DevOps&SRE Library
17.8K subscribers
461 photos
4 videos
2 files
4.76K links
Библиотека статей по теме DevOps и SRE.

Реклама: @ostinostin
Контент: @mxssl

РКН: https://knd.gov.ru/license?id=67704b536aa9672b963777b3&registryType=bloggersPermission
Download Telegram
checkov

Checkov is a static code analysis tool for infrastructure as code (IaC) and also a software composition analysis (SCA) tool for images and open source packages.

It scans cloud infrastructure provisioned using Terraform, Terraform plan, Cloudformation, AWS SAM, Kubernetes, Helm charts, Kustomize, Dockerfile, Serverless, Bicep, OpenAPI or ARM Templates and detects security and compliance misconfigurations using graph-based scanning.


https://github.com/bridgecrewio/checkov
gh-copilot

GitHub Copilot in the CLI is an extension for GitHub CLI which provides a chat-like interface in the terminal that allows you to ask questions about the command line. You can ask Copilot in the CLI to suggest a command for your use case with gh copilot suggest, or to explain a command you're curious about with gh copilot explain.


https://github.com/github/gh-copilot
Load Shedding for High Traffic Systems

https://www.codereliant.io/load-shedding
Handling a Regional Outage: Comparing the Response From AWS, Azure and GCP

https://blog.pragmaticengineer.com/aws-azure-and-gcp-regional-outages
How to be on-call

I have been on-call for most of my career and led teams with on-call rotations, and have a lot of experience with the negative impact of on-call to my personal life and the lives of my colleagues. I’ve missed Christmas dinner (years later my Mom still brings it up), worked through weekends and nights, missed many kids’ events, and once juggled a fussy baby and an incident call at the same time. My goal is to make being on-call as sane as possible, balancing what the business needs with our collective personal lives.


https://hart-michael.medium.com/how-to-be-on-call-034e3a202729
Use of HTTPS Resource Records

Good news, everybody -- we have new DNS resource records! Well, not new new, but, you know, newish. You've probably heard of them, or even seen them actively in use, even though they moved from internet draft to formal RFC9460 adoption literally while I was working on this blog post during the last few weeks: the SVCB and HTTPS resource records.


https://www.netmeister.org/blog/https-rrs.html
teks

tEKS is a set of Terraform / Terragrunt modules designed to get you everything you need to run a production EKS cluster on AWS. It ships with sensible defaults, and add a lot of common addons with their configurations that work out of the box.


https://github.com/particuleio/teks
Terraform documentation made easy with terraform-docs

A complete guide to Terraform documentation with terraform-docs


https://medium.com/@akhilesh-mishra/terraform-documentation-made-easy-with-terraform-docs-096014b00ecf
tfprovidercheck

CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions, and check if disallowed providers aren't used


https://github.com/suzuki-shunsuke/tfprovidercheck
terraform-local

Terraform CLI wrapper to deploy your Terraform applications directly to LocalStack


https://github.com/localstack/terraform-local
liqo

Liqo is an open-source project that enables dynamic and seamless Kubernetes multi-cluster topologies, supporting heterogeneous on-premise, cloud and edge infrastructures.


https://github.com/liqotech/liqo
k8gb

A Global Service Load Balancing solution with a focus on having cloud native qualities and work natively in a Kubernetes context.


https://github.com/k8gb-io/k8gb
Organizing multiple Git identities

Here's a quick tip on how to manage multiple Git identities (e.g. personal, work, client1, client2).


https://garrit.xyz/posts/2023-10-13-organizing-multiple-git-identities
flagd

Flagd is a feature flag daemon with a Unix philosophy. Think of it as a ready-made, open source, OpenFeature-compliant feature flag backend system.


https://github.com/open-feature/flagd
Kubernetes And Kernel Panics

How Netflix’s Container Platform Connects Linux Kernel Panics to Kubernetes Pods


https://netflixtechblog.com/kubernetes-and-kernel-panics-ed620b9c6225
Terraform Security Best Practices

In this article we want to explain the benefits of using Terraform, and provide guidance for using Terraform in a secure way by reference to some security best practices.


https://sysdig.com/blog/terraform-security-best-practices
trivy-operator

The Trivy Operator leverages Trivy to continuously scan your Kubernetes cluster for security issues. The scans are summarised in security reports as Kubernetes Custom Resource Definitions, which become accessible through the Kubernetes API. The Operator does this by watching Kubernetes for state changes and automatically triggering security scans in response. For example, a vulnerability scan is initiated when a new Pod is created. This way, users can find and view the risks that relate to different resources in a Kubernetes-native way.


https://github.com/aquasecurity/trivy-operator