K8sQuest — A local, hands-on Kubernetes learning game with real-world troubleshooting challenges. Practice Pods, Deployments, Services, networking, storage, and debugging using kubectl on a local cluster (kind/k3d). No cloud required.
https://github.com/Manoj-engineer/k8squest
https://github.com/Manoj-engineer/k8squest
GitHub
GitHub - Manoj-engineer/k8squest: K8sQuest — A local, hands-on Kubernetes learning game with real-world troubleshooting challenges.…
K8sQuest — A local, hands-on Kubernetes learning game with real-world troubleshooting challenges. Practice Pods, Deployments, Services, networking, storage, and debugging using kubectl on a local c...
🔥14❤1
A good starting point for finding a Helm chart that is not officially provided by the vendor is the Community Helm Chart Repository.
https://github.com/trueforge-org/truecharts
https://github.com/trueforge-org/truecharts
GitHub
GitHub - trueforge-org/truecharts: Community Helm Chart Repository
Community Helm Chart Repository. Contribute to trueforge-org/truecharts development by creating an account on GitHub.
👍4❤1
As announced November 2025, Kubernetes will retire Ingress-NGINX in March 2026. Despite its widespread usage, Ingress-NGINX is full of surprising defaults and side effects that are probably present in your cluster today. This blog highlights these behaviors so that you can migrate away safely and make a conscious decision about which behaviors to keep. This post also compares Ingress-NGINX with Gateway API and shows you how to preserve Ingress-NGINX behavior in Gateway API. The recurring risk pattern in every section is the same: a seemingly correct translation can still cause outages if it does not consider Ingress-NGINX's quirks.
https://kubernetes.io/blog/2026/02/27/ingress-nginx-before-you-migrate/
https://kubernetes.io/blog/2026/02/27/ingress-nginx-before-you-migrate/
Kubernetes
Before You Migrate: Five Surprising Ingress-NGINX Behaviors You Need to Know
As announced November 2025, Kubernetes will retire Ingress-NGINX in March 2026. Despite its widespread usage, Ingress-NGINX is full of surprising defaults and side effects that are probably present in your cluster today. This blog highlights these behaviors…
👍5❤3
A utility for generating Mermaid diagrams from Terraform configurations
https://github.com/RoseSecurity/Terramaid
https://github.com/RoseSecurity/Terramaid
GitHub
GitHub - RoseSecurity/Terramaid: A utility for generating Mermaid diagrams from Terraform configurations
A utility for generating Mermaid diagrams from Terraform configurations - RoseSecurity/Terramaid
❤7👍2
Last week, I switched the default search in zsh (Ctrl+R) to fzf, and it’s working out pretty well.
https://github.com/junegunn/fzf
https://github.com/junegunn/fzf
GitHub
GitHub - junegunn/fzf: :cherry_blossom: A command-line fuzzy finder
:cherry_blossom: A command-line fuzzy finder. Contribute to junegunn/fzf development by creating an account on GitHub.
🔥10💯4
Although Ingress-Nginx is still maintained and receiving security updates (e.g. controller-v1.15.0), it's time to start migrating to the Gateway API. ingress2gateway can help with that.
👎3❤2🎉1
Please open Telegram to view this post
VIEW IN TELEGRAM
Amazon
Introducing account regional namespaces for Amazon S3 general purpose buckets | Amazon Web Services
AWS launches a new feature of Amazon S3 that lets you create general purpose buckets in your own account regional namespace simplifying bucket creation and management as your data storage needs grow in size and scope.
🔥6👏3
Looking for a hosting platform to practice with Linux, Kubernetes, etc.? Register using my referral link on DigitalOcean and get $200 in credit for 60 days. By registering through my referral link, you also support this Telegram channel.
👉 Register
👉 Register
👍6❤1
Short-lived public TLS certificates are our future, with a 46-day maximum validity by 2029.
https://knowledge.digicert.com/alerts/public-tls-certificates-199-day-validity
https://knowledge.digicert.com/alerts/public-tls-certificates-199-day-validity
😢6😱4💯2❤1
Container and file artifact promotion tooling for the Kubernetes project
https://github.com/kubernetes-sigs/promo-tools
https://github.com/kubernetes-sigs/promo-tools
GitHub
GitHub - kubernetes-sigs/promo-tools: Container and file artifact promotion tooling for the Kubernetes project
Container and file artifact promotion tooling for the Kubernetes project - kubernetes-sigs/promo-tools
❤2
---
What happened?
Attackers compromised the official
aquasecurity/trivy-action GitHub Action — the one people use to run Trivy vulnerability scans in CI/CD pipelines. This was disclosed today (March 20, 2026). It's the *second* Trivy-related supply chain attack this month — the first one hit the Trivy VS Code extension on OpenVSX, where injected code tried to abuse local AI coding agents.How did they do it?
The attacker force-pushed 75 out of 76 version tags in the
aquasecurity/trivy-action repository. So if your workflow references this action by a version tag like @0.34.2, @0.33.0, or @0.18.0 — you're running malicious code. The only tag that wasn't touched is @0.35.0.The tricky part: the malicious code runs *before* the real Trivy scan starts, so everything looks normal to the user.
What does the malware actually do?
It dumps the runner's process memory to grab secrets, harvests SSH keys, and steals credentials for AWS, GCP, Azure, and also Kubernetes service account tokens. Basically, it's an infostealer designed specifically for CI/CD environments.
How big is the blast radius?
Over 10,000 workflow files on GitHub reference this action, so potentially a lot of projects are affected. The compromised tags were still active at the time the article was written.
Key risks for you to think about:
Given your EKS and GitOps setup, here are the things I'd pay attention to:
1. K8s service account tokens leaked — if any of your CI pipelines use
trivy-action and have access to your EKS clusters, those tokens could be compromised. Rotate them.2. AWS credentials exposed — your IRSA roles, Secrets Manager access, anything the GitHub runner had in its environment could be stolen.
3. Tag pinning is not enough — this attack shows that even pinning to a specific version tag like
@0.33.0 doesn't protect you. Tags in Git can be force-pushed. The safe approach is to pin to a full commit SHA not a tag.4. Second attack in one month on the same tool — Trivy is popular, and attackers clearly see it as a high-value target. Worth thinking about whether your security scanning toolchain has a single point of failure.
What to do right now:
- Check if any of your GitHub Actions workflows reference
aquasecurity/trivy-action by tag (not by SHA).- If yes, treat your CI/CD secrets as compromised — rotate AWS keys, SSH keys, K8s tokens.
- Switch to referencing actions by commit SHA instead of version tag.
- Review your GitHub Actions workflow permissions — make sure you use least-privilege
permissions: blocks.This is a really good example of why "shift left security" needs to also include securing the security tools themselves. The scanner became the attack vector.
https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise
Please open Telegram to view this post
VIEW IN TELEGRAM
Socket
Trivy Under Attack Again: Widespread GitHub Actions Tag Comp...
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.
👍9❤6😱2
Good introduction for k8s Gateway API
https://www.youtube.com/watch?v=HLXyrQT8zV0
https://www.youtube.com/watch?v=HLXyrQT8zV0
YouTube
Mastering Kubernetes Gateway API: A Comprehensive Guide with Tutorial
Welcome to another insightful episode of "Is it Observable?" In today's video, we're taking a deep dive into the Kubernetes Gateway API, an exciting project that's revolutionizing how we manage network traffic within Kubernetes clusters. We'll start with…
👍2🔥1
Delivers efficient, stable, and secure data distribution and acceleration powered by P2P technology, with an optional content‑addressable filesystem that accelerates OCI container launch.
https://github.com/dragonflyoss/dragonfly
https://github.com/dragonflyoss/dragonfly
GitHub
GitHub - dragonflyoss/dragonfly: Delivers efficient, stable, and secure data distribution and acceleration powered by P2P technology…
Delivers efficient, stable, and secure data distribution and acceleration powered by P2P technology, with an optional content‑addressable filesystem that accelerates OCI container launch. - dragonf...
👍2👎1🔥1
⚡️ LocalStack archived its GitHub repo — what happened and what it means
On March 23, 2026, LocalStack archived localstack/localstack on GitHub (read-only) and consolidated everything into a single Docker image that requires an auth token — including in CI.
What changed:
- docker pull localstack/localstack:latest without LOCALSTACK_AUTH_TOKEN → your pipeline breaks
- Free "Hobby" plan exists but requires account creation and is non-commercial only
- Paid plans start at $39/mo
- CI needs a dedicated CI Auth Token stored in secrets
Your options:
- Pin to an older tag (e.g. 4.12) — works short-term, but you accumulate parity drift and unpatched CVEs
- Create a free account — enough for individual non-commercial dev
- Pay — if LocalStack is embedded in team CI
For open-source projects: LocalStack launched a separate program offering free Ultimate tier licenses (100+ AWS services, Cloud Pods, IAM enforcement) to eligible OSS projects with OSI-approved licenses.
https://blog.localstack.cloud/introducing-localstack-for-open-source/
On March 23, 2026, LocalStack archived localstack/localstack on GitHub (read-only) and consolidated everything into a single Docker image that requires an auth token — including in CI.
What changed:
- docker pull localstack/localstack:latest without LOCALSTACK_AUTH_TOKEN → your pipeline breaks
- Free "Hobby" plan exists but requires account creation and is non-commercial only
- Paid plans start at $39/mo
- CI needs a dedicated CI Auth Token stored in secrets
Your options:
- Pin to an older tag (e.g. 4.12) — works short-term, but you accumulate parity drift and unpatched CVEs
- Create a free account — enough for individual non-commercial dev
- Pay — if LocalStack is embedded in team CI
For open-source projects: LocalStack launched a separate program offering free Ultimate tier licenses (100+ AWS services, Cloud Pods, IAM enforcement) to eligible OSS projects with OSI-approved licenses.
https://blog.localstack.cloud/introducing-localstack-for-open-source/
Introducing the LocalStack for Open Source Program
The LocalStack for Open Source program offers free licenses of LocalStack for AWS and LocalStack for Snowflake to eligible community open source projects to help speed up their development and lower their costs.
😢7😱3❤1🤯1
DevOps & SRE notes
⚡️ LocalStack archived its GitHub repo — what happened and what it means On March 23, 2026, LocalStack archived localstack/localstack on GitHub (read-only) and consolidated everything into a single Docker image that requires an auth token — including in CI.…
It might become an alternative to LocalStack
Floci - Light, fluffy, and always free - AWS Local Emulator
https://github.com/hectorvent/floci
Floci - Light, fluffy, and always free - AWS Local Emulator
https://github.com/hectorvent/floci
GitHub
GitHub - hectorvent/floci: Light, fluffy, and always free - AWS Local Emulator
Light, fluffy, and always free - AWS Local Emulator - hectorvent/floci
❤🔥3🔥3❤2
Terragrunt is now v1!
This means that Terragrunt will no longer have any breaking changes in minor releases, with all future breaking changes taking place in (infrequent) future major releases.
https://github.com/gruntwork-io/terragrunt/releases/tag/v1.0.0
This means that Terragrunt will no longer have any breaking changes in minor releases, with all future breaking changes taking place in (infrequent) future major releases.
https://github.com/gruntwork-io/terragrunt/releases/tag/v1.0.0
GitHub
Release v1.0.0 · gruntwork-io/terragrunt
🎉 v1.0.0 Release
Terragrunt is now v1!
This means that Terragrunt will no longer have any breaking changes in minor releases, with all future breaking changes taking place in (infrequent) future ma...
Terragrunt is now v1!
This means that Terragrunt will no longer have any breaking changes in minor releases, with all future breaking changes taking place in (infrequent) future ma...
🔥8❤2
DevOps & SRE notes
Tech giants under attack by a Trivy-compromised GitHub action.
Cisco – More than 300 GitHub repositories were cloned during the incident, including source code for its AI-powered products, such as AI Assistants, AI Defense, and unreleased products. A portion of the stolen repositories allegedly belongs to corporate customers, including banks, BPOs, and US government agencies.
https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/
Cisco – More than 300 GitHub repositories were cloned during the incident, including source code for its AI-powered products, such as AI Assistants, AI Defense, and unreleased products. A portion of the stolen repositories allegedly belongs to corporate customers, including banks, BPOs, and US government agencies.
https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/
BleepingComputer
Cisco source code stolen in Trivy-linked dev environment breach
Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging to the company and its customers.
👏5