ℹ️ News, Updates & Announcements

crn.com
Trend Micro blows the lid off Amazon's EKS snafu—misconfigured Kubernetes containers brazenly leaking AWS credentials. Cue privilege escalation chaos. AWS shrugs, hiding behind the "Shared Responsibility" mantra. Trend Micro, undeterred, sounds the alarm: secure those configurations, and embrace the gospel of least privilege.

f5.com
The Model Context Protocol (MCP) just crashed the party, turning heads and flipping tables with its focus on tailor-made AI setups. Enter AI factories and Neoclouds—souped-up cloud havens crafted to power-hungry AI demands. Handle with care, because these bad boys redefine what's possible.

aws.amazon.com
Amazon EKS Pod Identity just got an upgrade. Now you can tap into cross-account access using IAM role chaining. Forget intricate setups and tiresome code changes. Drop in source and target IAM roles, and let EKS juggle temp credentials at runtime. It's innovation doing a happy dance.

cloud.google.com
GKE Data Cache supercharges PostgreSQL on GKE. Imagine squeezing out 480% more transactions per second and slashing latency by 80%. It's like a balancing disk on steroids—Qdrant search gets a 10x boost, even without cramming everything into memory. Impressive, right?

kubernetes.io
The Kubernetes gang will cling to their premium Slack status a while longer. But come 2025, free Slack will beckon. Discord’s got its eye on the scene too, whispering sweet promises of GitHub sync and other shiny toys.

itnext.io
Kubernetes 1.33 brings in-place pod vertical scaling, allowing you to adjust CPU and memory without restarting pods, a game-changer for seamless resource management in production workloads. This feature simplifies vertical pod autoscaling especially for stateful workloads like databases.

msn.com
F5, Inc. announced new capabilities for F5 BIG-IP Next for Kubernetes in collaboration with NVIDIA Corporation. The F5 BIG-IP Next for Kubernetes will be accelerated with NVIDIA’s BlueField-3 DPUs and the NVIDIA DOCA software framework.
🔗 Stories, Tutorials & Articles

helpnetsecurity.com
eBPF, Cilium's Tetragon, and SBOMs are the dream team for exposing real-time kernel-level drama inside containers. When these powers combine, they hunt down surprise breaches like Log4Shell with a sleuth's precision. Bonus: they shave off 20% from CPU usage while they're at it.

matduggan.com
Kubernetes rewrites the rulebook on infrastructure. Suddenly, scaling isn't a headache—it's an art. But then there's YAML. With its peculiar quirks and knack for screwing up, it feels more like a punchline than a solution. Enter Helm and its template circus, juggling dependencies with all the grace of a three-legged mule. Maybe it's time to trade that chaos for HCL or some built-in remedy. Because Kubernetes doesn't do messy.

docker.com
Security isn’t just for the IT crowd anymore. Everyone's on duty. Only 1% of developers bother to look the other way. A mere 20% of organizations throw money at outsiders to handle it. The real trip wire? Planning. It derails teams faster than you'd believe.

tech.aufomm.com
Nixidy turns Kubernetes YAMLs into sleek, declarative Nix setups. It offers a robust, repeatable config flow—even for those complex Helm charts. Spice up your deployment by pairing ArgoCD with encrypted secrets via sops-secrets-operator. Now you can wrangle sensitive data in Git with style—and security.

docker.com
Docker Model Runner injects LLMs into OCI artifacts, seamlessly marrying model delivery with container rituals. No need to invent custom toolchains. Think uncompressed "layers"—they're the secret sauce for faster, sharper, more efficient Model-Runner magic. It's not just a change; it's a quantum leap for AI devs everywhere.

subnetsavy.com
K3s and MicroK8s shine in makeshift home labs with minimal hardware. Throw in Longhorn for storage and Velero for backup bliss. Now that's a recipe for tech nirvana.

williamlam.com
Kubeapps is your backstage pass to deploying and controlling K8s apps with style. Dive into a treasure chest of Helm charts ready to roll. For those looking to jazz up a demo, unleash Kubedoom or Kubevaders. Obliterate pods for stress-testing, or just because you can. Craving some retro-futuristic fun? Check out Eric Jadi's fascinating project: wrangle K8s workloads through Minecraft.

til.simonwillison.net
Edit hits GitHub's Container Registry like a buzzsaw, powered by Docker. Built for
Apple Silicon, it rides
Alpine like a speed demon. No fuss, just raw efficiency.

medium.com
SCHIP faced off with tenant demands for serverless Kafka. Their weapon of choice? A crafty DNS trick using CoreDNS and a few clever node-local DNS adjustments. They kept multitenancy alive and kicking without wearing out the ops team. Nice move.

linuxadmin.blog
nsenter is your backstage pass to a Kubernetes node. It plays with Linux namespaces, crashing through isolation walls for a direct look inside. Summon it with PID 1 and proper permissions, and you're deep in the node's core. No middleman required.

docker.com
Docker's just unleashed a new gadget with Desktop 4.40. Meet the Model Runner, your ticket to running AI models on your local machine. Imagine it as the Peacekeeper of container-host diplomacy. It’s powered by llama.cpp and can ride GPUs like a pro skater. Oh, and it plays nice with the OpenAI API. Models strut their stuff at /models endpoints, mirroring images in Docker's world. Get ready for some heavy-duty AI magic.

cncf.io
Argo Workflows isn't just another tool; it sings for Kubernetes-native CI/CD. It juggles complex workflows as DAGs, brings dynamic execution to life with CRDs and parameters. Got a weekly CI? Automate it with CronWorkflows. Secure those Docker pushes using Kubernetes secrets, and let shared volumes harmonize task coordination. It's like magic for your clusters.
⚙️ Tools, Apps & Software

github.com
A stateless, high-performance NAT-like proxy that attaches to the XDP hook in the Linux kernel using (e)BPF for fast packet processing. This proxy forwards packets based on configurable rules and performs source-port mapping, similar to IPTables and NFTables.

github.com
This is a program designed to quickly pull some interesting security related information from Kubernetes clusters. There are a couple of categories of checks that have been implemented so far.

github.com
A CLI tool to detect and analyze cross–availability-zone pod-to-pod network traffic in Kubernetes using Cilium Hubble.

github.com
Ultra-lightweight Kubernetes