Mastering Compute Efficiency: Dynamic GPU Partitioning Strategies for Kubernetes-Based ML Systems
https://yashmehra2411.medium.com/mastering-gpu-efficiency-dynamic-partitioning-strategies-for-kubernetes-based-ml-systems-75100c94112b
https://yashmehra2411.medium.com/mastering-gpu-efficiency-dynamic-partitioning-strategies-for-kubernetes-based-ml-systems-75100c94112b
Standardizing App Delivery with Flux and Generic Helm Charts
https://medium.com/@stefanprodan/standardizing-app-delivery-with-flux-and-generic-helm-charts-f66941f399e9
In this guide we will explore how Flux can be used to standardize the lifecycle management of applications by leveraging the Generic Helm Chart pattern.
The big promise of this pattern is that it should reduce the cognitive load on developers, as they only need to focus on the service-specific configuration, while the Generic Helm Chart shields them from the complexity of the Kubernetes API.
https://medium.com/@stefanprodan/standardizing-app-delivery-with-flux-and-generic-helm-charts-f66941f399e9
khronoscope
https://github.com/hoyle1974/khronoscope
Khronoscope is a tool inspired by k9s that allows you to inspect the state of your Kubernetes cluster and travel back in time to see its state at any point since you started the application using VCR like controls.
https://github.com/hoyle1974/khronoscope
kubectl-switch
https://github.com/mirceanton/kubectl-switch
kubectl-switch is a command-line tool for managing and switching between multiple Kubernetes configuration files located in the same directory. It simplifies the process of selecting a Kubernetes context from multiple kubeconfig files and updating the active configuration or namespace.
Just dump all your kubeconfigs into a single dir and let kubectl-switch manage them for you!
https://github.com/mirceanton/kubectl-switch
f2
https://github.com/ayoisaiah/f2
F2 is a cross-platform command-line tool for batch renaming files and directories quickly and safely. Written in Go!
https://github.com/ayoisaiah/f2
lnk
https://github.com/yarlson/lnk
Git-native dotfiles management that doesn't suck.
Move your dotfiles to ~/.config/lnk, symlink them back, and use Git like normal. Supports both common configurations and host-specific setups.
https://github.com/yarlson/lnk
Is There A Purpose In Assigning Incident Severity?
https://uptimelabs.io/is-there-a-purpose-in-assigning-incident-severity
https://uptimelabs.io/is-there-a-purpose-in-assigning-incident-severity
In defence of deployment freezes
https://thefridaydeploy.substack.com/p/in-defence-of-deployment-freezes
Many organizations have periods when they restrict deployments to production. You may find yourself working for one, so it's best to be prepared for it, and protect yourself from the downsides.
https://thefridaydeploy.substack.com/p/in-defence-of-deployment-freezes
Solving the Terraform Backend Chicken-and-Egg Problem
https://cloudchronicles.blog/blog/Solving-the-Terraform-Backend-Chicken-and-Egg-Problem
My preferred way to store Terraform state files is close to the provisioned infrastructure. In my case this is mostly Azure Blob Storage. This approach offers built-in benefits like RBAC, versioning, locking, and identity-based authentication, making it an excellent solution for state management at almost no cost.
However, there’s a catch: you need to create the storage account before Terraform can use it. This creates a chicken and egg problem - how do you provision the state storage using Terraform itself without manual steps or external scripts?
In this article, I’ll walk through a fully automated solution to deploy Terraform state storage in Azure Blob and import “self” state there, ensuring everything is managed declaratively from the start.
https://cloudchronicles.blog/blog/Solving-the-Terraform-Backend-Chicken-and-Egg-Problem
CI/CD Security: Using Checkov to enforce security with terraform
https://igorzhivilo.com/2025/02/11/checkov-ci
The purpose of this tutorial is to provide a solid starting point for enforcing security best practices in your Terraform scripts.
https://igorzhivilo.com/2025/02/11/checkov-ci
Terraform Modules Monorepo On GitLab
https://cloudchronicles.blog/blog/Terraform-Modules-Monorepo-On-GitLab
After several years of working with GitHub and Azure DevOps on a daily basis, using different tools feels counterintuitive to me. However, one of my clients is deeply integrated with GitLab. Since I was hired to resolve some issues, I saw this as the perfect opportunity to dive deep into GitLab CI and implement a robust, version-controlled approach that supports collaboration while maintaining security and documentation standards.
This guide presents an advanced implementation of a Terraform modules monorepo using GitLab, featuring automated versioning, security scanning, and documentation generation.
https://cloudchronicles.blog/blog/Terraform-Modules-Monorepo-On-GitLab
Steps to Break Up a Terralith
https://masterpoint.io/blog/steps-to-break-up-a-terralith
In this follow-up to our "What Is a Terralith?" article, we shift the focus from describing the problem to providing a detailed migration plan, practical guidance, and a handy checklist for breaking up a Terralith into smaller, more manageable root modules.
https://masterpoint.io/blog/steps-to-break-up-a-terralith
railpack
https://github.com/railwayapp/railpack
Railpack is a tool for building images from source code with minimal configuration. It is the successor to Nixpacks and incorporates many of the learnings from running Nixpacks in production at Railway for several years.
https://github.com/railwayapp/railpack
pgdog
https://github.com/pgdogdev/pgdog
PgDog is a transaction pooler and logical replication manager that can shard PostgreSQL. Written in Rust, PgDog is fast, secure and can manage hundreds of databases and hundreds of thousands of connections.
https://github.com/pgdogdev/pgdog
Unleashing the Power of k3s for Edge Computing: Deploying 3000+ in-store Kubernetes Clusters — Part 1
https://jysk.tech/unleashing-the-power-of-k3s-for-edge-computing-deploying-3000-in-store-kubernetes-clusters-part-77ecc5378d31
3000+ Clusters Part 2: The journey in edge compute with Talos Linux
https://jysk.tech/3000-clusters-part-2-the-journey-in-edge-compute-with-talos-linux-82f42bf9f958
https://jysk.tech/unleashing-the-power-of-k3s-for-edge-computing-deploying-3000-in-store-kubernetes-clusters-part-77ecc5378d31
3000+ Clusters Part 2: The journey in edge compute with Talos Linux
https://jysk.tech/3000-clusters-part-2-the-journey-in-edge-compute-with-talos-linux-82f42bf9f958
Vertical Pod Autoscaler (VPA): A Deep Dive - Part 1
https://erikzilinsky.com/posts/vpa1.html
In this post, I want to dive deep into VPA (version 1.3.0), explain why it could be useful for you, and provide a quick overview in the first section if you're short on time. This article mainly focuses on the Recommender component - I'll cover the other two in a future post.
https://erikzilinsky.com/posts/vpa1.html
OPA memory usage considerations and lessons from our transition to Kyverno
https://medium.com/adevinta-tech-blog/opa-memory-usage-considerations-and-lessons-from-our-transition-to-kyverno-bd23bd8a68bf
https://medium.com/adevinta-tech-blog/opa-memory-usage-considerations-and-lessons-from-our-transition-to-kyverno-bd23bd8a68bf
Kubernetes Best Practices I Wish I Had Known Before
https://www.pulumi.com/blog/kubernetes-best-practices-i-wish-i-had-known-before
1. Don't Skimp on Resource Requests and Limits
2. Namespace Like Your Life Depends on It
3. Avoid Running Multiple Containers in One Pod Unless Necessary
4. Use a Package Manager for Your YAML Files
5. Ingress and Networking Best Practices
6. Lean On Liveness, Readiness, and Startup Probes
7. Mind Your Security: RBAC, Pod Security, and Secrets
8. Monitor Everything (And Then Monitor Some More)
9. Automate Deployments with CI/CD
10. Keep Your Kubernetes Cluster and Components Updated
11. Use Labels and Annotations Wisely
12. Adopt a Multi-Environment Approach
13. Optimize Your Container Images
14. Implement a Reliable Logging Strategy
15. Treat Kubernetes Like Cattle, Not a Pet
16. Consider a Higher-Level Approach for Complex Deployments
17. Final Thoughts
https://www.pulumi.com/blog/kubernetes-best-practices-i-wish-i-had-known-before