker Swarm (who uses that these days?!) - it felt revolutionary. Docker wasn't just a tool - it fundamentally changed how we thought about application development and deployment. Having a repeatable, separated environment from your local system was refreshing and looked like a superpower. It has become a must-have tool for every engineer. "Just Dockerize it" became my go-to solution for pretty much everything. Sure, architecture or defining a new Docker image could be a bit finicky at times, but hey, that's just how things worked. Is the persistent dockerd daemon eating upresources in the background with root privileges, just the price of doing business? I thought so.
https://codesmash.dev/why-i-ditched-docker-for-podman-and-you-should-too
17 Key Considerations Before Designing Terraform Modules
https://skundunotes.com/2025/07/25/17-key-considerations-before-designing-terraform-modules
https://skundunotes.com/2025/07/25/17-key-considerations-before-designing-terraform-modules
Observing Egress Traffic with Istio
https://medium.com/hamburger-berater-team/observing-egress-traffic-with-istio-0e1dd0e41d82
https://medium.com/hamburger-berater-team/observing-egress-traffic-with-istio-0e1dd0e41d82
How We Cut Our Azure Cloud Costs by 3x
https://igoryerm.medium.com/how-we-cut-our-azure-cloud-costs-by-3-solda-ais-experience-212de2fc0375
https://igoryerm.medium.com/how-we-cut-our-azure-cloud-costs-by-3-solda-ais-experience-212de2fc0375
Kubernetes 1.33: Resizing Pods Without the Drama (Finally!)
https://itnext.io/kubernetes-1-33-resizing-pods-without-the-drama-finally-88e4791be8d1
https://itnext.io/kubernetes-1-33-resizing-pods-without-the-drama-finally-88e4791be8d1
Mastering Kubernetes Security: A Deep Dive into SecurityContext
https://securitycontext-in-kubernetes.hashnode.dev/mastering-kubernetes-security-a-deep-dive-into-securitycontext
https://securitycontext-in-kubernetes.hashnode.dev/mastering-kubernetes-security-a-deep-dive-into-securitycontext
Securing Kubernetes Traffic with Calico Ingress Gateway
https://www.tigera.io/blog/securing-kubernetes-traffic-with-calico-ingress-gateway
https://www.tigera.io/blog/securing-kubernetes-traffic-with-calico-ingress-gateway
Is It Time to Migrate? A Practical Look at Kubernetes Ingress vs. Gateway API
https://www.tigera.io/blog/is-it-time-to-migrate-a-practical-look-at-kubernetes-ingress-vs-gateway-api
https://www.tigera.io/blog/is-it-time-to-migrate-a-practical-look-at-kubernetes-ingress-vs-gateway-api
Mastering Kubernetes StatefulSets: Expanding PVCs Without Downtime or GitOps Drift
https://medium.com/@simeonov1992/mastering-kubernetes-statefulsets-expanding-pvcs-without-downtime-or-gitops-drift-229f8913a307
https://medium.com/@simeonov1992/mastering-kubernetes-statefulsets-expanding-pvcs-without-downtime-or-gitops-drift-229f8913a307
criu
https://github.com/checkpoint-restore/criu
CRIU (stands for Checkpoint and Restore in Userspace) is a utility to checkpoint/restore Linux tasks.
Using this tool, you can freeze a running application (or part of it) and checkpoint it to a hard drive as a collection of files. You can then use the files to restore and run the application from the point it was frozen at. The distinctive feature of the CRIU project is that it is mainly implemented in user space. There are some more projects doing C/R for Linux, and so far CRIU appears to be the most feature-rich and up-to-date with the kernel.
CRIU project is (almost) the never-ending story, because we have to always keep up with the Linux kernel supporting checkpoint and restore for all the features it provides. Thus we're looking for contributors of all kinds -- feedback, bug reports, testing, coding, writing, etc. Please refer to CONTRIBUTING.md if you would like to get involved.
The project started as the way to do live migration for OpenVZ Linux containers, but later grew to more sophisticated and flexible tool. It is currently used by (integrated into) OpenVZ, LXC/LXD, Docker, and other software, project gets tremendous help from the community, and its packages are included into many Linux distributions.
https://github.com/checkpoint-restore/criu
kube-copilot
https://github.com/feiskyer/kube-copilot
Kubernetes Copilot powered by LLM, which leverages advanced language models to streamline and enhance Kubernetes cluster management. This tool integrates seamlessly with your existing Kubernetes setup, providing intelligent automation, diagnostics, and manifest generation capabilities. By utilizing the power of AI, Kubernetes Copilot simplifies complex operations and helps maintain the health and security of your Kubernetes workloads.
https://github.com/feiskyer/kube-copilot
mantis
https://github.com/augur-ai/mantis
Mantis is a next-generation Infrastructure as Code (IaC) tool that reimagines how we manage cloud and Kubernetes resources. Built as a fork of OpenTofu and powered by CUE, Mantis combines the best of Terraform and Helm while solving their limitations.
To manage cloud resources, Mantis compiles CUE configurations into Terraform compatible json and leverages the Opentofu engine to orchestrate it. To manage K8s resources, Mantis compiles CUE configurations yaml manifests which can be deployed either using mantis or via integrations with Gitops tools like ArgoCD or FluxCD
https://github.com/augur-ai/mantis
oras
https://github.com/oras-project/oras
OCI registry client - managing content like artifacts, images, packages
https://github.com/oras-project/oras