Scaling Strategies on AWS EKS: Understanding HPA, VPA, and Cluster Autoscaler
https://towardsaws.com/scaling-strategies-on-aws-eks-understanding-hpa-vpa-and-cluster-autoscaler-12b88758d1d5
https://towardsaws.com/scaling-strategies-on-aws-eks-understanding-hpa-vpa-and-cluster-autoscaler-12b88758d1d5
Deploying a scalable STUN service in Kubernetes
https://medium.com/l7mp-technologies/deploying-a-scalable-stun-service-in-kubernetes-c7b9726fa41d
https://medium.com/l7mp-technologies/deploying-a-scalable-stun-service-in-kubernetes-c7b9726fa41d
Private kubernetes ingress with tailscale operator, cert-manager and external-dns
https://medium.com/@mattiaforc/zero-trust-kubernetes-ingress-with-tailscale-operator-cert-manager-and-external-dns-8f42272f8647
https://medium.com/@mattiaforc/zero-trust-kubernetes-ingress-with-tailscale-operator-cert-manager-and-external-dns-8f42272f8647
How to attach USB devices to Kubernetes pods using Akri
https://medium.com/@hampusc/how-to-attach-usb-devices-to-kubernetes-pods-using-akri-19fb70d41f1e
https://medium.com/@hampusc/how-to-attach-usb-devices-to-kubernetes-pods-using-akri-19fb70d41f1e
zeropod
https://github.com/ctrox/zeropod
Zeropod is a Kubernetes runtime (more specifically a containerd shim) that automatically checkpoints containers to disk after a certain amount of time of the last TCP connection. While in scaled down state, it will listen on the same port the application inside the container was listening on and will restore the container on the first incoming connection. Depending on the memory size of the checkpointed program this happens in tens to a few hundred milliseconds, virtually unnoticable to the user. As all the memory contents are stored to disk during checkpointing, all state of the application is restored.
https://github.com/ctrox/zeropod
AWS Controllers for Kubernetes
https://aws-controllers-k8s.github.io/community
Manage AWS services using Kubernetes
https://aws-controllers-k8s.github.io/community
1
helmper
https://github.com/ChristofferNissen/helmper
A little helper that pushes Helm Charts and images to your registries, easily configured with a declarative spec.
https://github.com/ChristofferNissen/helmper
contrast
https://github.com/edgelesssys/contrast
Contrast runs confidential container deployments on Kubernetes at scale.
https://github.com/edgelesssys/contrast
prom-analytics-proxy
https://github.com/nicolastakashi/prom-analytics-proxy
prom-analytics-proxy is a lightweight proxy application designed to sit between your Prometheus server and its clients. It provides valuable insights by collecting detailed analytics on PromQL queries, helping you understand query performance, resource usage, and overall system behavior. This can significantly improve observability for Prometheus users, providing actionable data to optimize query execution and infrastructure.
https://github.com/nicolastakashi/prom-analytics-proxy
cloudflare-ddns
https://github.com/aureum-cloud/cloudflare-ddns
Cloudflare DDNS is a Go application designed to update DNS records on Cloudflare according to your current public IPv4 and/or IPv6 addresses. It reads configuration from a JSON file, retrieves the current IP addresses, and updates DNS records as needed.
https://github.com/aureum-cloud/cloudflare-ddns
From Fragile to Faultless: Kubernetes Self-Healing In Practice
https://techblog.citystoragesystems.com/p/kubernetes-self-healing
Overcoming imperfections of managed Kubernetes with early self-healing.
https://techblog.citystoragesystems.com/p/kubernetes-self-healing
The trouble with Topology Aware Routing: Sacrificing reliability in the name of cost savings
P1: https://buoyant.io/blog/the-trouble-with-topology-aware-routing-sacrificing-reliability-to-avoid-cross-zone-traffic
P2: https://buoyant.io/blog/topology-aware-routing-introducing-high-availability-zone-aware-load-balancing
P1: https://buoyant.io/blog/the-trouble-with-topology-aware-routing-sacrificing-reliability-to-avoid-cross-zone-traffic
P2: https://buoyant.io/blog/topology-aware-routing-introducing-high-availability-zone-aware-load-balancing
Taming FluxCD HelmReleases: The Kustomize Way approach
https://dev.to/davinkevin/taming-fluxcd-helmreleases-the-kustomize-way-approach-48l8
https://dev.to/davinkevin/taming-fluxcd-helmreleases-the-kustomize-way-approach-48l8
Building Secure Kubernetes Environments, A Practical Guide to Network Policies
https://medium.com/@jdominguezc26/building-secure-kubernetes-environments-a-practical-guide-to-network-policies-3590f372ab2d
https://medium.com/@jdominguezc26/building-secure-kubernetes-environments-a-practical-guide-to-network-policies-3590f372ab2d
Mastering Kubernetes networking: A journey in cloud-native packet management
https://otterize.com/blog/mastering-kubernetes-networking-otterize-s-journey-in-cloud-native-packet-management
Master Kubernetes networking with a comprehensive packet walk, and learn how Otterize helps build adaptive Network Policies.
https://otterize.com/blog/mastering-kubernetes-networking-otterize-s-journey-in-cloud-native-packet-management
Bouncing Back: How to Fix Your StatefulSet After PVC Deletion Disaster
https://medium.com/@moty.fux/bouncing-back-how-to-fix-your-statefulset-after-pvc-deletion-disaster-d70f6ec1a92d
In this article, I’ll share our surprisingly simple recovery process after our StatefulSets lost their PVCs (volumes were still available on our cloud provider) due to an accidental deletion.
https://medium.com/@moty.fux/bouncing-back-how-to-fix-your-statefulset-after-pvc-deletion-disaster-d70f6ec1a92d
Kubernetes Webhook Admission Controller
https://itnext.io/kubernetes-webhook-admission-controller-3271d041c636
How to use k8s admission controller for authorize externally
https://itnext.io/kubernetes-webhook-admission-controller-3271d041c636
Advanced Network Observability – Supercharging Container Network Observability in Azure Kubernetes Service (AKS)
https://pixelrobots.co.uk/2024/06/advanced-network-observability-supercharging-container-network-observability-in-azure-kubernetes-service-aks
https://pixelrobots.co.uk/2024/06/advanced-network-observability-supercharging-container-network-observability-in-azure-kubernetes-service-aks
Scaling Kubernetes Pods Based on HTTP Traffic using KEDA HTTP Add-on
https://blog.raulnq.com/scaling-kubernetes-pods-based-on-http-traffic-using-keda-http-add-on
https://blog.raulnq.com/scaling-kubernetes-pods-based-on-http-traffic-using-keda-http-add-on
system-upgrade-controller
https://github.com/rancher/system-upgrade-controller
This project aims to provide a general-purpose, Kubernetes-native upgrade controller (for nodes). It introduces a new CRD, the Plan, for defining any and all of your upgrade policies/requirements. A Plan is an outstanding intent to mutate nodes in your cluster. For up-to-date details on defining a plan please review v1/types.go.
https://github.com/rancher/system-upgrade-controller