⭐Masterclass
Stateful apps in Kubernetes. From history and fundamentals to operators
Stateful applications in Kubernetes require additional attention due to their need to persist data across instances and reboots, unlike stateless applications.
Backstage on Kubernetes
In this article, you'll learn how to integrate Backstage with Kubernetes, first by running Backstage outside the cluster using the Kubernetes API, and then deploying it directly on the cluster with the official Helm chart.
Manage secrets in AWS EKS with AWS Secrets Manager securely
AWS Secrets Manager integrates with EKS through the AWS Secrets and Configuration Provider (ASCP) for the Kubernetes Secrets Store CSI Driver.
Your guide to observability engineering in 2024
In 2024, an observability engineer's role is multifaceted, requiring expertise in data pipelines, system analysis, and troubleshooting to maintain and optimize complex, distributed systems.
The complete guide to serverless apps
While the term implies the absence of servers, it actually refers to a model where developers don't need to manage server infrastructure. Instead, the cloud provider handles server management
🔍Secret Knowledge
How Stripe’s Document Databases Supported 99.999% Uptime with Zero-Downtime Data Migrations
This reliability is largely due to their custom-built database infrastructure, called DocDB, which is an extension of MongoDB Community.
Anomaly Alerting in Prometheus
Using Prometheus with Istio, we can set up a generic anomaly detection system for response times that applies to all services running on a mesh.
The ROI of improving and investing in DORA
DORA Metrics provide a comprehensive view of your software team's performance, helping identify areas for improvement and measure the return on investment (ROI) of these enhancements.
AWS Managed KMS Keys and their Key Policies: Security Implications and Coverage for AWS Services
AWS Managed KMS Keys are encryption keys managed by AWS but used within your own AWS account, often applied as default keys for various services.
Attack Paths Into VMs in the Cloud
This post reviews how attackers might exploit VMs and offers strategies for organizations to secure their environments.
Unlock access to the largest independent learning library in Tech for FREE!
Get unlimited access to 7500+ expert-authored eBooks and video courses covering every tech area you can think of.
Renews at $19.99/month. Cancel anytime
⚡Techwave
Kubernetes History Inspector (KHI) visualizes cluster logs: by Google Cloud
Troy Hunt: Processing 23 Billion Rows of ALIEN TXTBASE Stealer Logs
Get insights from multimodal content with Amazon Bedrock Data Automation, now generally available
Optimizing incident management with AIOps using the Triangle System
New Cloud Trace features to troubleshoot latency and errors
🛠️Hackhub
SQLSync: collaborative offline-first wrapper around SQLite. It is designed to synchronize web application state between users, devices, and the edge.
lambda_helpers_metrics:A library that simplifies sending custom metrics to CloudWatch using EMF (Embedded Metric Format).
cloudysetup: Automate cloud environment setup using generative AI and AWS Cloud Control API.
kftray: A cross-platform system tray application for managing multiple kubectl port-forward commands, with support for UDP and proxy connections through k8s clusters
keycloak: Open Source Identity and Access Management For Modern Applications and Services
Cheers,
Shreyans Singh
Editor-in-Chief