traefik
pumba
traefik | pumba | |
---|---|---|
4 | 1 | |
36,761 | 2,701 | |
- | - | |
9.4 | 5.2 | |
about 2 years ago | 6 months ago | |
Go | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
traefik
-
Traefik : Add Custom Header Only for specific files
UPDATE: ATM this is not possible via traefik. I have openend an issue : https://github.com/containous/traefik/issues/4228
-
uwsgi master graceful shutdown
;https://uwsgi-docs.readthedocs.io/en/latest/HTTP.htmlhttp = :8080wsgi-file = main.pycallable = wsgi_applicationprocesses = 2enable-threads = truemaster = truereload-mercy = 30worker-reload-mercy = 30log-5xx = truelog-4xx = truedisable-logging = truestats = 127.0.0.1:1717stats-http = truesingle-interpreter= true;https://github.com/containous/traefik/issues/615http-keepalive=trueadd-header = Connection: Keep-Alive
-
Back to basics: accessing Kubernetes pods
It's implementation-dependent and implementations offer different features, e.g., Nginx, Traefik, HAProxy, etc.
-
Install letsecrypt certificates on all your docker containers
version: "3" services: influx: image: influxdb:1.7 # or any other recent version labels: # SSL endpoint - "traefik.http.routers.influx-ssl.entryPoints=port8086" - "traefik.http.routers.influx-ssl.rule=host(`influx.mydomain.com`)" - "traefik.http.routers.influx-ssl.tls=true" - "traefik.http.routers.influx-ssl.tls.certResolver=le-ssl" - "traefik.http.routers.influx-ssl.service=influx-ssl" - "traefik.http.services.influx-ssl.loadBalancer.server.port=8086" restart: always container_name: influxdb volumes: - influx-data:/var/lib/influxdb environment: # - INFLUXDB_DB= - INFLUXDB_HTTP_ENABLED=true - INFLUXDB_HTTP_AUTH_ENABLED=true # - INFLUXDB_ADMIN_USER= # - INFLUXDB_ADMIN_PASSWORD= grafana: labels: # SSL redirect requires a separate router (https://github.com/containous/traefik/issues/4688#issuecomment-477800500) - "traefik.http.routers.grafana.entryPoints=port80" - "traefik.http.routers.grafana.rule=host(`grafana.mydomain.com`)" - "traefik.http.middlewares.grafana-redirect.redirectScheme.scheme=https" - "traefik.http.middlewares.grafana-redirect.redirectScheme.permanent=true" - "traefik.http.routers.grafana.middlewares=grafana-redirect" # SSL endpoint - "traefik.http.routers.grafana-ssl.entryPoints=port443" - "traefik.http.routers.grafana-ssl.rule=host(`grafana.mydomain.com`)" - "traefik.http.routers.grafana-ssl.tls=true" - "traefik.http.routers.grafana-ssl.tls.certResolver=le-ssl" - "traefik.http.routers.grafana-ssl.service=grafana-ssl" - "traefik.http.services.grafana-ssl.loadBalancer.server.port=3000" image: grafana/grafana container_name: grafana restart: always volumes: - grafana-data:/var/lib/grafana environment: - GF_SERVER_ROOT_URL=https://grafana.mydomain.com - GF_SERVER_DOMAIN=grafana.mydomain.com - GF_USERS_ALLOW_SIGN_UP=false volumes: traefik-data: influx-data: grafana-data:
pumba
-
Docker networks explained - part 2: docker-compose, microservices, chaos monkey
I highly recommend looking at Pumba a project that lets you pause services, kill them, but also add network delay, loss, corruption etc.
What are some alternatives?
metallb - A network load-balancer implementation for Kubernetes using standard routing protocols
litmus - Litmus helps SREs and developers practice chaos engineering in a Cloud-native way. Chaos experiments are published at the ChaosHub (https://hub.litmuschaos.io). Community notes is at https://hackmd.io/a4Zu_sH4TZGeih-xCimi3Q
simple-go-boilerplate - Simple microservices-oriented go project layout boilerplate to provide some ideas and tips.
tlp-stress - A workload-centric stress tool for Apache Cassandra. Designed for simplicity, no math degree required.
kubernetes-ingress - NGINX and NGINX Plus Ingress Controllers for Kubernetes
goss - Quick and Easy server testing/validation
aws-ecr-image-pull-secret-controller - Custom controller for Kubernetes which automatically renews image pull secrets for AWS ECR
gorm-sqlchaos - GORM SQLChaos manipulates DML at program runtime based on gorm
xdcc-cli - A command line tool for searching and downloading files from the IRC network.
chaosmeta - A chaos engineering platform for supporting the complete fault drill lifecycle.
kubebrain - A High Performance Metadata System for Kubernetes
chaos-controller - :monkey: :fire: Datadog Failure Injection System for Kubernetes