Kubecost is a project we have been keeping our eye on for some time – and with the launch of their new project, Opencost, we thought it was a great time to bring Webb Brown on the podcast to chat. We covered a whole range of topics and highly suggest you check out the show. For this week’s newsletter we are going to focus on understanding where your bills are coming from and specifically how kubecost helps figure that out. 🤑
With KubeCon EU wrapped up, we wanted to turn our attention to some work happening in K8s, best practices, along with some of the newer Sandbox projects. Hope everyone who participated in Valencia has traveled safely back home, and has a lot of new ideas to work with! 💡
In the lead up to KubeCon we find ourselves with a new release of Kubernetes! Congrats and a big thank you to everyone who worked hard to create and ship Kubernetes 1.24 over the past few months. Stay tuned as the major distros are probably all working hard to get 1.24 support added as soon as possible so we can all easily try out the latest bits! With the first release of 2022, we are focusing this issue on some of the new changes that are out, and trying to help you stay up to date! 🗓️
We had the pleasure of bringing Tim Hockin on the show to talk about a wide range of topics. As some of you know Tim is an early contributor and co-founder of kubernetes. Tim has been helping to guide our community over the last 6 years. In this week’s newsletter we are gonna dive into some of the topics that we discussed on the podcast.
Keeping your clusters up to date can bring you security and stability but also a whole lot of anxiety. Good cluster hygiene is a must in k8s world but there are a whole lot of challenges with patching and upgrading the thing that runs your production systems! In this week’s issue we are going to go through some sane paths and good tips on how to upgrade Kubernetes safely.
Security is always on the top of our minds, but with recent world events the importance of hardening our own infrastructure has been put front and center. Today, we wanted to share some guidelines and benchmarks that you can use when trying to figure out if you’ve implemented the industry best practices in your clusters. So here we go, let’s talk about the best practices in securing a Kubernetes cluster.
The schedule for Kubecon EU is out and there’s a lot of interesting and insightful talks to uncover. By no means is this exhaustive, but we are going to highlight a few talks we will be watching and hopefully attending. There is sooo much here, so feel free to tweet @ us about other talks you think we should have on our radar. It’s kid in a candy store time! 🍭
Today we have a new episode of the podcast out with Nick Santos from Tilt. Tilt is a developer tool to make it easier to develop a modern application that’s based on microservices and most likely Kubernetes. The conversation ranged from the origin story of Tilt to where the CNCF and great ecosystem is headed. It was both fun and informative and generally a great chat! 🎙️
Apparently someone hired Martin Scorsese to make a documentary about Kubernetes, and it’s the talk of the town. So that part about Scorsese is a joke, but it’s really well done and worth the watch, if you wanna know how k8s got off the ground and challenges it faced along the way. As your weekly resource for all things k8s / CNCF we had to make sure it was on everyone’s radar! This week we are gonna highlight some of the stars of the documentary and take stock of how far we have all come as a community! ⭐
On this week’s episode of the Kubelist podcast, Jake Moshenko and Jimmy Zelinskie from Authzed joined us to discuss SpiceDB, their open source implementation of the Zanzibar project. Listen to this episode if you are thinking about adding a robust authorization feature to your app, or if you have one that’s a little painful to maintain. Jake and Jimmy have clearly been thinking a lot about this problem! 🎧
We wanted to use this week’s newsletter to dive deeper into GitOps and why it has become a standard practice especially in the CNCF world. I’m sure most of you have heard the term and many of you implement or use aspects of it daily, but we are going to examine when it came about, best practices around it and some tangible examples that you might be able to apply to your everyday processes.
It’s been a while since we’ve dug into Helm! Since the Helm team just shipped 3.8.0, it’s time to dedicate another Kubelist newsletter to this project. Helm is now a graduated project, and is one of (if not the top) most popular ways to consume OSS applications in Kubernetes. You know Helm, so let’s just dig into this week’s links! 🎓
On this week’s episode of the Kubelist podcast, we talked with Michelle Nguyen and Natalie Serrino from CNCF sandbox project Pixie. They taught us all about eBPF and the codeless observability Pixie brings to a cluster. Pixie was so impressive that the day after recording this we implemented Pixie on our clusters and haven’t looked back! I know I say this every time but I learned so much and was just blown away by their product, a must listen episode! Let’s go on to the newsletter links! We are going to focus on observability / telemetry and how to gather those things with an eBPF bias for this week, let’s dig in.
Another year, another TOC meeting, and more projects to look at! We skipped the sandbox inclusion episode near the end of 2021, so we have a lot to talk about this time. In the most recent TOC Sandbox inclusion meeting, only one project was added, but there are a few other interesting projects looking to find the right place. We have everything in this issue from dev environments, production systems, and a new eBPF project!
Welcome back, and welcome to 2022! To kick off the new year, we thought we could share some news, blog posts, and projects related to protecting your cluster from ransomware.
Holiday break is upon us, eggnog, family time, escaping to your computer to do some “work”, it’s that time of year again! We thought we would take this opportunity to highlight a few fun projects that will give you that needed distraction but also might bring some value to your downtime and definitely a smile.
With the holidays right around the corner and some much needed R&R on the horizon we are taking a look at some concepts to help you enjoy your festivus with a little less anxiety. Remember we are all SRE’s now with powerful tools at our fingertips, we just have to make sure we understand best practices so we can all enjoy the break! ☃️
Right on time, we find ourselves with a new release of Kubernetes! Congrats and a big thank you to everyone who worked hard to create and ship Kubernetes 1.23 over the past few months. Stay tuned as the major distros are probably all working hard to get 1.23 support added as soon as possible so we can all easily try out the latest bits! With the last release of 2021, we are focusing this issue on some of the new changes that are out, and trying to help you stay up to date! 🎉
We decided to mix it up this week and go back to basics. We’re taking a look at your registry options in today’s container landscape. From rolling your own local registry, to using a hosted service – there are lots of options out there. We picked six good ones, but we know there are many more! Feel free to send us some registry pro tips on Twitter!
On this week’s episode of the Kubelist podcast, Benjie and I talked to Chandler Hoisington from AWS about EKS Anywhere. If you haven’t heard of EKS Anywhere, Chandler does a great job explaining it and why you should consider using it as your distro. It’s not easy to run a managed K8s service, and it’s even harder to run it in customer-environments (I know this first hand!). Let’s go on to the newsletter links! As you might have guessed, this issue of the newsletter is going to be focused on the work AWS is doing to commoditize adoption of Kubernetes under the EKS name.
On the most recent episode of the Kubelist podcast, we had a conversation with Matt Butcher and Taylor Thomas who are two of the engineers behind Krustlet (and some other projects that you might know). This episode was eye opening for us – the future of WebAssembly on the server seems bright, and this project is doing some pretty creative and clever integrations into the Kubernetes API. WebAssembly might be early, but we are hopeful as it’s maturing quickly!
KubeCon NA 2021 is right around the corner – and we’re getting pretty excited to attend either virtually or IRL with our CNCF family! The entire schedule looks amazing. This week we’re highlighting a few sessions and co-located events that we are looking forward to. It’s so hard to pick just 6 to call out here – so please tweet at us some other talks y’all are excited to hear as well!
I think we all know the value of securing our Kubernetes cluster using RBAC, and keeping intruders from gaining access to the Kubernetes API. But if the default, out of the box, RBAC experience isn’t fine grained enough for you, or if you just want to learn more about how Kubernetes RBAC works and what options are out there, this issue is for you. We’ve collected some of the latest and most interesting blogs, tutorials, and tools (OSS of course) that can help you lock down the RBAC policies in your cluster.
Let’s take a quick look at some of the new projects that have been added to the CNCF sandbox this week. It’s a long road and takes a whole lot of time to graduate; so we hope it’ll be informative to check in on these projects from time to time as they mature.
When running a Kubernetes cluster, understanding the health of the services running on your clusters is job number one. Thanks to Google and their SRE handbook we have a pretty good idea of how to do this. So, without further ado let’s jump into some ways to measure health (or SLOs and SLIs).
This week, we have a new episode of the Kubelist Podcast with Dan Lorenc to talk about sigstore. Supply chain attacks and security is a hot topic, but Dan has been thinking about it and working on it for a while.
Kubernetes 1.22 has dropped with a whole lot of enhancements (53) which makes it the single largest release to date! The momentum of the k8s project continues to be impressive. Let’s dive into what’s new!
This week’s episode of the Kubelist Podcast was a conversation with Rick Spencer from InfluxData. Influx has been running K8s in production for a while now and has the battle scars to prove it. Rick’s honesty about what was challenging was a refreshing and good look.
On this week’s episode of the Kubelist Podcast, Benjie and I had some time to talk to Miguel Ángel Ajo and Stephen Kitt of Red Hat. Submariner is all about multicluster networking. We love this project and think it’s solving problems that are becoming more and more obvious as Kubernetes adoption increases. This week, we are sharing some Submariner links and tutorials to learn more!
Once you have a Kubernetes cluster, it’s fun to see what it can handle. This week we are going to take a look at some scaling stories from the CNCF ecosystem and get a feel for what people are accomplishing in the real world with K8s.
On this week’s episode of the Kubelist podcast, Keith Basil from SUSE (via Rancher) joined to talk about K3s, simplifying software, and much more. We talked about other projects (Longhorn, RKE) but really kept coming back to the impressive K3s project. Personal highlight was running K3s on Raspberry PIs in SPACE in a Satellite to perform image recognition against a baby Yoda doll… what else is there to say?
Now that ArtifactHub is officially at 1.0.0, we thought it was time to take a deeper look at what it does, where it came from, and how we can use it. As many of you know, standardization around Kubernetes and the CNCF ecosystem is an ever-changing landscape, but let’s try to figure out if we have found the holy grail of package management for k8s.
It’s that time again when the Technical Oversight Committee (TOC) met and voted to include some new projects into the CNCF Sandbox. We are super excited to learn about these projects, and share some of them with you this week. It looks like we have some podcasts to record to dig deeper into each of these projects soon!
For years the rule of thumb in Kubernetes land was “Don’t run your own DB!” Things have begun to change and this week we are going to look at a few of the options out there. Using a managed database service has always served us well but at Kubelist we always want to stay on top of the latest recommendations, and we think it’s totally acceptable to run databases (and other stateful services) in Kubernetes these days! 🏃🏽‍♀️
Software supply chain attacks are on the rise and making headlines almost every day. Luckily, there are many good tools available in the cloud native ecosystem to help secure your supply chain. I’m wondering what we’ll see in the upcoming KubeCon about this topic too! In the meantime, here are a few great links we’ve been reading lately to better understand what’s happening with these hacks.
It’s time again to do a roundup of new and exciting projects the CNCF TOC (Technical Oversight Committee) have recently accepted into the Sandbox. As always this isn’t an exhaustive list of what’s been added, so check out the CNCF Site for the latest list (and subscribe to the Kubelist Podcast).
Tune in to episode 16 of the Kubelist Podcast with Josh Dolitsky. Josh is a maintainer of the Open Container Initiative (OCI) project. There’s a surprising amount of cool work happening in this project that’s taking Docker registries and adding a pile of great new use cases on top.
We started and wrapped up Kubecon EU last week, and what a conference it was. Between virtual CTF (Capture The Flag) and great keynotes, there was a lot to take in and digest! In this week’s newsletter, we’re sharing some of our favorite moments from Kubecon. Make sure to let us know on Twitter if we missed anything!
On this week’s Kubelist Podcast we sit down with Evan Cordell from RedHat and chat about the past, present and future of the incubating Operator Framework project. For the newsletter, we’re going to take a deep dive into operators and how they fit in the Kubernetes ecosystem; and look at the challenges and tools associated with them. Make sure to checkout Operatorhub for a list of what’s already out there!
Jim Bugwadia and Ritesh Patel from Nirmata joined me on episode 14 of The Kubelist Podcast to talk about Kyverno. This is another new CNCF Sandbox project, and Jim and Ritesh did a great job explaining the unique value proposition of Kyverno on the episode. If policy enforcement and simplifying some operations by using YAML is something you are looking at or working on, it might be good to give Kyverno a look.
On episode 13 of The Kubelist Podcast, I was joined by Tzury Bar Yochay and Justin Dorfman from Reblaze to talk about Curiefense. This project was added to the CNCF Sandbox recently, and is unique in the ecosystem. Curiefense is an Envoy-proxy based web application firewall that you can run in your own cluster. Give the podcast episode a listen today; Tzury and Justin do a great job explaining what a WAF is and how Curiefense operates. I’m excited to see more high quality security-focused projects in the CNCF ecosystem!
This week, we’re going to dive into some new Kubernetes 1.21 features, and see what’s the latest and greatest in the ecosystem. Bonus: Docker 1.20 is supported by kubeadm now! Let’s get going!
Let’s talk about Istio. Tune in to the podcast episode released today, where Craig Box from Google joined me to discuss the history and benefits of Istio. The conversation was really eye-opening, and helped me get a much better understanding of why Istio, and how Istio compares to other platforms. In this episode Craig also does a good job of demystifying Istio (if it’s a mystery to you). While Istio is not a CNCF project, I don’t feel like we are breaking our character of discussing projects in the CNCF ecosystem, because Istio works well with Kubernetes and is built on top of Envoy.
Recently, the CNCF TOC (Technical Oversight Committee) changed the requirements and application process in order to make it easier to get projects accepted into the Sandbox. This has been a welcome change as we’ve seen more projects than ever included earlier in their lifecycle. In this week’s issue, we are pointing to some of the new projects included in the Sandbox so far in 2021. This isn’t an exhaustive list of what’s been added, so check out the CNCF Site for the latest list (and subscribe to the Kubelist Podcast 😉).
It wasn’t that long ago (KubeCon 2018) that Open Policy Agent (OPA) was a Sandbox project, and now it’s a CNCF graduate! OPA is a declarative policy system that has its own DSL; so you can control what/who can access not only your cluster but all of your cloud native resources. In this week’s issue we dive into why OPA exists, what problems OPA tackles, and of course some real world experiences and gotchas using the ecosystem that has formed around it.
We’ve decided to go a little meta this week with the topic. Instead of diving into a specific area of Kubernetes or the CNCF projects, let’s take a minute to look at some of the other great newsletters and podcasts out there. We know how much work and how fun it is to produce a weekly show or newsletter, and every one of the resources on this list is just amazing. We are really proud of our own Kubelist Podcast and this weekly newsletter, but subscribe and listen to these also:
Sometimes you just want a local Kubernetes cluster on your laptop to use with development. Should you just enable the Kubernetes distribution that’s built into Docker? Or are there better options out there? In this week’s issue, we are sharing some links to posts and talks from people who have spent a lot of time solving this problem and are kind enough to share some advice. The tl;dr here is that there is no clear and obvious “best” cluster for local development, but if you are thinking about this problem, check out the links below for more data.
On today’s episode of the Kubelist Podcast, I had a conversation with Lee Mills and Matt Clarke from Spotify. Lee is the engineer manager working on the Backstage project, while Matt is a Sr Infrastructure Engineer. Backstage was recently donated to the CNCF as a Sandbox project. On the podcast, Lee and Matt explain the inspiration for Backstage and really help us understand the origins and direction of the project. Spoiler: it’s a pretty good idea and they’ve done a great job getting it off the ground. To keep the theme going this week, here are some of our favorite newer and older links about the Backstage project!
Today’s episode of the Kubelist Podcast is with Daniel Mangum from Upbound, discussing the Crossplane project. Crossplane is a Sandbox project that allows users to define Compositions of infrastructure and then deploy the infrastructure right alongside an application. This is a really cool approach to managing infrastructure as data. In this week’s newsletter, we share some links for getting started and stories from users using Crossplane.
Kubernetes has a built-in Kind called Secrets to store and pass sensitive configuration data to Pods. It’s popular – almost everyone running a cluster uses Secrets. Since it’s a Secret, it must be protected in a reasonable way by implementing best security practices, right? It can be, but it’s not always. It depends on the configuration of your cluster; and you shouldn’t assume that the defaults are the best settings from a security perspective. In this issue, we share ways to understand and manage Kubernetes Secrets. Security isn’t binary, it’s a scale. You’ll have to make a decision about where you are comfortable on this scale, and our goal is to provide information to help you make that decision.
On today’s episode of the Kubelist Podcast I had a conversation with Dan (“Pop”) from Sysdig. Pop is the Lead of Opensource Ecosystem and Community, specifically Falco, but has been at Sysdig in various roles before finding his current role. He’s extremely knowledgeable and passionate about helping everyone run a secure cluster. If you aren’t already subscribed to his podcast, subscribe to the POPCAST and get ready for season 2. Whether you are a Sysdig commercial customer or not, Falco is going to give you confidence in your cluster. Runtime security is important, and as mentioned in the podcast, “the kernel doesn’t lie”. Falco is connected to and listening to events where they occur (in the kernel) and you won’t find a better tool to detect unusual or insecure activity. In this issue, we are sharing a few links and tutorials to help you run Falco, but this episode is the best explanation of the project possible.
Now that it’s become more common to run stateful workloads on Kubernetes, backup (and restore) starts to become more important. Remember that the scheduler can stop, move, restart and control the lifecycle of a component that has critical and irreplaceable data. To deal with this, it’s often recommended to choose a cloud-native database or stateful component that is built to operate in a Kubernetes environment. But even so, having a good and reliable backup stored outside of the cluster (or even the region) is at least a good idea, and possibly even a requirement to maintain SOC-2 compliance. The good news is that there are several good tools that can handle backup and restore of data sitting inside a Kubernetes cluster. There’s a lot of overlap between these different utilities, but each has some nuances and specialities. In this issue of the newsletter, we’ve shared some of our favorite blog posts and articles comparing or walking through using Kubernetes-native backup and restore tools.
When running Kubernetes, the amount of YAML you’ll see on a daily basis is staggering. Joe Beda (one of the Kubernetes founders) recently joked about giving a talk titled “I’m sorry about the YAML”. While we can laugh about the amount of YAML, it is an error prone syntax, and it can be easy to make some mistakes. There are a few tools available to help validate and write your Kubernetes manifests. This week, we are looking at some of the methods of validating YAML before deploying, including Open Policy Agent, and a couple of utilities from Gareth Rushgrove. Hopefully the links below will help you see how to use these different tools to write production-grade Kubernetes manifests.
Richard Li from Ambassador Labs was on the Kubelist Podcast this week to discuss Telepresence, one of the first CNCF Sandbox projects. Telepresence makes sense for large teams to manage the cost of running many dev clusters better; but in this episode Richard explains how the project makes sense for small teams as well. The conversation about Telepresence 2.0 (rewritten in Go) is also great. Hopefully we get to see that version soon!
This week on the Kubelist Podcast, I had a conversation with Andreas Grabner from Dynatrace about the Keptn project. Keptn is a CNCF Sandbox project to orchestrate event-driven workflows, often for CI/CD tasks. In this issue, we’re sending some links to Keptn resources and a few other great podcast episodes from the PurePerformance podcast.
Every couple of months, the CNCF TOC (Technical Oversight Committee) meets to review outstanding Sandbox applications. As a result of the meeting last week, 7 new projects were added to the Sandbox. In this issue, we are taking a quick look at each of the new additions, and we hope to feature them all on the Kubelist podcast soon!
This week on the Kubelist Podcast, I had a conversation with William Morgan from Buoyant about the Linkerd project. The conversation ranged from the origins of Linkerd to some of the technical challenges of building it in Scala; and then Rust and Go. Linkerd 2.9 is out this week – which William discusses, as well as explaining what’s changed. If you’re a Linkerd fan, or considering becoming one, listen to the podcast and check out the links below!
Most of us have kubectl installed on our laptops. Building on this, kubectl plugins are a simple and convenient way to package additional CLIs that depend on Kubernetes clusters. And with Krew (see today’s first link), we no longer need to package separate MacOS, Windows, and Linux binaries into homebrew, apt, rpm, snap, and other package managers. If you’ve shipped a CLI before, you know how difficult it is to keep it updated on everyone’s computer. If you haven’t, trust us, it’s difficult. Read on for some new links on creating and packaging a CLI and then delivering it to your Kubernetes users.
Flux is the original GitOps operator for Kubernetes. Back in episode 103, we focused on the ArgoCD project as an implementation of GitOps in Kubernetes. This week, we are diving into Flux, and featuring a new episode of the Kubelist Podcast with Michael Bridgen, one of the creators of the project. This issue of the Kubelist newsletter contains links to Flux tutorials, guides, and a few pages that explain the Flux v1 to Flux v2 transition.
This week on the Kubelist Podcast, we welcome Sunil James from Hewlett Packard Enterprise to chat about the SPIFFE and SPIRE projects. Sunil is one of the founders of Scytale, the company that brought SPIFFE into the CNCF, and has continued to work on it after being acquired by HPE. If you’re running microservices and are thinking about security and identity, check out the links in this issue to learn more about SPIFFE and SPIRE, and tune in to this week’s podcast episode!
This week on the Kubelist Podcast, we have a conversation with Ben Sigelman from LightStep about the OpenTelemetry project. This has us thinking about observability and collecting some good links we’ve been saving related to tracing, metrics, and logging using OpenTelemetry. On the podcast, Ben shares some thoughts on these “pillars of observability”. If you are looking to up your observability game, dig in here and get started with OpenTelemetry. We tried to find the best links, but we know there are observability platforms that are integrated into OpenTelemetry that we didn’t have room to include here. This issue includes some of the best and most recent blog posts and tutorials available on OpenTelemetry.
This week, we’re taking a closer look at GitOps and the Argo project. Mukulika Kapas from Intuit joined the Kubelist podcast this week to discuss Argo and GitOps. Argo came out of a need at Intuit to manage clusters at scale. While the Argo project consists of four subprojects (Argo CD, Workflows, Events and Rollouts) the topic of this newsletter is GitOps, so we are focusing on the Argo CD subproject. If you’re looking at GitOps now, or are using any of the available GitOps tools to manage CI/CD in your clusters, the links today should help you understand how others are implementing GitOps – and hopefully show you a few new tools!
We have exciting news to share today! In addition to the Kubelist weekly newsletter, we’ve started the Kubelist podcast! We’ve been enjoying sending you the Kubelist weekly newsletter (and that’s not stopping), but we wanted a way to go more in-depth on the CNCF ecosystem projects. The Kubelist podcast interviews maintainers of a CNCF project on each episode to discuss the origins and roadmap of the project. Each episode is a deep dive into a single project. Give it a listen (and subscribe!). And while you are here, check out some of our other favorite podcasts!
How many years have you been running Kubernetes in production? Have you shared your lessons learned yet? This week, we gathered some stories about lessons learned after running Kubernetes in a year, in two years or in three years. There are similarities and common threads in these stories. Definitely a good read, and also some takeaways that might change how you run Kubernetes this year.
Hi again! This week, we decided to take a look at some of the lesser-known (at least we haven’t seen much discussion about them) special interest groups (SIGs) for Kubernetes. There are a lot of great SIGs, so instead of providing links to the popular repos, we focus on some that seem to be flying under the radar. If these are interesting to you, go digging around in kubernetes-sigs for more! We didn’t have enough room in this issue to share everything that we found!
If you are subscribing to Kubelist, you probably agree that containers have changed how we deploy software. A large enabler of containers was the creation of the Docker (now OCI) Registry. Container registries aren’t boring, and there are a lot of changes happening as the basic container registry grows into an OCI registry. This week, we take a close look at some interesting registry-related links.
This week, we are sharing some new Kubernetes 1.19 features and a great technical post from Monzo about self-hosting Kubernetes. Let’s not forget that KubeCon EU 2020 wrapped up, so we made sure to include a couple of good recap links if you weren’t able to attend. We’ll share the videos when they are published! ✔
As we build more Kubernetes-native applications and run more and more on Kubernetes, developers need to be able to have an environment that closely resembles production. This means Kubernetes for developers and Kubernetes-friendly development environments. This week, we are sharing a few of our favorite projects that help developers build for Kubernetes environments.
This week we’ll be focusing on the Zero Trust security model and how it applies to Kubernetes. This issue is split between blogs that explain what zero trust is, and hands-on practical tutorials and examples. Have your kubectl ready to go!
This week’s issue is full of technical blog posts and discussion of a couple of projects that are worth checking out. We can’t leave Open Service Mesh from Microsoft out, so we’ll start there. But we are really excited about some of the work happening to make the Kubernetes Scheduler more extensible and powerful. When reading these links about the scheduler, imagine how flexible a Kubernetes cluster of the future will be. 🔮
Not everyone using Kubernetes writes PodSpecs and thinks about Ingress controllers, PersistentVolumeClaims and other Kubernetes fundamentals. While that type of Kubernetes-native workload is fine for some users, many use cases don’t need to know the details of how a pod is scheduled. Kubernetes is a great platform to run “serverless” workloads on. The idea of delivering a function or other interface to run on a cluster is appealing. This week, we look at a couple of popular options, and some tutorials to get started with each of them.
Kubernetes 1.19 is expected to be released in the next couple of weeks. Today, we start out by sharing some of the 1.19 features and improvements that are exciting to us. We’ve also got a few links regarding some timely CNCF news about KubeCon and certifications.
A modern application is complex, and starting may require some specific sequencing. Maybe the database needs to be running before the API, or you need to provision TLS certs before starting a web server. It’s possible (recommended even) to make code changes to remove these hard sequencing dependencies, and this isn’t always easy or possible. So this week we’re looking at built-in Kubernetes features that can be used to start up a complex application or upgrade, without using external coordination utilities.
The Kubernetes Dashboard and kubectl are both powerful tools, but are not the only ways to view and interact with your cluster. There are some powerful alternatives to these components that provide unique views and functionality. Dashboards in this category aren’t intended as a replacement for full and proper monitoring, but are incredibly useful to get a high level view of what’s running in the cluster. Kubectl can drive a cluster with its composable commands, but some other CLIs have more interactive views that can save time with some tasks. This week, we are sharing some of the kubectl alternatives and lightweight Kubernetes dashboards that you can install.
Kubernetes makes it easier to run different services in a single, shared cluster. This creates an opportunity for any service to disrupt and create outages in any other service or the entire cluster. When you have improperly configured services in a cluster, they will be subject to the various scheduling guarantees that Kubernetes offers. But Kubernetes does offer a solution here with built-in QoS Classes (Quality of Service) and LimitRanges. These features should be enabled and enforced in every cluster to keep your cluster healthy. This week, we’ve shared a few blog posts to help you understand these Kubernetes features and how to use them.
No Kubernetes migration is complete without a chaos engineering story. To successfully run a production system on Kubernetes without unexpected outages, everything should be horizontally scalable and resilient. In other words, expect restarts and other “problems”, code and design around them, and you’ll be successful. Chaos Engineering is the practice of running experiments on your cluster to see how well everything behaves. This week, we are looking at some blog posts and some tools to help you get started or to advance your Chaos Engineering practice.
This week, we’ve been thinking a lot about storage in Kubernetes. Storage is an extremely important, but also a very difficult capability to provide in a cluster. Doing so often means relying on external resources to create a reliable solution. There are some projects that let you run your cluster on EKS without EBS volumes, or to run a bare metal cluster that doesn’t come with any managed storage. This is a topic that we should check back in on more often, and we’d love to hear about other in-cluster storage solutions not listed here!
Instead, we’d like to create space to pause and reflect on the pain being felt in the United States and around the world. We know that a big part of what makes Kubernetes so special is its diverse and supportive community and we don’t want to distract from the voices that matter right now.
This week, we’ve been working to improve our application startup process so that it doesn’t receive traffic before it’s ready, and fails gracefully so that it can be restarted. These are all core features of a modern application, and Kubernetes supports this via Readiness Probes and Liveness Probes. But just because these are supported, doesn’t mean you necessarily should be using both of them. In this issue, we’ll cover the basics of the probes, when to use them, and more importantly, when not to.
As organizations of all sizes transition to Kubernetes, a lot has been written and shared about the journey. There are plenty of success stories and also many posts about mistakes and lessons learned. Whether you have already moved to Kubernetes or just starting out, there’s a lot to learn from these stories. This week’s issue is a collection of links that share some lessons that have been learned the hard way so that you can avoid making the same mistakes.
This isn’t the first time we’ve written an entire issue about security in Kubernetes. And it’s probably not the last time. The security landscape is constantly evolving and there’s a steady stream of best practices to implement and new attacks to protect against. Whether you are just starting to look at securing Kubernetes and the applications running on it, or want to catch up on some new info, the links here about applying security principles to Kubernetes should be interesting. Don’t stop at these 6 links though. Hopefully this inspires you to set a little time aside very soon to continue the research. 🛡️
Kubernetes has long been pigeonholed as a platform for stateless applications, however a new generation of Kubernetes-native stateful applications have been emerging. This is largely due to the introduction of the operator pattern that allows for stateful applications to be managed through automated operations. Once installed, these operators extend Kubernetes to allow built-in support for new, custom resources. This week we wanted to showcase a few Kubernetes Operators that are built to run stateful services such as databases. Our goal is to showcase both the viability of running stateful workloads on Kubernetes and the evolution of the Operator pattern as more than just an installation tool.
As time goes on, we aren’t running out of new ways to bootstrap and install a Kubernetes cluster. We aren’t complaining though, the fact that there are so many options here is proof that this problem is not yet solved!
There are a lot of guides that talk about managing, reporting on, and lowering the costs of running Kubernetes clusters. This week, we share a set of links that all will have you thinking about optimizing the amount you are spending to run Kubernetes.
This week we take a look at three alternate Kubelets you can run or even build, and share some recent announcements.
A lot has happened in the world since our last issue, including some Kubernetes developments worth talking about. With everyone quarantined right now, it felt like a good time to send some recommended reading (and a video) your way.
Monitoring containers and clusters in Kubernetes is essential for ensuring the best performance in applications. This week’s issue will be focusing on the importance of Kubernetes monitoring and some issues that come with using monitoring tools for Kubernetes.
This week we’ll be investigating Kubernetes secrets, to discover the best and useful tips and tricks for any K8s developer. Warning ahead: There are Kubernetes Secrets found!
This week we’re looking into Kubernetes failures and incidents. As you might imagine, these issues can have a nasty impact for users, and where recovery plays the most critical role.
To avoid exploitation and the delivery of malicious bugs in Kubernetes, it is critical that your system is secure and containers are kept closed. Some of the most damaging attacks can lead to every pod and container to shut down and break. Security is vital, and that is what we will be looking at today.
Today, we’re opening common networking issues within Kubernetes. Let’s take a look at what Kubernetes Networking is dealing with, to specific issues within K8s. And solutions too. We also are taking a look at Container to Container, Pod to Pod, and External to Services Networking!
Helm is a package manager tool used for Kubernetes. Known for managing complex apps and easy rollbacks, Helm is quite popular. These articles answer questions like “What is Helm? How do I use it?” Is it the best tool for Kubernetes? And of course, a Helm tweet.
Kubernetes has many things to offer when diving into it as a beginner. This week we look at a few in-depth Kubernetes related posts that include the environment, Docker, and Kustomize. This week we also take a look into practicing with Kubernetes.
Entering the world of Kubernetes can be a bit scary at first, but hold on, buckle your seatbelt in and don’t be worried! Learning this open source software is quite interesting. This week we look at some posts that introduce Kubernetes and addresses the who, what, where, and why.
It’s amazing how much security content is produced in an around Kubernetes. This week we look at a few security-related posts but it’s interesting to stop and consider where Kubernetes is in terms of supporting highly secure development workflows and production operations. This week we also have a look at the ClusterAPI, Tooling and HAProxy 2!
This week we talk about security (pod security policies, TLS, honeypots), what’s new in the Kube with 1.15, and Apple joining the CNCF Check it out!
This week we bring you articles on Kubernetes failure stories, managing permissions, and recovering from disasters with a few more goodies herein.
Kube sprawl is an interesting one, what incentivizes folks creating more and more clusters with more and more config on and on and on to power their Kubernetes journey? Some say it tenancy, Some say performance, read here to find out more. This week we look at Kube sprawl, configurable HPA, Multi-Cloud clusters, Kube testing, and more.
Lots of cool outcomes from Kubecon EU: OpenTelemetry, Service Mesh Interface, ect. We’ve collected a few recaps and some more around service meshes, the kube future, secrets, and scaling!
Actually not much in the way of spectacular content coming out of Kubecon yet - so maybe this is a part 1 of x. Valero 1.0, Helm 3.0, Rook 1.0, OpenTelemetry! Let’s dive in and see what came out of Kubecon Europe and more! Thank you to @CormacJHogan for your stateful take on things 😁.
Wonderful week in Kubernetes world on the eve of Kubecon Europe. Hopefully, the following articles about newtype autoscaling, HA clusters, PKS, istio, and more get you super excited. Read below!
Welcome welcome to an exciting week in Kubernetes. Notably, the continued hype of k3s and the release of Kubernetes Based Event Driven Autoscaling are quite exciting developments in the Kube community. This week we check up on those, get into some questions on YAML dependencies, Networking / Service Meshes, and more. Read on!
Hello, aren’t you excited that it is Kubecon Europe month? This week we will pump you up with articles covering monitoring, resources, secrets, logging and more! Take your pick and really dig in to an area of the Kube that you find fascinating.
This week we return to regular schedule programming. An awesome week in Kubernetes land. The world of k8s is moving along. We found some juicy articles that you will want to sink your teeth in: Ingresses, Operating Systems, Migrations, and A N T H O S. Enjoy!
Today we are ending our series on Kubernetes Resources with a final part on Vertical Pod Autoscaling. We started the series looking at resources, what they were and how they were used and asked what autopilot for Kubernetes would look like? Are we there yet? How much effort will it be? There are not that many resources on Vertical Pod Autoscaling, especially not its use in large scale production environments. But the material that is out there is great, check it out. P.S. A little article on Helm included to spice things up.
Hello and welcome to the Horizontal Pod Autoscaling issue again! There were soooo many great HPA articles that we had to do another. This time we are focusing on external and custom metrics, how to use them - why use them and more. There are a couple more goodies in here like Canary Analysis and how to be Overcommitted, the right way. Read and enjoy!
Hello and welcome to the Horizontal Pod Autoscaling issue + Kubectl productivity! This might actually be Horizontal Pod Autoscaling Issue part one because when we looked there were over 41 articles that were super cool to include. We put together articles that went beyond the standard fare of setting it up and using it from Control theory to Auto Scaling on Memory with JVM containers. Enjoy!
Hello and welcome to the second part of our series on Kubernetes resources!! This week we bring you autoscaling all together, a bunch of articles on using the autoscaler (and related addons) together. This issue will serve as an intro to the history and practice of the autoscalers in general before we dive deep into each one. Happy reading! P.s. Tweet back at us your guess about which autoscaler we are going to write about next.
We are starting a new series at Kubelist this week: Kubernetes Resources and Autoscaling. We are going to be taking a little break from aggregating new content and curate some lists based on things we think are important to know for Kubernetes. (If you’re really hungry for the newest stuff check out: https://kube.news/ or @kubeweekly). This week we bring you Resource Management from the basics to advanced. These articles answer: How are resources managed in Kubernetes? What is utilization? What is isolation? How do my pods get scheduled? Why do my pods get killed? And the essential wisdom of Kubernetes resource management: Always set resource and limits.
Kubernetes, you want to know what’s cool about you? Well, there’s lots. But one thing is the number of people who use you programmatically by writing code and using code. Whether it’s operators or tooling, you’ve really captured our developer hearts. P.s. If you haven’t already, check out the Kubernetes WG LTS Survey. https://www.surveymonkey.com/r/kubernetes-support-survey-2019
As Kubernetes matures more cost savings and optimization endeavors are popping up – and this will only grow with wider K8s adoption. Specifically in this issue we have K3s.io and KubeADM-AWS; in addition to some general K8s knowledge and a neat little kubectl plugin by the name of rakess. I welcome you to dive in and enjoy!
As Kubernetes and microservices reshape the landscape of modern computing, we’re seeing businesses placing big bets - especially in enterprise. Read on to find out how IBM and Intel are leveraging Kubernetes for hybrid integration and machine learning. We also have something to help businesses make sound decisions as they adopt Kubernetes, a really great tutorial for developers looking to start learning, and a glimpse at the future of CD pipelines.
That is not actually a question. You definitely have to config in Kubernetes. This week we have collected a bunch of recent articles on configuration management, security tooling, and more to help you think through your current kubernetes practice. A special treat this week is Lee Brigs. Why the fuck are we templating yaml? Which is well supplemented by background in The State of Kubernetes Configuration Management: An Unsolved Problem.
K8s is a great tool, but tools that make using K8s easier are even better. In this week’s issue, we’ll introduce a few tools that can improve your workflows for managing K8s resources and managing secrets. If you are feeling inspired by the end, the last article goes through how to write your own kubectl commands - so maybe you can write one too!
As our clusters grow in complexity and load, we start to question everything we thought we knew. Don’t worry, we’ve got your back (and our own). This week we bring you some insights into scaling as you grow, a look inside of a truely large cluster, how to think about just hosted services, and finally, some great news from Apache Spark. Kubernetes is meant to liberate and empower, not confuse and bog us down. Keep that in mind as you look go through this week’s issue.
Ch-ch-ch-ch-changes! This week’s batch of articles makes one thing clear: the rate of improvement, innovation, and continuous change in the Kubernetes community is nothing short of astonishing. This issue is a must-read to see what’s happening with security, discover tools for solving problems that most of us will have, and even learn how to make changes to Kubernetes itself. All aboard!
Ahoy! Today our love of the ocean and all things nautical is in full force. We apologize in advance if this issue heads into the depths of nautically inspired k8s talk. Be prepared for a whole new level of boat-themed puns.
We welcome you to 2019 with ‘a year of kubelist’, showcasing the most popular news and updates of 2018. If you haven’t read these yet, statistics says you should. They also say the following about Kubelist: - We gave away approximately 4,023 Kubelist stickers at conferences. - We reached the 1,000 subscribers mark and had a pizza party. - We had more than 5 editors contribute this year. - We spotted 4 laptops with kubelist stickers on them (and they weren’t ours). What a great year. We wish you the best in 2019.
You’re at home now for the holidays, all filled up from your trip to Kubecon. You’re quietly drinking eggnog and coffee mixed together contemplating what open source project you are going to work on for the next 12 days… a new controller to do that deployment thing you do 5 times a day, or perhaps contributing to the horizontal pod autoscaler? So many choices. Why don’t you take a break from your open source holiday anxiety and have a little read. We’ve got everything from AI to video games to an interview on the state of the Kube. Enjoy!
It’s announcement season in the Kubernetes world, as KubeCon is the perfect time for companies to show off and gain exposure. We take a look at a number of things that caught our eye this week, while our secret agents were walking around the conference floor leaving Kubelist sticker trails behind them.
This week we found a few early Christmas presents under the tree that we’re excited to share with you 🎄🎁. New features from Microsoft along with some other tech influencers, cluster API stories, a bunch of awesome how to’s, and of course the greatest gift of all — version 1.13 of Kubernetes. Merry K8s-mas!
This week Envoy joins the ranks of Prometheus and Kubernetes as a CNCF Graduate. This is big and important news, but it’s also a great excuse to link to Vitamin C. As Envoy ventures out into post-graduation life, we take a look at why this newsletter will make you 173% more attractive as a job candidate. Enjoy! ☸️📈
There are many reasons to be thankful for kubernetes, but for the purposes of today’s issue, we’ve narrowed it down to 6 reasons why we love this container-orchestration system 🙏 We hope you’re wearing your stretchy pants because we have 6 servings sure to please your K8s palate: cross cloud kubernetes, debunking common misunderstandings, container runtimes & more. Dig in!
The rise of K8s paved the way for more innovative ideas in enterprise infrastructure, for various fields. People are craving DevOps for Big Data. Some are using K8s to build a new OS for the age of AI, others are building awesome IoT Cloud services on K8s, while the rest are figuring out ways to improve enterprise K8s integration.
K8s-related acquisition alert 📣! VMware is now a proud owner of Heptio, and we’ve got the inside scoop on how it all went down. We’ve also have 4 other tasty scoops for ya to help with managing configuration of clusters, saving money and improving reliability with cloud providers, implementing special load balancing with gRPC, and making CI/CD happen with Amazon EKS and Jenkins X!🍦
Well of course we had to mention this weeks HUGE acquisition. We don’t even need to say which one we’re talking about because we know that you know what we know 😉. Meanwhile, CFF was also making moves to get a little closer to CNCF. Oh, and while you’re here check out the new tools we found to help you step up your K8s game. (Spoiler alert. They include AWS Spot Instances & Gravity Cluster Cloning) 😯.
This week we’ll enjoy a nice info-rimmed K8s cocktail made up of 1 oz of popular news, 2 oz of K8s-advice, and 1 oz of dev-support 🍹. It packs a punch, including dashes of why Google is adding efforts into making Spinnaker a better cloud deployment tool, why you should use Helm to manage K8s charts, and why Apache Kafka is great for fault tolerant storage. Cheers! 🎉
If nothing else, the kubernetes community is a content MACHINE 🤖. There is always something new to learn, and that’s why we go out and find neat things for you (and provide erudite summaries 😛). One of the best things about Kubernetes is that things are often also built on Kubernetes in order to use Kubernetes. Dig In!
Kubernetes has a lot of options, so many that you couldn’t possibly include them all in your own cluster without turning it into Mr. Potato Head. In this issue we look at a few lists of neat Kubernetes tools as well as best practices when it comes to implementing them, so you can keep your cluster’s ears on straight.
This issue we have a mix of tools and best practices that will keep you fueled up for the week. You might notice along the way that the kubelist editors finished writing this week’s issue right before sitting down to eat.
This week the team at CNCF have been busy making improvements to our favorite container orchestrator. Below you’ll find what you can expect from the updates, as well as some helpful tutorials for those who are struggling to implement a k8s admission webhook, or those who need a better tool for managing disaster recovery. Happy learning!
The perks of distributed systems come at a price — more complicated debugging and managing processes. That’s why this week we’ve gathered a few tools for you to help track your k8s problems, find solutions, manage your microservices or clusters, and build merrily!
New to Docker or Kubernetes and finding yourself lost in the key concepts like containers, images, pods, and more? If this is you, we have a special set of intro’s that’ll give you a better understanding of k8s and how each part is made. Already a k8s pro but a k8s code n00b? Keep an eye out for ‘A tour into k8s’s code’. Know plenty of kube, but confused when it comes to schedulers? Then be sure to read ‘how kubernetes is transforming into a universal scheduler’.
Improve your Kubernetes self by digging into these great articles on controllers, workflow, affinities, aribtrate 😲, and a Magic Sandbox.
Welcome again to a super special entirely new but still the same issue of Kubelist! This week, our Editor-in-Chief went on shore to speak at Gophercon. But rest assured, our skippers didn’t skip Kubelist day.
Welcome to a very special almost entirely new release announcements issue of kubelist! This week, we’ve got a handful of updates and new projects. For those of you that don’t enjoy NEW PRODUCT BULLETINS we’ve also included a guide for installing kubernetes on bare metal and CentOS, and a way to use Helm without actually using Helm. Enjoy!
Welcome to a truely special issue 27 of kubelist! This week, we get meaty with networking, pentest our own cluster, and try and understand why this blockchain thing needs servers. Plus, we peek behind the curtain, and reveal a bit more about the kubelist mythos.
This issue is very special, like all the others. This week we learn the dark and terrible secret hiding within every Target store (it’s stateful applications!). If you look closely within one of the other posts, you’ll find details of a similar setup for Chick-fil-A, too! It’s a treasure hunt for your mind and eyeballs!
Welcome to a very special RBAC double-shot edition of kubelist. In addition to RBAC, we’ve got bare metal networking, for those of you that avoid the cloud (or build your own!), and end to the vicious Kubernetes vs Docker debate (?), and cake! Yes, cake. Well, StatusCake; you can’t eat it 😢.
Welcome to a very special not entirely Google news issue of kubelist! This week, the kubelist editors worked very hard to include information that didn’t come from Google Cloud Next ‘18. We think we did pretty good! While you enjoy this batch of links, we’ll be patting ourselves on the back.
Welcome to a special security issue of kubelist. This week’s issue is loaded with good security information for your control plane, your workloads, your applications, your mind, your body, and your soul. Most importantly, and very rare for our industry, is that there’s zero fear mongering or scare tactics! So read up, learn, and feel good.
Welcome to a very special post-apocalyptic theme park issue of kubelist! This week, we’ve got high octane tweets, high rev tooling, a theme park, and a migration story with more rises and drops than the roller coaster you rode at this year’s KubeCon EU party! Please keep your hands and feet inside the newsletter at all times.
Welcome to an extra special birth of a nation issue of kubelist. This week, we celebrate American Independence Day, and Canada Day. And what better way to celebrate these holidays (besides with fireworks) than Kuberentes news? This week’s news ends our streak of managed Kubernetes releases; collect the winnings from any bets you placed.
Welcome to a very special multiple versioned issue of kubelist! No, we’re not A/B testing the content; we’re just unreasonably excited about multiple version support for custom resource definitions in Kubernetes 1.11. A new release of Kubernetes isn’t the only release this week, as we see another entrant into the managed Kubernetes game. Will we continue our now 3 issue strong streak of managed Kubernetes announcements next week? Time will tell!
Welcome to a very special first day of summer binge watching edition of kubelist! At kubelist, we know there’s no better way to beat the heat and long days that come along with summer than snuggling up indoors under a blanket and binge watching a full show. Close those blinds, crawl under your quilt made of old conference t-shirts, and enjoy this week’s content!
Welcome to a very special follow-up happy birthday edition of kubelist! This week, AKS celebrates its 0th GA birthday, we look at some visualizations that would be perfect for the command station of your space cruiser, and we return to an old favorite: fear mongering about crypto hackers!
Welcome to a super special birthday edition of kubelist! This week, we’re celebrating two birthdays: The 4th birthday of Kubernetes, and the 0th birthday of Amazon’s Elastic Container Service. To celebrate, kubelist is serving you up delicious virtual slices of pound cake with real buttercream frosting, topped with link sprinkles (linkles)! Enjoy!
Welcome to a very special expanding brain edition of kubelist! This week, we’re bringing you a collection of thought pieces across the full spectrum. Did Kubernetes win already? Is it too complex to win? Or maybe it doesn’t matter, and you just want to get these gosh darn logs aggregated?
Welcome to a very special spring fashion edition of kubelist! This week, we’ve got all the hottest trends, from ad-hoc code execution to accessorizing with persistent storage. Your clusters are sure to look their best this season!
Kubernetes is exciting, there is a lot going on in the community and a lot of components to why it rocks: CRDs, sweet networking, isolation, and more more more. Join us this week to look at why folks might think it’s complicated and how we might embrace that complexity and get on with our kubelife.
Welcome to the spooky 13th issue of kubelist! The kubelist editorial team is still getting over their jet lag after returning from Copenhagen, so they are taking it easy this week, and presenting you with a selection of their favorite talks from KubeCon / CloudNativeCon EU. We hope you find these videos as enjoyable as smørrebrød and dild akvavit.
Hello! This is the Stateful edition of Kubelist. So called because the resources below can help you get started on your stateful journey or help you expand your mind on how you might think about incorporating state into your Kubernetes app (AWS service broker! gVisor! Digital Ocean primitives!) . Bonus: Obsessed with hot reloading all the codes? Check out ways to incorporate that into your dev workflow in a Kubernetes blog post below. 🎉
Welcome to a very special week before KubeCon EU edition of kubelist! The kubelist editors are very excited to see what new announcements come out of KubeCon, and to hear about what has the community frustrated and excited. But KubeCon is next week! This week, we’ve still got a boatload of news and information for you. On to the content!
Welcome to the operating Kubernetes edition of kubelist. If you thought operating the Kube was fun wait till you read up on these operator goodies. From security, networking, logging and back again, operating the 🗹 is an adventure with several side quests and minigames. Get ready for several deep dives on what it means to operate the 🗹 and level up your 🗹ness. ⚔️
Welcome to a very special nothing-has-changed edition of kubelist! This week, the kubelist editors continue to get comfortable with their new logo, snuggling into it like that old sweater you save for weekends around the house. Get comfy with us, and enjoy reading this week’s selection of new Kubernetes content. 🛋📚
Welcome to a very special makeover edition of kubelist! This week, we’ve got our own brand-new logo! We probably won’t change it again next week. Probably. This week’s edition of kubelist highlights how Kubernetes will play its part in ushering in a dark future where robots rule the world. Enjoy! ❤️
Welcome to a very special makeover edition of kubelist! This week, we’ve got our own brand-new logo! Yes, we’re aware of how many spokes it has :) Kubernetes itself got a makeover this week as well, with the release of Kubernetes 1.10. Congrats to everyone involved! 🎉
Welcome to the sixth issue of kubelist! This week we’ve got a virtual loot crate of links: new project announcements, some meaty blog posts, and another reminder that you need to stop sarcastically posting about “M$” on slashdot. kubelist — it’s like NatureBox for your mind!
Welcome to issue #5 of kubelist! This week, we’ve got comparisons, conflict, countdowns, and code. While you enjoy browsing this newsletter, the kubelist editors will be figuring out how they can sneak a reference to Darude’s Sandstorm into the next issue.
Welcome to issue #4 of kubelist! The automation procrastination continues from last week over here in the kubelist editor’s bullpen. Instead,we cleaned up the kubelist.com website mobile rendering, then googled “signs of procrastination” to see if distracting yourself with other tasks was one. On to the links!
It’s the third issue of kubelist! Last week we planned on automating some of the process of running kubelist. Automation is a key facet of computing. So is procrastination. We chose the latter. This issue covers everything from business deals to kernel system calls. At kubelist, we like a balanced diet of links.
Welcome to the second issue of kubelist! Next week, for the third time, we’ll have to start automating more of the process. This week we’re bringing you some heavy reading, with ebook collections and papers, in addition to our regular news. Grab yourself a warm drink, cozy up, and enjoy!
There’s a lot of news, tutorials, opinions and new projects around Kubernetes that comes out every day. It can be hard to keep up with! We’re going to hunt through the new content weekly, and send you a curated list of the best links, with commentary to boot! — Your pals, the kubelist editors.
This page redirects to the latest issue.