Teleport is the easiest, most secure way to access all your infrastructure. Learn how Teleport can help you efficiently and securely manage access to your Kubernetes clusters.
The CI/CD process improves the software's confidence, provides faster feedback, and reduces bugs in production; the author gives some quick tips to improve this process.
This week in Humans Behind Code, we're happy to have Susa Tünker!
Susa Tünker is the project manager of Score, a developer-centric and platform-agnostic workload specification. It ensures consistent configuration between local and remote environments. And it's open source!
Read the interview to discover more about the Human and the Code!
Now you can rely on an AI you command to cut through the noise and find you the stories that matter to you. Across your newsfeed and the rest of the open web. Start by organizing your Twitter feed.
Sometimes, you want to change or inspect resources on your GKE cluster from outside the cluster. For example you might have a simple Cloud Function or Cloud Run service, that schedules a Pod for you. The challenge can be in regards to setting up the configuration properly to connect to the Kubernetes Master API.
One approach could be to bake a K8S config file into the container or your function code, but this means that you have an environment specific container or function. That’s not really what we want, since it limits transferability of our deployable.
A better approach is to use the GKE API to discover the information we need from the cluster.
Snap was built on Google App Engine (GAE), a serverless platform for developing and hosting web applications.
Snap started breaking out its back end into microservices that were backed by other services inside of Google Cloud. Shortly thereafter, it added AWS as its second cloud computing provider.
AWS has released new development tools for building serverless applications. AWS CodeCatalyst, now in preview, sets up new projects complete with a cloud development environment and CI/CD automation, while Application Composer is for connecting AWS services and generating deployment-ready projects including infrastructure as code.
👉 If you're a Developer or a maintainer of a widely adopted Open Source project and you think it's worth talking about it and your experiences in building it, join Humans Behind Code and get interviewed and published on faun.dev!
"My biggest bucket is 350TB or so right now. At one point, it hit 600TB because someone forgot to put a lifecycle on it..."
"We had a bucket that reached 6.8PB. It was backing up giant ERP databases (several 10s of TB per day), and the lifecycle rule had a typo. Expensive mistake, around $500k."
"We store an exabyte and change on s3 total. At one point, we had a bucket with 350PB, but we’ve taken measures to separate that. We still have lots of PB scale buckets."
The book begins with more accessible content about understanding Linux containers and container runtime protection before moving on to more advanced subject matter like advanced attacks on Kubernetes. You'll also learn about:
Installing and configuring multiple types of DevSecOps tooling in CI/CD pipelines
Building a forensic logging system that can provide exceptional levels of detail, suited to busy containerized estates
Securing the most popular container orchestrator, Kubernetes
Hardening cloud platforms and automating security enforcement in the cloud using sophisticated policies
Perfect for DevOps engineers, platform engineers, security professionals and students,Cloud Native Securitywill earn a place in the libraries of all professionals who wish to improve their understanding of modern security challenges.
Open source cloud-native security lake platform (SIEM alternative) for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS