For years the rule of thumb in Kubernetes land was “Don’t run your own DB!” Things have begun to change and this week we are going to look at a few of the options out there. Using a managed database service has always served us well but at Kubelist we always want to stay on top of the latest recommendations, and we think it’s totally acceptable to run databases (and other stateful services) in Kubernetes these days! 🏃🏽♀️
Software supply chain attacks are on the rise and making headlines almost every day. Luckily, there are many good tools available in the cloud native ecosystem to help secure your supply chain. I’m wondering what we’ll see in the upcoming KubeCon about this topic too! In the meantime, here are a few great links we’ve been reading lately to better understand what’s happening with these hacks.
Tune in to episode 16 of the Kubelist Podcast with Josh Dolitsky. Josh is a maintainer of the Open Container Initiative (OCI) project. There’s a surprising amount of cool work happening in this project that’s taking Docker registries and adding a pile of great new use cases on top.
We started and wrapped up Kubecon EU last week, and what a conference it was. Between virtual CTF (Capture The Flag) and great keynotes, there was a lot to take in and digest! In this week’s newsletter, we’re sharing some of our favorite moments from Kubecon. Make sure to let us know on Twitter if we missed anything!
On this week’s Kubelist Podcast we sit down with Evan Cordell from RedHat and chat about the past, present and future of the incubating Operator Framework project. For the newsletter, we’re going to take a deep dive into operators and how they fit in the Kubernetes ecosystem; and look at the challenges and tools associated with them. Make sure to checkout Operatorhub for a list of what's already out there!
Jim Bugwadia and Ritesh Patel from Nirmata joined me on episode 14 of The Kubelist Podcast to talk about Kyverno. This is another new CNCF Sandbox project, and Jim and Ritesh did a great job explaining the unique value proposition of Kyverno on the episode. If policy enforcement and simplifying some operations by using YAML is something you are looking at or working on, it might be good to give Kyverno a look.
On episode 13 of The Kubelist Podcast, I was joined by Tzury Bar Yochay and Justin Dorfman from Reblaze to talk about Curiefense. This project was added to the CNCF Sandbox recently, and is unique in the ecosystem. Curiefense is an Envoy-proxy based web application firewall that you can run in your own cluster. Give the podcast episode a listen today; Tzury and Justin do a great job explaining what a WAF is and how Curiefense operates. I’m excited to see more high quality security-focused projects in the CNCF ecosystem!
This week, we’re going to dive into some new Kubernetes 1.21 features, and see what’s the latest and greatest in the ecosystem. Bonus: Docker 1.20 is supported by kubeadm now! Let’s get going!
Let’s talk about Istio. Tune in to the podcast episode released today, where Craig Box from Google joined me to discuss the history and benefits of Istio. The conversation was really eye-opening, and helped me get a much better understanding of why Istio, and how Istio compares to other platforms. In this episode Craig also does a good job of demystifying Istio (if it’s a mystery to you). While Istio is not a CNCF project, I don’t feel like we are breaking our character of discussing projects in the CNCF ecosystem, because Istio works well with Kubernetes and is built on top of Envoy.
Recently, the CNCF TOC (Technical Oversight Committee) changed the requirements and application process in order to make it easier to get projects accepted into the Sandbox. This has been a welcome change as we’ve seen more projects than ever included earlier in their lifecycle. In this week’s issue, we are pointing to some of the new projects included in the Sandbox so far in 2021. This isn’t an exhaustive list of what’s been added, so check out the CNCF Site for the latest list (and subscribe to the Kubelist Podcast 😉).
It wasn’t that long ago (KubeCon 2018) that Open Policy Agent (OPA) was a Sandbox project, and now it's a CNCF graduate! OPA is a declarative policy system that has its own DSL; so you can control what/who can access not only your cluster but all of your cloud native resources. In this week's issue we dive into why OPA exists, what problems OPA tackles, and of course some real world experiences and gotchas using the ecosystem that has formed around it.
We’ve decided to go a little meta this week with the topic. Instead of diving into a specific area of Kubernetes or the CNCF projects, let’s take a minute to look at some of the other great newsletters and podcasts out there. We know how much work and how fun it is to produce a weekly show or newsletter, and every one of the resources on this list is just amazing. We are really proud of our own Kubelist Podcast and this weekly newsletter, but subscribe and listen to these also:
Sometimes you just want a local Kubernetes cluster on your laptop to use with development. Should you just enable the Kubernetes distribution that’s built into Docker? Or are there better options out there? In this week’s issue, we are sharing some links to posts and talks from people who have spent a lot of time solving this problem and are kind enough to share some advice. The tl;dr here is that there is no clear and obvious “best” cluster for local development, but if you are thinking about this problem, check out the links below for more data.
On today’s episode of the Kubelist Podcast, I had a conversation with Lee Mills and Matt Clarke from Spotify. Lee is the engineer manager working on the Backstage project, while Matt is a Sr Infrastructure Engineer. Backstage was recently donated to the CNCF as a Sandbox project. On the podcast, Lee and Matt explain the inspiration for Backstage and really help us understand the origins and direction of the project. Spoiler: it’s a pretty good idea and they’ve done a great job getting it off the ground. To keep the theme going this week, here are some of our favorite newer and older links about the Backstage project!
Today’s episode of the Kubelist Podcast is with Daniel Mangum from Upbound, discussing the Crossplane project. Crossplane is a Sandbox project that allows users to define Compositions of infrastructure and then deploy the infrastructure right alongside an application. This is a really cool approach to managing infrastructure as data. In this week’s newsletter, we share some links for getting started and stories from users using Crossplane.
Kubernetes has a built-in Kind called Secrets to store and pass sensitive configuration data to Pods. It’s popular – almost everyone running a cluster uses Secrets. Since it’s a Secret, it must be protected in a reasonable way by implementing best security practices, right? It can be, but it’s not always. It depends on the configuration of your cluster; and you shouldn’t assume that the defaults are the best settings from a security perspective.
In this issue, we share ways to understand and manage Kubernetes Secrets. Security isn’t binary, it’s a scale. You’ll have to make a decision about where you are comfortable on this scale, and our goal is to provide information to help you make that decision.
On today’s episode of the Kubelist Podcast I had a conversation with Dan (“Pop”) from Sysdig. Pop is the Lead of Opensource Ecosystem and Community, specifically Falco, but has been at Sysdig in various roles before finding his current role. He’s extremely knowledgeable and passionate about helping everyone run a secure cluster. If you aren’t already subscribed to his podcast, subscribe to the POPCAST and get ready for season 2.
Whether you are a Sysdig commercial customer or not, Falco is going to give you confidence in your cluster. Runtime security is important, and as mentioned in the podcast, “the kernel doesn’t lie”. Falco is connected to and listening to events where they occur (in the kernel) and you won’t find a better tool to detect unusual or insecure activity.
In this issue, we are sharing a few links and tutorials to help you run Falco, but this episode is the best explanation of the project possible.
Now that it’s become more common to run stateful workloads on Kubernetes, backup (and restore) starts to become more important. Remember that the scheduler can stop, move, restart and control the lifecycle of a component that has critical and irreplaceable data. To deal with this, it’s often recommended to choose a cloud-native database or stateful component that is built to operate in a Kubernetes environment. But even so, having a good and reliable backup stored outside of the cluster (or even the region) is at least a good idea, and possibly even a requirement to maintain SOC-2 compliance.
The good news is that there are several good tools that can handle backup and restore of data sitting inside a Kubernetes cluster. There’s a lot of overlap between these different utilities, but each has some nuances and specialities. In this issue of the newsletter, we’ve shared some of our favorite blog posts and articles comparing or walking through using Kubernetes-native backup and restore tools.
When running Kubernetes, the amount of YAML you’ll see on a daily basis is staggering. Joe Beda (one of the Kubernetes founders) recently joked about giving a talk titled “I’m sorry about the YAML”. While we can laugh about the amount of YAML, it is an error prone syntax, and it can be easy to make some mistakes. There are a few tools available to help validate and write your Kubernetes manifests. This week, we are looking at some of the methods of validating YAML before deploying, including Open Policy Agent, and a couple of utilities from Gareth Rushgrove. Hopefully the links below will help you see how to use these different tools to write production-grade Kubernetes manifests.
Richard Li from Ambassador Labs was on the Kubelist Podcast this week to discuss Telepresence, one of the first CNCF Sandbox projects. Telepresence makes sense for large teams to manage the cost of running many dev clusters better; but in this episode Richard explains how the project makes sense for small teams as well. The conversation about Telepresence 2.0 (rewritten in Go) is also great. Hopefully we get to see that version soon!
This week on the Kubelist Podcast, I had a conversation with Andreas Grabner from Dynatrace about the Keptn project. Keptn is a CNCF Sandbox project to orchestrate event-driven workflows, often for CI/CD tasks. In this issue, we’re sending some links to Keptn resources and a few other great podcast episodes from the PurePerformance podcast.
Every couple of months, the CNCF TOC (Technical Oversight Committee) meets to review outstanding Sandbox applications. As a result of the meeting last week, 7 new projects were added to the Sandbox. In this issue, we are taking a quick look at each of the new additions, and we hope to feature them all on the Kubelist podcast soon!
This week on the Kubelist Podcast, I had a conversation with William Morgan from Buoyant about the Linkerd project. The conversation ranged from the origins of Linkerd to some of the technical challenges of building it in Scala; and then Rust and Go.
Linkerd 2.9 is out this week – which William discusses, as well as explaining what’s changed. If you’re a Linkerd fan, or considering becoming one, listen to the podcast and check out the links below!
Most of us have kubectl installed on our laptops. Building on this, kubectl plugins are a simple and convenient way to package additional CLIs that depend on Kubernetes clusters. And with Krew (see today’s first link), we no longer need to package separate MacOS, Windows, and Linux binaries into homebrew, apt, rpm, snap, and other package managers. If you’ve shipped a CLI before, you know how difficult it is to keep it updated on everyone’s computer. If you haven’t, trust us, it’s difficult. Read on for some new links on creating and packaging a CLI and then delivering it to your Kubernetes users.
Flux is the original GitOps operator for Kubernetes. Back in episode 103, we focused on the ArgoCD project as an implementation of GitOps in Kubernetes. This week, we are diving into Flux, and featuring a new episode of the Kubelist Podcast with Michael Bridgen, one of the creators of the project. This issue of the Kubelist newsletter contains links to Flux tutorials, guides, and a few pages that explain the Flux v1 to Flux v2 transition.
This week on the Kubelist Podcast, we welcome Sunil James from Hewlett Packard Enterprise to chat about the SPIFFE and SPIRE projects. Sunil is one of the founders of Scytale, the company that brought SPIFFE into the CNCF, and has continued to work on it after being acquired by HPE. If you’re running microservices and are thinking about security and identity, check out the links in this issue to learn more about SPIFFE and SPIRE, and tune in to this week’s podcast episode!
This week on the Kubelist Podcast, we have a conversation with Ben Sigelman from LightStep about the OpenTelemetry project. This has us thinking about observability and collecting some good links we’ve been saving related to tracing, metrics, and logging using OpenTelemetry. On the podcast, Ben shares some thoughts on these “pillars of observability”.
If you are looking to up your observability game, dig in here and get started with OpenTelemetry. We tried to find the best links, but we know there are observability platforms that are integrated into OpenTelemetry that we didn’t have room to include here. This issue includes some of the best and most recent blog posts and tutorials available on OpenTelemetry.
This week, we’re taking a closer look at GitOps and the Argo project. Mukulika Kapas from Intuit joined the Kubelist podcast this week to discuss Argo and GitOps. Argo came out of a need at Intuit to manage clusters at scale. While the Argo project consists of four subprojects (Argo CD, Workflows, Events and Rollouts) the topic of this newsletter is GitOps, so we are focusing on the Argo CD subproject.
If you’re looking at GitOps now, or are using any of the available GitOps tools to manage CI/CD in your clusters, the links today should help you understand how others are implementing GitOps – and hopefully show you a few new tools!
We have exciting news to share today! In addition to the Kubelist weekly newsletter, we’ve started the Kubelist podcast! We’ve been enjoying sending you the Kubelist weekly newsletter (and that’s not stopping), but we wanted a way to go more in-depth on the CNCF ecosystem projects. The Kubelist podcast interviews maintainers of a CNCF project on each episode to discuss the origins and roadmap of the project. Each episode is a deep dive into a single project.
Give it a listen (and subscribe!). And while you are here, check out some of our other favorite podcasts!
How many years have you been running Kubernetes in production? Have you shared your lessons learned yet? This week, we gathered some stories about lessons learned after running Kubernetes in a year, in two years or in three years. There are similarities and common threads in these stories. Definitely a good read, and also some takeaways that might change how you run Kubernetes this year.
Hi again! This week, we decided to take a look at some of the lesser-known (at least we haven’t seen much discussion about them) special interest groups (SIGs) for Kubernetes. There are a lot of great SIGs, so instead of providing links to the popular repos, we focus on some that seem to be flying under the radar. If these are interesting to you, go digging around in kubernetes-sigs for more! We didn’t have enough room in this issue to share everything that we found!
If you are subscribing to Kubelist, you probably agree that containers have changed how we deploy software. A large enabler of containers was the creation of the Docker (now OCI) Registry. Container registries aren’t boring, and there are a lot of changes happening as the basic container registry grows into an OCI registry. This week, we take a close look at some interesting registry-related links.
This week, we are sharing some new Kubernetes 1.19 features and a great technical post from Monzo about self-hosting Kubernetes. Let’s not forget that KubeCon EU 2020 wrapped up, so we made sure to include a couple of good recap links if you weren’t able to attend. We’ll share the videos when they are published! ✔
As we build more Kubernetes-native applications and run more and more on Kubernetes, developers need to be able to have an environment that closely resembles production. This means Kubernetes for developers and Kubernetes-friendly development environments. This week, we are sharing a few of our favorite projects that help developers build for Kubernetes environments.
This week we’ll be focusing on the Zero Trust security model and how it applies to Kubernetes. This issue is split between blogs that explain what zero trust is, and hands-on practical tutorials and examples. Have your kubectl ready to go!
This week’s issue is full of technical blog posts and discussion of a couple of projects that are worth checking out. We can’t leave Open Service Mesh from Microsoft out, so we’ll start there. But we are really excited about some of the work happening to make the Kubernetes Scheduler more extensible and powerful. When reading these links about the scheduler, imagine how flexible a Kubernetes cluster of the future will be. 🔮
Not everyone using Kubernetes writes PodSpecs and thinks about Ingress controllers, PersistentVolumeClaims and other Kubernetes fundamentals. While that type of Kubernetes-native workload is fine for some users, many use cases don’t need to know the details of how a pod is scheduled. Kubernetes is a great platform to run “serverless” workloads on. The idea of delivering a function or other interface to run on a cluster is appealing. This week, we look at a couple of popular options, and some tutorials to get started with each of them.
Kubernetes 1.19 is expected to be released in the next couple of weeks. Today, we start out by sharing some of the 1.19 features and improvements that are exciting to us. We’ve also got a few links regarding some timely CNCF news about KubeCon and certifications.
A modern application is complex, and starting may require some specific sequencing. Maybe the database needs to be running before the API, or you need to provision TLS certs before starting a web server. It’s possible (recommended even) to make code changes to remove these hard sequencing dependencies, and this isn’t always easy or possible. So this week we're looking at built-in Kubernetes features that can be used to start up a complex application or upgrade, without using external coordination utilities.
The Kubernetes Dashboard and kubectl are both powerful tools, but are not the only ways to view and interact with your cluster. There are some powerful alternatives to these components that provide unique views and functionality. Dashboards in this category aren’t intended as a replacement for full and proper monitoring, but are incredibly useful to get a high level view of what’s running in the cluster. Kubectl can drive a cluster with its composable commands, but some other CLIs have more interactive views that can save time with some tasks. This week, we are sharing some of the kubectl alternatives and lightweight Kubernetes dashboards that you can install.
Kubernetes makes it easier to run different services in a single, shared cluster. This creates an opportunity for any service to disrupt and create outages in any other service or the entire cluster. When you have improperly configured services in a cluster, they will be subject to the various scheduling guarantees that Kubernetes offers. But Kubernetes does offer a solution here with built-in QoS Classes (Quality of Service) and LimitRanges. These features should be enabled and enforced in every cluster to keep your cluster healthy. This week, we’ve shared a few blog posts to help you understand these Kubernetes features and how to use them.
No Kubernetes migration is complete without a chaos engineering story. To successfully run a production system on Kubernetes without unexpected outages, everything should be horizontally scalable and resilient. In other words, expect restarts and other “problems”, code and design around them, and you’ll be successful. Chaos Engineering is the practice of running experiments on your cluster to see how well everything behaves. This week, we are looking at some blog posts and some tools to help you get started or to advance your Chaos Engineering practice.
This week, we’ve been thinking a lot about storage in Kubernetes. Storage is an extremely important, but also a very difficult capability to provide in a cluster. Doing so often means relying on external resources to create a reliable solution. There are some projects that let you run your cluster on EKS without EBS volumes, or to run a bare metal cluster that doesn’t come with any managed storage. This is a topic that we should check back in on more often, and we’d love to hear about other in-cluster storage solutions not listed here!
Instead, we’d like to create space to pause and reflect on the pain being felt in the United States and around the world. We know that a big part of what makes Kubernetes so special is its diverse and supportive community and we don’t want to distract from the voices that matter right now.
This week, we’ve been working to improve our application startup process so that it doesn’t receive traffic before it’s ready, and fails gracefully so that it can be restarted. These are all core features of a modern application, and Kubernetes supports this via Readiness Probes and Liveness Probes. But just because these are supported, doesn’t mean you necessarily should be using both of them. In this issue, we’ll cover the basics of the probes, when to use them, and more importantly, when not to.
As organizations of all sizes transition to Kubernetes, a lot has been written and shared about the journey. There are plenty of success stories and also many posts about mistakes and lessons learned. Whether you have already moved to Kubernetes or just starting out, there’s a lot to learn from these stories. This week’s issue is a collection of links that share some lessons that have been learned the hard way so that you can avoid making the same mistakes.
This isn’t the first time we’ve written an entire issue about security in Kubernetes. And it’s probably not the last time. The security landscape is constantly evolving and there’s a steady stream of best practices to implement and new attacks to protect against. Whether you are just starting to look at securing Kubernetes and the applications running on it, or want to catch up on some new info, the links here about applying security principles to Kubernetes should be interesting. Don’t stop at these 6 links though. Hopefully this inspires you to set a little time aside very soon to continue the research. 🛡️
Kubernetes has long been pigeonholed as a platform for stateless applications, however a new generation of Kubernetes-native stateful applications have been emerging. This is largely due to the introduction of the operator pattern that allows for stateful applications to be managed through automated operations. Once installed, these operators extend Kubernetes to allow built-in support for new, custom resources.
This week we wanted to showcase a few Kubernetes Operators that are built to run stateful services such as databases. Our goal is to showcase both the viability of running stateful workloads on Kubernetes and the evolution of the Operator pattern as more than just an installation tool.
As time goes on, we aren’t running out of new ways to bootstrap and install a Kubernetes cluster. We aren’t complaining though, the fact that there are so many options here is proof that this problem is not yet solved!
There are a lot of guides that talk about managing, reporting on, and lowering the costs of running Kubernetes clusters. This week, we share a set of links that all will have you thinking about optimizing the amount you are spending to run Kubernetes.
This week we take a look at three alternate Kubelets you can run or even build, and share some recent announcements.
A lot has happened in the world since our last issue, including some Kubernetes developments worth talking about. With everyone quarantined right now, it felt like a good time to send some recommended reading (and a video) your way.
Monitoring containers and clusters in Kubernetes is essential for ensuring the best performance in applications. This week’s issue will be focusing on the importance of Kubernetes monitoring and some issues that come with using monitoring tools for Kubernetes.
This week we’ll be investigating Kubernetes secrets, to discover the best and useful tips and tricks for any K8s developer. Warning ahead: There are Kubernetes Secrets found!
This week we’re looking into Kubernetes failures and incidents. As you might imagine, these issues can have a nasty impact for users, and where recovery plays the most critical role.
To avoid exploitation and the delivery of malicious bugs in Kubernetes, it is critical that your system is secure and containers are kept closed. Some of the most damaging attacks can lead to every pod and container to shut down and break. Security is vital, and that is what we will be looking at today.
Today, we’re opening common networking issues within Kubernetes. Let’s take a look at what Kubernetes Networking is dealing with, to specific issues within K8s. And solutions too.
We also are taking a look at Container to Container, Pod to Pod, and External to Services Networking!
Helm is a package manager tool used for Kubernetes. Known for managing complex apps and easy rollbacks, Helm is quite popular. These articles answer questions like “What is Helm? How do I use it?” Is it the best tool for Kubernetes? And of course, a Helm tweet.
Kubernetes has many things to offer when diving into it as a beginner. This week we look at a few in-depth Kubernetes related posts that include the environment, Docker, and Kustomize.
This week we also take a look into practicing with Kubernetes.
Entering the world of Kubernetes can be a bit scary at first, but hold on, buckle your seatbelt in and don’t be worried! Learning this open source software is quite interesting. This week we look at some posts that introduce Kubernetes and addresses the who, what, where, and why.
It’s amazing how much security content is produced in an around Kubernetes. This week we look at a few security-related posts but it's interesting to stop and consider where Kubernetes is in terms of supporting highly secure development workflows and production operations.
This week we also have a look at the ClusterAPI, Tooling and HAProxy 2!
This week we talk about security (pod security policies, TLS, honeypots), what’s new in the Kube with 1.15, and Apple joining the CNCF
Check it out!
This week we bring you articles on Kubernetes failure stories, managing permissions, and recovering from disasters with a few more goodies herein.
Kube sprawl is an interesting one, what incentivizes folks creating more and more clusters with more and more config on and on and on to power their Kubernetes journey? Some say it tenancy, Some say performance, read here to find out more.
This week we look at Kube sprawl, configurable HPA, Multi-Cloud clusters, Kube testing, and more.
Lots of cool outcomes from Kubecon EU: OpenTelemetry, Service Mesh Interface, ect.
We’ve collected a few recaps and some more around service meshes, the kube future, secrets, and scaling!
Actually not much in the way of spectacular content coming out of Kubecon yet - so maybe this is a part 1 of x.
Valero 1.0, Helm 3.0, Rook 1.0, OpenTelemetry!
Let's dive in and see what came out of Kubecon Europe and more!
Thank you to @CormacJHogan for your stateful take on things 😁.
Wonderful week in Kubernetes world on the eve of Kubecon Europe.
Hopefully, the following articles about newtype autoscaling, HA clusters, PKS, istio, and more get you super excited.
Welcome welcome to an exciting week in Kubernetes.
Notably, the continued hype of k3s and the release of Kubernetes Based Event Driven Autoscaling are quite exciting developments in the Kube community. This week we check up on those, get into some questions on YAML dependencies, Networking / Service Meshes, and more.
Hello, aren’t you excited that it is Kubecon Europe month?
This week we will pump you up with articles covering monitoring, resources, secrets, logging and more! Take your pick and really dig in to an area of the Kube that you find fascinating.
This week we return to regular schedule programming. An awesome week in Kubernetes land. The world of k8s is moving along. We found some juicy articles that you will want to sink your teeth in: Ingresses, Operating Systems, Migrations, and A N T H O S. Enjoy!
Today we are ending our series on Kubernetes Resources with a final part on Vertical Pod Autoscaling. We started the series looking at resources, what they were and how they were used and asked what autopilot for Kubernetes would look like? Are we there yet? How much effort will it be?
There are not that many resources on Vertical Pod Autoscaling, especially not its use in large scale production environments. But the material that is out there is great, check it out.
P.S. A little article on Helm included to spice things up.
Hello and welcome to the Horizontal Pod Autoscaling issue again!
There were soooo many great HPA articles that we had to do another. This time we are focusing on external and custom metrics, how to use them - why use them and more. There are a couple more goodies in here like Canary Analysis and how to be Overcommitted, the right way.
Read and enjoy!
Hello and welcome to the Horizontal Pod Autoscaling issue + Kubectl productivity!
This might actually be Horizontal Pod Autoscaling Issue part one because when we looked there were over 41 articles that were super cool to include. We put together articles that went beyond the standard fare of setting it up and using it from Control theory to Auto Scaling on Memory with JVM containers. Enjoy!
Hello and welcome to the second part of our series on Kubernetes resources!!
This week we bring you autoscaling all together, a bunch of articles on using the autoscaler (and related addons) together. This issue will serve as an intro to the history and practice of the autoscalers in general before we dive deep into each one.
P.s. Tweet back at us your guess about which autoscaler we are going to write about next.
We are starting a new series at Kubelist this week: Kubernetes Resources and Autoscaling. We are going to be taking a little break from aggregating new content and curate some lists based on things we think are important to know for Kubernetes. (If you're really hungry for the newest stuff check out: https://kube.news/ or @kubeweekly).
This week we bring you Resource Management from the basics to advanced. These articles answer: How are resources managed in Kubernetes? What is utilization? What is isolation? How do my pods get scheduled? Why do my pods get killed? And the essential wisdom of Kubernetes resource management: Always set resource and limits.
Kubernetes, you want to know what’s cool about you?
Well, there's lots. But one thing is the number of people who use you programmatically by writing code and using code. Whether it's operators or tooling, you’ve really captured our developer hearts.
P.s. If you haven’t already, check out the Kubernetes WG LTS Survey.
As Kubernetes matures more cost savings and optimization endeavors are popping up – and this will only grow with wider K8s adoption. Specifically in this issue we have K3s.io and KubeADM-AWS; in addition to some general K8s knowledge and a neat little kubectl plugin by the name of rakess. I welcome you to dive in and enjoy!
As Kubernetes and microservices reshape the landscape of modern computing, we’re seeing businesses placing big bets - especially in enterprise. Read on to find out how IBM and Intel are leveraging Kubernetes for hybrid integration and machine learning. We also have something to help businesses make sound decisions as they adopt Kubernetes, a really great tutorial for developers looking to start learning, and a glimpse at the future of CD pipelines.
That is not actually a question. You definitely have to config in Kubernetes. This week we have collected a bunch of recent articles on configuration management, security tooling, and more to help you think through your current kubernetes practice. A special treat this week is Lee Brigs. Why the fuck are we templating yaml? Which is well supplemented by background in The State of Kubernetes Configuration Management: An Unsolved Problem.
K8s is a great tool, but tools that make using K8s easier are even better. In this week's issue, we'll introduce a few tools that can improve your workflows for managing K8s resources and managing secrets. If you are feeling inspired by the end, the last article goes through how to write your own kubectl commands - so maybe you can write one too!
As our clusters grow in complexity and load, we start to question everything we thought we knew. Don't worry, we've got your back (and our own). This week we bring you some insights into scaling as you grow, a look inside of a truely large cluster, how to think about just hosted services, and finally, some great news from Apache Spark.
Kubernetes is meant to liberate and empower, not confuse and bog us down. Keep that in mind as you look go through this week's issue.
We want you to feel gr8 about your K8s all year long. As such, we've pulled together a collection of articles (and a podcast) to help you get your head in the game. Kubernetes is really fun (building operators), even when it fails... or at least when we get to learn from other peoples failures 🤷. We've also included some Istio learnin' to really help you level up.
Happy reading! (and listening, in this case)
Ch-ch-ch-ch-changes! This week’s batch of articles makes one thing clear: the rate of improvement, innovation, and continuous change in the Kubernetes community is nothing short of astonishing. This issue is a must-read to see what’s happening with security, discover tools for solving problems that most of us will have, and even learn how to make changes to Kubernetes itself. All aboard!
Ahoy! Today our love of the ocean and all things nautical is in full force. We apologize in advance if this issue heads into the depths of nautically inspired k8s talk. Be prepared for a whole new level of boat-themed puns.
We welcome you to 2019 with 'a year of kubelist', showcasing the most popular news and updates of 2018. If you haven’t read these yet, statistics says you should. They also say the following about Kubelist:
What a great year. We wish you the best in 2019.
You’re at home now for the holidays, all filled up from your trip to Kubecon. You’re quietly drinking eggnog and coffee mixed together contemplating what open source project you are going to work on for the next 12 days… a new controller to do that deployment thing you do 5 times a day, or perhaps contributing to the horizontal pod autoscaler? So many choices. Why don’t you take a break from your open source holiday anxiety and have a little read. We’ve got everything from AI to video games to an interview on the state of the Kube.
It's announcement season in the Kubernetes world, as KubeCon is the perfect time for companies to show off and gain exposure. We take a look at a number of things that caught our eye this week, while our secret agents were walking around the conference floor leaving Kubelist sticker trails behind them.
This week we found a few early Christmas presents under the tree that we're excited to share with you 🎄🎁.
New features from Microsoft along with some other tech influencers, cluster API stories, a bunch of awesome how to’s, and of course the greatest gift of all — version 1.13 of Kubernetes. Merry K8s-mas!
This week Envoy joins the ranks of Prometheus and Kubernetes as a CNCF Graduate. This is big and important news, but it's also a great excuse to link to Vitamin C.
As Envoy ventures out into post-graduation life, we take a look at why this newsletter will make you 173% more attractive as a job candidate. Enjoy! ☸️📈
There are many reasons to be thankful for kubernetes, but for the purposes of today's issue, we’ve narrowed it down to 6 reasons why we love this container-orchestration system 🙏
We hope you’re wearing your stretchy pants because we have 6 servings sure to please your K8s palate: cross cloud kubernetes, debunking common misunderstandings, container runtimes & more. Dig in!
The rise of K8s paved the way for more innovative ideas in enterprise infrastructure, for various fields. People are craving DevOps for Big Data. Some are using K8s to build a new OS for the age of AI, others are building awesome IoT Cloud services on K8s, while the rest are figuring out ways to improve enterprise K8s integration.
K8s-related acquisition alert 📣! VMware is now a proud owner of Heptio, and we’ve got the inside scoop on how it all went down.
We’ve also have 4 other tasty scoops for ya to help with managing configuration of clusters, saving money and improving reliability with cloud providers, implementing special load balancing with gRPC, and making CI/CD happen with Amazon EKS and Jenkins X!🍦
Well of course we had to mention this weeks HUGE acquisition. We don’t even need to say which one we’re talking about because we know that you know what we know 😉. Meanwhile, CFF was also making moves to get a little closer to CNCF. Oh, and while you’re here check out the new tools we found to help you step up your K8s game. (Spoiler alert. They include AWS Spot Instances & Gravity Cluster Cloning) 😯.
This week we'll enjoy a nice info-rimmed K8s cocktail made up of 1 oz of popular news, 2 oz of K8s-advice, and 1 oz of dev-support 🍹. It packs a punch, including dashes of why Google is adding efforts into making Spinnaker a better cloud deployment tool, why you should use Helm to manage K8s charts, and why Apache Kafka is great for fault tolerant storage. Cheers! 🎉
If nothing else, the kubernetes community is a content MACHINE 🤖. There is always something new to learn, and that’s why we go out and find neat things for you (and provide erudite summaries 😛). One of the best things about Kubernetes is that things are often also built on Kubernetes in order to use Kubernetes. Dig In!
Kubernetes has a lot of options, so many that you couldn’t possibly include them all in your own cluster without turning it into Mr. Potato Head. In this issue we look at a few lists of neat Kubernetes tools as well as best practices when it comes to implementing them, so you can keep your cluster’s ears on straight.
This issue we have a mix of tools and best practices that will keep you fueled up for the week. You might notice along the way that the kubelist editors finished writing this week's issue right before sitting down to eat.
This week the team at CNCF have been busy making improvements to our favorite container orchestrator. Below you'll find what you can expect from the updates, as well as some helpful tutorials for those who are struggling to implement a k8s admission webhook, or those who need a better tool for managing disaster recovery. Happy learning!
The perks of distributed systems come at a price — more complicated debugging and managing processes. That's why this week we’ve gathered a few tools for you to help track your k8s problems, find solutions, manage your microservices or clusters, and build merrily!