Today’s episode of the Kubelist Podcast is with Daniel Mangum from Upbound, discussing the Crossplane project. Crossplane is a Sandbox project that allows users to define Compositions of infrastructure and then deploy the infrastructure right alongside an application. This is a really cool approach to managing infrastructure as data. In this week’s newsletter, we share some links for getting started and stories from users using Crossplane.
Kubernetes has a built-in Kind called Secrets to store and pass sensitive configuration data to Pods. It’s popular – almost everyone running a cluster uses Secrets. Since it’s a Secret, it must be protected in a reasonable way by implementing best security practices, right? It can be, but it’s not always. It depends on the configuration of your cluster; and you shouldn’t assume that the defaults are the best settings from a security perspective.
In this issue, we share ways to understand and manage Kubernetes Secrets. Security isn’t binary, it’s a scale. You’ll have to make a decision about where you are comfortable on this scale, and our goal is to provide information to help you make that decision.
On today’s episode of the Kubelist Podcast I had a conversation with Dan (“Pop”) from Sysdig. Pop is the Lead of Opensource Ecosystem and Community, specifically Falco, but has been at Sysdig in various roles before finding his current role. He’s extremely knowledgeable and passionate about helping everyone run a secure cluster. If you aren’t already subscribed to his podcast, subscribe to the POPCAST and get ready for season 2.
Whether you are a Sysdig commercial customer or not, Falco is going to give you confidence in your cluster. Runtime security is important, and as mentioned in the podcast, “the kernel doesn’t lie”. Falco is connected to and listening to events where they occur (in the kernel) and you won’t find a better tool to detect unusual or insecure activity.
In this issue, we are sharing a few links and tutorials to help you run Falco, but this episode is the best explanation of the project possible.
Now that it’s become more common to run stateful workloads on Kubernetes, backup (and restore) starts to become more important. Remember that the scheduler can stop, move, restart and control the lifecycle of a component that has critical and irreplaceable data. To deal with this, it’s often recommended to choose a cloud-native database or stateful component that is built to operate in a Kubernetes environment. But even so, having a good and reliable backup stored outside of the cluster (or even the region) is at least a good idea, and possibly even a requirement to maintain SOC-2 compliance.
The good news is that there are several good tools that can handle backup and restore of data sitting inside a Kubernetes cluster. There’s a lot of overlap between these different utilities, but each has some nuances and specialities. In this issue of the newsletter, we’ve shared some of our favorite blog posts and articles comparing or walking through using Kubernetes-native backup and restore tools.
When running Kubernetes, the amount of YAML you’ll see on a daily basis is staggering. Joe Beda (one of the Kubernetes founders) recently joked about giving a talk titled “I’m sorry about the YAML”. While we can laugh about the amount of YAML, it is an error prone syntax, and it can be easy to make some mistakes. There are a few tools available to help validate and write your Kubernetes manifests. This week, we are looking at some of the methods of validating YAML before deploying, including Open Policy Agent, and a couple of utilities from Gareth Rushgrove. Hopefully the links below will help you see how to use these different tools to write production-grade Kubernetes manifests.
Richard Li from Ambassador Labs was on the Kubelist Podcast this week to discuss Telepresence, one of the first CNCF Sandbox projects. Telepresence makes sense for large teams to manage the cost of running many dev clusters better; but in this episode Richard explains how the project makes sense for small teams as well. The conversation about Telepresence 2.0 (rewritten in Go) is also great. Hopefully we get to see that version soon!
This week on the Kubelist Podcast, I had a conversation with Andreas Grabner from Dynatrace about the Keptn project. Keptn is a CNCF Sandbox project to orchestrate event-driven workflows, often for CI/CD tasks. In this issue, we’re sending some links to Keptn resources and a few other great podcast episodes from the PurePerformance podcast.
Every couple of months, the CNCF TOC (Technical Oversight Committee) meets to review outstanding Sandbox applications. As a result of the meeting last week, 7 new projects were added to the Sandbox. In this issue, we are taking a quick look at each of the new additions, and we hope to feature them all on the Kubelist podcast soon!
This week on the Kubelist Podcast, I had a conversation with William Morgan from Buoyant about the Linkerd project. The conversation ranged from the origins of Linkerd to some of the technical challenges of building it in Scala; and then Rust and Go.
Linkerd 2.9 is out this week – which William discusses, as well as explaining what’s changed. If you’re a Linkerd fan, or considering becoming one, listen to the podcast and check out the links below!
Most of us have kubectl installed on our laptops. Building on this, kubectl plugins are a simple and convenient way to package additional CLIs that depend on Kubernetes clusters. And with Krew (see today’s first link), we no longer need to package separate MacOS, Windows, and Linux binaries into homebrew, apt, rpm, snap, and other package managers. If you’ve shipped a CLI before, you know how difficult it is to keep it updated on everyone’s computer. If you haven’t, trust us, it’s difficult. Read on for some new links on creating and packaging a CLI and then delivering it to your Kubernetes users.
Flux is the original GitOps operator for Kubernetes. Back in episode 103, we focused on the ArgoCD project as an implementation of GitOps in Kubernetes. This week, we are diving into Flux, and featuring a new episode of the Kubelist Podcast with Michael Bridgen, one of the creators of the project. This issue of the Kubelist newsletter contains links to Flux tutorials, guides, and a few pages that explain the Flux v1 to Flux v2 transition.
This week on the Kubelist Podcast, we welcome Sunil James from Hewlett Packard Enterprise to chat about the SPIFFE and SPIRE projects. Sunil is one of the founders of Scytale, the company that brought SPIFFE into the CNCF, and has continued to work on it after being acquired by HPE. If you’re running microservices and are thinking about security and identity, check out the links in this issue to learn more about SPIFFE and SPIRE, and tune in to this week’s podcast episode!
This week on the Kubelist Podcast, we have a conversation with Ben Sigelman from LightStep about the OpenTelemetry project. This has us thinking about observability and collecting some good links we’ve been saving related to tracing, metrics, and logging using OpenTelemetry. On the podcast, Ben shares some thoughts on these “pillars of observability”.
If you are looking to up your observability game, dig in here and get started with OpenTelemetry. We tried to find the best links, but we know there are observability platforms that are integrated into OpenTelemetry that we didn’t have room to include here. This issue includes some of the best and most recent blog posts and tutorials available on OpenTelemetry.
This week, we’re taking a closer look at GitOps and the Argo project. Mukulika Kapas from Intuit joined the Kubelist podcast this week to discuss Argo and GitOps. Argo came out of a need at Intuit to manage clusters at scale. While the Argo project consists of four subprojects (Argo CD, Workflows, Events and Rollouts) the topic of this newsletter is GitOps, so we are focusing on the Argo CD subproject.
If you’re looking at GitOps now, or are using any of the available GitOps tools to manage CI/CD in your clusters, the links today should help you understand how others are implementing GitOps – and hopefully show you a few new tools!
We have exciting news to share today! In addition to the Kubelist weekly newsletter, we’ve started the Kubelist podcast! We’ve been enjoying sending you the Kubelist weekly newsletter (and that’s not stopping), but we wanted a way to go more in-depth on the CNCF ecosystem projects. The Kubelist podcast interviews maintainers of a CNCF project on each episode to discuss the origins and roadmap of the project. Each episode is a deep dive into a single project.
Give it a listen (and subscribe!). And while you are here, check out some of our other favorite podcasts!
How many years have you been running Kubernetes in production? Have you shared your lessons learned yet? This week, we gathered some stories about lessons learned after running Kubernetes in a year, in two years or in three years. There are similarities and common threads in these stories. Definitely a good read, and also some takeaways that might change how you run Kubernetes this year.
Hi again! This week, we decided to take a look at some of the lesser-known (at least we haven’t seen much discussion about them) special interest groups (SIGs) for Kubernetes. There are a lot of great SIGs, so instead of providing links to the popular repos, we focus on some that seem to be flying under the radar. If these are interesting to you, go digging around in kubernetes-sigs for more! We didn’t have enough room in this issue to share everything that we found!
If you are subscribing to Kubelist, you probably agree that containers have changed how we deploy software. A large enabler of containers was the creation of the Docker (now OCI) Registry. Container registries aren’t boring, and there are a lot of changes happening as the basic container registry grows into an OCI registry. This week, we take a close look at some interesting registry-related links.
This week, we are sharing some new Kubernetes 1.19 features and a great technical post from Monzo about self-hosting Kubernetes. Let’s not forget that KubeCon EU 2020 wrapped up, so we made sure to include a couple of good recap links if you weren’t able to attend. We’ll share the videos when they are published! ✔
As we build more Kubernetes-native applications and run more and more on Kubernetes, developers need to be able to have an environment that closely resembles production. This means Kubernetes for developers and Kubernetes-friendly development environments. This week, we are sharing a few of our favorite projects that help developers build for Kubernetes environments.
This week we’ll be focusing on the Zero Trust security model and how it applies to Kubernetes. This issue is split between blogs that explain what zero trust is, and hands-on practical tutorials and examples. Have your kubectl ready to go!
This week’s issue is full of technical blog posts and discussion of a couple of projects that are worth checking out. We can’t leave Open Service Mesh from Microsoft out, so we’ll start there. But we are really excited about some of the work happening to make the Kubernetes Scheduler more extensible and powerful. When reading these links about the scheduler, imagine how flexible a Kubernetes cluster of the future will be. 🔮
Not everyone using Kubernetes writes PodSpecs and thinks about Ingress controllers, PersistentVolumeClaims and other Kubernetes fundamentals. While that type of Kubernetes-native workload is fine for some users, many use cases don’t need to know the details of how a pod is scheduled. Kubernetes is a great platform to run “serverless” workloads on. The idea of delivering a function or other interface to run on a cluster is appealing. This week, we look at a couple of popular options, and some tutorials to get started with each of them.
Kubernetes 1.19 is expected to be released in the next couple of weeks. Today, we start out by sharing some of the 1.19 features and improvements that are exciting to us. We’ve also got a few links regarding some timely CNCF news about KubeCon and certifications.
A modern application is complex, and starting may require some specific sequencing. Maybe the database needs to be running before the API, or you need to provision TLS certs before starting a web server. It’s possible (recommended even) to make code changes to remove these hard sequencing dependencies, and this isn’t always easy or possible. So this week we're looking at built-in Kubernetes features that can be used to start up a complex application or upgrade, without using external coordination utilities.
The Kubernetes Dashboard and kubectl are both powerful tools, but are not the only ways to view and interact with your cluster. There are some powerful alternatives to these components that provide unique views and functionality. Dashboards in this category aren’t intended as a replacement for full and proper monitoring, but are incredibly useful to get a high level view of what’s running in the cluster. Kubectl can drive a cluster with its composable commands, but some other CLIs have more interactive views that can save time with some tasks. This week, we are sharing some of the kubectl alternatives and lightweight Kubernetes dashboards that you can install.
Kubernetes makes it easier to run different services in a single, shared cluster. This creates an opportunity for any service to disrupt and create outages in any other service or the entire cluster. When you have improperly configured services in a cluster, they will be subject to the various scheduling guarantees that Kubernetes offers. But Kubernetes does offer a solution here with built-in QoS Classes (Quality of Service) and LimitRanges. These features should be enabled and enforced in every cluster to keep your cluster healthy. This week, we’ve shared a few blog posts to help you understand these Kubernetes features and how to use them.
No Kubernetes migration is complete without a chaos engineering story. To successfully run a production system on Kubernetes without unexpected outages, everything should be horizontally scalable and resilient. In other words, expect restarts and other “problems”, code and design around them, and you’ll be successful. Chaos Engineering is the practice of running experiments on your cluster to see how well everything behaves. This week, we are looking at some blog posts and some tools to help you get started or to advance your Chaos Engineering practice.
This week, we’ve been thinking a lot about storage in Kubernetes. Storage is an extremely important, but also a very difficult capability to provide in a cluster. Doing so often means relying on external resources to create a reliable solution. There are some projects that let you run your cluster on EKS without EBS volumes, or to run a bare metal cluster that doesn’t come with any managed storage. This is a topic that we should check back in on more often, and we’d love to hear about other in-cluster storage solutions not listed here!
Instead, we’d like to create space to pause and reflect on the pain being felt in the United States and around the world. We know that a big part of what makes Kubernetes so special is its diverse and supportive community and we don’t want to distract from the voices that matter right now.
This week, we’ve been working to improve our application startup process so that it doesn’t receive traffic before it’s ready, and fails gracefully so that it can be restarted. These are all core features of a modern application, and Kubernetes supports this via Readiness Probes and Liveness Probes. But just because these are supported, doesn’t mean you necessarily should be using both of them. In this issue, we’ll cover the basics of the probes, when to use them, and more importantly, when not to.
As organizations of all sizes transition to Kubernetes, a lot has been written and shared about the journey. There are plenty of success stories and also many posts about mistakes and lessons learned. Whether you have already moved to Kubernetes or just starting out, there’s a lot to learn from these stories. This week’s issue is a collection of links that share some lessons that have been learned the hard way so that you can avoid making the same mistakes.
This isn’t the first time we’ve written an entire issue about security in Kubernetes. And it’s probably not the last time. The security landscape is constantly evolving and there’s a steady stream of best practices to implement and new attacks to protect against. Whether you are just starting to look at securing Kubernetes and the applications running on it, or want to catch up on some new info, the links here about applying security principles to Kubernetes should be interesting. Don’t stop at these 6 links though. Hopefully this inspires you to set a little time aside very soon to continue the research. 🛡️
Kubernetes has long been pigeonholed as a platform for stateless applications, however a new generation of Kubernetes-native stateful applications have been emerging. This is largely due to the introduction of the operator pattern that allows for stateful applications to be managed through automated operations. Once installed, these operators extend Kubernetes to allow built-in support for new, custom resources.
This week we wanted to showcase a few Kubernetes Operators that are built to run stateful services such as databases. Our goal is to showcase both the viability of running stateful workloads on Kubernetes and the evolution of the Operator pattern as more than just an installation tool.
As time goes on, we aren’t running out of new ways to bootstrap and install a Kubernetes cluster. We aren’t complaining though, the fact that there are so many options here is proof that this problem is not yet solved!
There are a lot of guides that talk about managing, reporting on, and lowering the costs of running Kubernetes clusters. This week, we share a set of links that all will have you thinking about optimizing the amount you are spending to run Kubernetes.
This week we take a look at three alternate Kubelets you can run or even build, and share some recent announcements.
A lot has happened in the world since our last issue, including some Kubernetes developments worth talking about. With everyone quarantined right now, it felt like a good time to send some recommended reading (and a video) your way.
Monitoring containers and clusters in Kubernetes is essential for ensuring the best performance in applications. This week’s issue will be focusing on the importance of Kubernetes monitoring and some issues that come with using monitoring tools for Kubernetes.
This week we’ll be investigating Kubernetes secrets, to discover the best and useful tips and tricks for any K8s developer. Warning ahead: There are Kubernetes Secrets found!
This week we’re looking into Kubernetes failures and incidents. As you might imagine, these issues can have a nasty impact for users, and where recovery plays the most critical role.
To avoid exploitation and the delivery of malicious bugs in Kubernetes, it is critical that your system is secure and containers are kept closed. Some of the most damaging attacks can lead to every pod and container to shut down and break. Security is vital, and that is what we will be looking at today.
Today, we’re opening common networking issues within Kubernetes. Let’s take a look at what Kubernetes Networking is dealing with, to specific issues within K8s. And solutions too.
We also are taking a look at Container to Container, Pod to Pod, and External to Services Networking!
Helm is a package manager tool used for Kubernetes. Known for managing complex apps and easy rollbacks, Helm is quite popular. These articles answer questions like “What is Helm? How do I use it?” Is it the best tool for Kubernetes? And of course, a Helm tweet.
Kubernetes has many things to offer when diving into it as a beginner. This week we look at a few in-depth Kubernetes related posts that include the environment, Docker, and Kustomize.
This week we also take a look into practicing with Kubernetes.
Entering the world of Kubernetes can be a bit scary at first, but hold on, buckle your seatbelt in and don’t be worried! Learning this open source software is quite interesting. This week we look at some posts that introduce Kubernetes and addresses the who, what, where, and why.
It’s amazing how much security content is produced in an around Kubernetes. This week we look at a few security-related posts but it's interesting to stop and consider where Kubernetes is in terms of supporting highly secure development workflows and production operations.
This week we also have a look at the ClusterAPI, Tooling and HAProxy 2!
This week we talk about security (pod security policies, TLS, honeypots), what’s new in the Kube with 1.15, and Apple joining the CNCF
Check it out!
This week we bring you articles on Kubernetes failure stories, managing permissions, and recovering from disasters with a few more goodies herein.
Kube sprawl is an interesting one, what incentivizes folks creating more and more clusters with more and more config on and on and on to power their Kubernetes journey? Some say it tenancy, Some say performance, read here to find out more.
This week we look at Kube sprawl, configurable HPA, Multi-Cloud clusters, Kube testing, and more.
Lots of cool outcomes from Kubecon EU: OpenTelemetry, Service Mesh Interface, ect.
We’ve collected a few recaps and some more around service meshes, the kube future, secrets, and scaling!
Actually not much in the way of spectacular content coming out of Kubecon yet - so maybe this is a part 1 of x.
Valero 1.0, Helm 3.0, Rook 1.0, OpenTelemetry!
Let's dive in and see what came out of Kubecon Europe and more!
Thank you to @CormacJHogan for your stateful take on things 😁.
Wonderful week in Kubernetes world on the eve of Kubecon Europe.
Hopefully, the following articles about newtype autoscaling, HA clusters, PKS, istio, and more get you super excited.
Welcome welcome to an exciting week in Kubernetes.
Notably, the continued hype of k3s and the release of Kubernetes Based Event Driven Autoscaling are quite exciting developments in the Kube community. This week we check up on those, get into some questions on YAML dependencies, Networking / Service Meshes, and more.
Hello, aren’t you excited that it is Kubecon Europe month?
This week we will pump you up with articles covering monitoring, resources, secrets, logging and more! Take your pick and really dig in to an area of the Kube that you find fascinating.
This week we return to regular schedule programming. An awesome week in Kubernetes land. The world of k8s is moving along. We found some juicy articles that you will want to sink your teeth in: Ingresses, Operating Systems, Migrations, and A N T H O S. Enjoy!
Today we are ending our series on Kubernetes Resources with a final part on Vertical Pod Autoscaling. We started the series looking at resources, what they were and how they were used and asked what autopilot for Kubernetes would look like? Are we there yet? How much effort will it be?
There are not that many resources on Vertical Pod Autoscaling, especially not its use in large scale production environments. But the material that is out there is great, check it out.
P.S. A little article on Helm included to spice things up.
Hello and welcome to the Horizontal Pod Autoscaling issue again!
There were soooo many great HPA articles that we had to do another. This time we are focusing on external and custom metrics, how to use them - why use them and more. There are a couple more goodies in here like Canary Analysis and how to be Overcommitted, the right way.
Read and enjoy!
Hello and welcome to the Horizontal Pod Autoscaling issue + Kubectl productivity!
This might actually be Horizontal Pod Autoscaling Issue part one because when we looked there were over 41 articles that were super cool to include. We put together articles that went beyond the standard fare of setting it up and using it from Control theory to Auto Scaling on Memory with JVM containers. Enjoy!
Hello and welcome to the second part of our series on Kubernetes resources!!
This week we bring you autoscaling all together, a bunch of articles on using the autoscaler (and related addons) together. This issue will serve as an intro to the history and practice of the autoscalers in general before we dive deep into each one.
P.s. Tweet back at us your guess about which autoscaler we are going to write about next.
We are starting a new series at Kubelist this week: Kubernetes Resources and Autoscaling. We are going to be taking a little break from aggregating new content and curate some lists based on things we think are important to know for Kubernetes. (If you're really hungry for the newest stuff check out: https://kube.news/ or @kubeweekly).
This week we bring you Resource Management from the basics to advanced. These articles answer: How are resources managed in Kubernetes? What is utilization? What is isolation? How do my pods get scheduled? Why do my pods get killed? And the essential wisdom of Kubernetes resource management: Always set resource and limits.
Kubernetes, you want to know what’s cool about you?
Well, there's lots. But one thing is the number of people who use you programmatically by writing code and using code. Whether it's operators or tooling, you’ve really captured our developer hearts.
P.s. If you haven’t already, check out the Kubernetes WG LTS Survey.
As Kubernetes matures more cost savings and optimization endeavors are popping up – and this will only grow with wider K8s adoption. Specifically in this issue we have K3s.io and KubeADM-AWS; in addition to some general K8s knowledge and a neat little kubectl plugin by the name of rakess. I welcome you to dive in and enjoy!
As Kubernetes and microservices reshape the landscape of modern computing, we’re seeing businesses placing big bets - especially in enterprise. Read on to find out how IBM and Intel are leveraging Kubernetes for hybrid integration and machine learning. We also have something to help businesses make sound decisions as they adopt Kubernetes, a really great tutorial for developers looking to start learning, and a glimpse at the future of CD pipelines.
That is not actually a question. You definitely have to config in Kubernetes. This week we have collected a bunch of recent articles on configuration management, security tooling, and more to help you think through your current kubernetes practice. A special treat this week is Lee Brigs. Why the fuck are we templating yaml? Which is well supplemented by background in The State of Kubernetes Configuration Management: An Unsolved Problem.
K8s is a great tool, but tools that make using K8s easier are even better. In this week's issue, we'll introduce a few tools that can improve your workflows for managing K8s resources and managing secrets. If you are feeling inspired by the end, the last article goes through how to write your own kubectl commands - so maybe you can write one too!
As our clusters grow in complexity and load, we start to question everything we thought we knew. Don't worry, we've got your back (and our own). This week we bring you some insights into scaling as you grow, a look inside of a truely large cluster, how to think about just hosted services, and finally, some great news from Apache Spark.
Kubernetes is meant to liberate and empower, not confuse and bog us down. Keep that in mind as you look go through this week's issue.
We want you to feel gr8 about your K8s all year long. As such, we've pulled together a collection of articles (and a podcast) to help you get your head in the game. Kubernetes is really fun (building operators), even when it fails... or at least when we get to learn from other peoples failures 🤷. We've also included some Istio learnin' to really help you level up.
Happy reading! (and listening, in this case)
Ch-ch-ch-ch-changes! This week’s batch of articles makes one thing clear: the rate of improvement, innovation, and continuous change in the Kubernetes community is nothing short of astonishing. This issue is a must-read to see what’s happening with security, discover tools for solving problems that most of us will have, and even learn how to make changes to Kubernetes itself. All aboard!
Ahoy! Today our love of the ocean and all things nautical is in full force. We apologize in advance if this issue heads into the depths of nautically inspired k8s talk. Be prepared for a whole new level of boat-themed puns.
We welcome you to 2019 with 'a year of kubelist', showcasing the most popular news and updates of 2018. If you haven’t read these yet, statistics says you should. They also say the following about Kubelist:
What a great year. We wish you the best in 2019.
You’re at home now for the holidays, all filled up from your trip to Kubecon. You’re quietly drinking eggnog and coffee mixed together contemplating what open source project you are going to work on for the next 12 days… a new controller to do that deployment thing you do 5 times a day, or perhaps contributing to the horizontal pod autoscaler? So many choices. Why don’t you take a break from your open source holiday anxiety and have a little read. We’ve got everything from AI to video games to an interview on the state of the Kube.
It's announcement season in the Kubernetes world, as KubeCon is the perfect time for companies to show off and gain exposure. We take a look at a number of things that caught our eye this week, while our secret agents were walking around the conference floor leaving Kubelist sticker trails behind them.
This week we found a few early Christmas presents under the tree that we're excited to share with you 🎄🎁.
New features from Microsoft along with some other tech influencers, cluster API stories, a bunch of awesome how to’s, and of course the greatest gift of all — version 1.13 of Kubernetes. Merry K8s-mas!
This week Envoy joins the ranks of Prometheus and Kubernetes as a CNCF Graduate. This is big and important news, but it's also a great excuse to link to Vitamin C.
As Envoy ventures out into post-graduation life, we take a look at why this newsletter will make you 173% more attractive as a job candidate. Enjoy! ☸️📈
There are many reasons to be thankful for kubernetes, but for the purposes of today's issue, we’ve narrowed it down to 6 reasons why we love this container-orchestration system 🙏
We hope you’re wearing your stretchy pants because we have 6 servings sure to please your K8s palate: cross cloud kubernetes, debunking common misunderstandings, container runtimes & more. Dig in!
The rise of K8s paved the way for more innovative ideas in enterprise infrastructure, for various fields. People are craving DevOps for Big Data. Some are using K8s to build a new OS for the age of AI, others are building awesome IoT Cloud services on K8s, while the rest are figuring out ways to improve enterprise K8s integration.
K8s-related acquisition alert 📣! VMware is now a proud owner of Heptio, and we’ve got the inside scoop on how it all went down.
We’ve also have 4 other tasty scoops for ya to help with managing configuration of clusters, saving money and improving reliability with cloud providers, implementing special load balancing with gRPC, and making CI/CD happen with Amazon EKS and Jenkins X!🍦
Well of course we had to mention this weeks HUGE acquisition. We don’t even need to say which one we’re talking about because we know that you know what we know 😉. Meanwhile, CFF was also making moves to get a little closer to CNCF. Oh, and while you’re here check out the new tools we found to help you step up your K8s game. (Spoiler alert. They include AWS Spot Instances & Gravity Cluster Cloning) 😯.
This week we'll enjoy a nice info-rimmed K8s cocktail made up of 1 oz of popular news, 2 oz of K8s-advice, and 1 oz of dev-support 🍹. It packs a punch, including dashes of why Google is adding efforts into making Spinnaker a better cloud deployment tool, why you should use Helm to manage K8s charts, and why Apache Kafka is great for fault tolerant storage. Cheers! 🎉
If nothing else, the kubernetes community is a content MACHINE 🤖. There is always something new to learn, and that’s why we go out and find neat things for you (and provide erudite summaries 😛). One of the best things about Kubernetes is that things are often also built on Kubernetes in order to use Kubernetes. Dig In!
Kubernetes has a lot of options, so many that you couldn’t possibly include them all in your own cluster without turning it into Mr. Potato Head. In this issue we look at a few lists of neat Kubernetes tools as well as best practices when it comes to implementing them, so you can keep your cluster’s ears on straight.
This issue we have a mix of tools and best practices that will keep you fueled up for the week. You might notice along the way that the kubelist editors finished writing this week's issue right before sitting down to eat.
This week the team at CNCF have been busy making improvements to our favorite container orchestrator. Below you'll find what you can expect from the updates, as well as some helpful tutorials for those who are struggling to implement a k8s admission webhook, or those who need a better tool for managing disaster recovery. Happy learning!
The perks of distributed systems come at a price — more complicated debugging and managing processes. That's why this week we’ve gathered a few tools for you to help track your k8s problems, find solutions, manage your microservices or clusters, and build merrily!
New to Docker or Kubernetes and finding yourself lost in the key concepts like containers, images, pods, and more? If this is you, we have a special set of intro's that'll give you a better understanding of k8s and how each part is made.
Already a k8s pro but a k8s code n00b? Keep an eye out for 'A tour into k8s's code'. Know plenty of kube, but confused when it comes to schedulers? Then be sure to read 'how kubernetes is transforming into a universal scheduler'.
Improve your Kubernetes self by digging into these great articles on controllers, workflow, affinities, aribtrate 😲, and a Magic Sandbox.
Welcome again to a super special entirely new but still the same issue of Kubelist! This week, our Editor-in-Chief went on shore to speak at Gophercon. But rest assured, our skippers didn't skip Kubelist day.
Welcome to a very special almost entirely new release announcements issue of kubelist! This week, we've got a handful of updates and new projects. For those of you that don't enjoy NEW PRODUCT BULLETINS we've also included a guide for installing kubernetes on bare metal and CentOS, and a way to use Helm without actually using Helm. Enjoy!
Welcome to a truely special issue 27 of kubelist! This week, we get meaty with networking, pentest our own cluster, and try and understand why this blockchain thing needs servers. Plus, we peek behind the curtain, and reveal a bit more about the kubelist mythos.
This issue is very special, like all the others. This week we learn the dark and terrible secret hiding within every Target store (it's stateful applications!). If you look closely within one of the other posts, you'll find details of a similar setup for Chick-fil-A, too! It's a treasure hunt for your mind and eyeballs!
Welcome to a very special RBAC double-shot edition of kubelist. In addition to RBAC, we've got bare metal networking, for those of you that avoid the cloud (or build your own!), and end to the vicious Kubernetes vs Docker debate (?), and cake! Yes, cake. Well, StatusCake; you can't eat it 😢.
Welcome to a very special not entirely Google news issue of kubelist! This week, the kubelist editors worked very hard to include information that didn't come from Google Cloud Next '18. We think we did pretty good! While you enjoy this batch of links, we'll be patting ourselves on the back.
Welcome to a special security issue of kubelist. This week's issue is loaded with good security information for your control plane, your workloads, your applications, your mind, your body, and your soul. Most importantly, and very rare for our industry, is that there's zero fear mongering or scare tactics! So read up, learn, and feel good.
Welcome to a very special post-apocalyptic theme park issue of kubelist! This week, we've got high octane tweets, high rev tooling, a theme park, and a migration story with more rises and drops than the roller coaster you rode at this year's KubeCon EU party! Please keep your hands and feet inside the newsletter at all times.
Welcome to an extra special birth of a nation issue of kubelist. This week, we celebrate American Independence Day, and Canada Day. And what better way to celebrate these holidays (besides with fireworks) than Kuberentes news? This week's news ends our streak of managed Kubernetes releases; collect the winnings from any bets you placed.
Welcome to a very special multiple versioned issue of kubelist! No, we're not A/B testing the content; we're just unreasonably excited about multiple version support for custom resource definitions in Kubernetes 1.11. A new release of Kubernetes isn't the only release this week, as we see another entrant into the managed Kubernetes game. Will we continue our now 3 issue strong streak of managed Kubernetes announcements next week? Time will tell!
Welcome to a very special first day of summer binge watching edition of kubelist!
At kubelist, we know there's no better way to beat the heat and long days that come along with summer than snuggling up indoors under a blanket and binge watching a full show. Close those blinds, crawl under your quilt made of old conference t-shirts, and enjoy this week's content!
Welcome to a very special follow-up happy birthday edition of kubelist! This week, AKS celebrates its 0th GA birthday, we look at some visualizations that would be perfect for the command station of your space cruiser, and we return to an old favorite: fear mongering about crypto hackers!
Welcome to a super special birthday edition of kubelist!
This week, we're celebrating two birthdays: The 4th birthday of Kubernetes, and the 0th birthday of Amazon's Elastic Container Service. To celebrate, kubelist is serving you up delicious virtual slices of pound cake with real buttercream frosting, topped with link sprinkles (linkles)! Enjoy!