distribution-spec
awesome-tunneling
Our great sponsors
distribution-spec | awesome-tunneling | |
---|---|---|
54 | 112 | |
735 | 13,228 | |
4.1% | - | |
7.8 | 6.4 | |
7 days ago | 10 days ago | |
Go | ||
Apache License 2.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
distribution-spec
-
The transitory nature of MLOps: Advocating for DevOps/MLOps coalescence
Back in 2013, a little company called Docker made it really easy to start using containers to package up applications. A big key to their success was the OCI (you can learn about that here), an industry wide initiative to have standards around how we package up our applications. Because of OCI standards, we have hundreds (maybe thousands?) of tools that can be combined to manage and deploy applications. So why arenβt we using this for packaging up Notebooks and AI models as well? It would make deploying, sharing, and managing our models easier for everyone involved.
-
The Road To Kubernetes: How Older Technologies Add Up
Kubernetes on the backend used to utilize docker for much of its container runtime solutions. One of the modular features of Kubernetes is the ability to utilize a Container Runtime Interface or CRI. The problem was that Docker didn't really meet the spec properly and they had to maintain a shim to translate properly. Instead users could utilize the popular containerd or cri-o runtimes. These follow the Open Container Initiative or OCI's guidelines on container formats.
-
Coexistence of containers and Helm charts - OCI based registries
OCI stands for Open Container Initiative, and its goal as an organization is to define a specification for container formats and runtime.
-
Bazzite β a Steam0S-like OCI image for desktop, living room, and handheld PCs
https://opencontainers.org/
Here is Containerfile from the repo: https://github.com/ublue-os/bazzite/blob/main/Containerfile
-
Distroless images using melange and apko
apko allows us to build OCI container images from .apk packages.
- OCI image from dockerfile
- Fat OCI images are a cultural problem
-
Progressive Delivery on AKS: A Step-by-Step Guide using Flagger with Istio and FluxCD
Flagger's load testing service can be installed via a Kustomization resource based on manifests packaged as an artifact in an Open Container Initiative (OCI) registry
-
Creating Kubernetes Cluster With CRI-O
CRI-O is a lightweight container runtime for Kubernetes. It is an implementation of Kubernetes CRI to use Open Container Initiative (OCI) compatible runtimes for running pods. It supports runc and Kata Containers as the container runtimes, but any OCI-compatible runtime can be integrated.
-
What is the current status of Docker and how far is it from getting ported?
So somebody else created runj (runj is an experimental, proof-of-concept OCI-compatible runtime for FreeBSD jails.) https://github.com/samuelkarp/runj
awesome-tunneling
-
Portr: Open-Source Ngrok Alternative
https://github.com/anderspitman/awesome-tunneling
-
Can You Grok It β Hacking Together Your Own Dev Tunnel Service
awesome-tunneling lists a number of ngrok alternatives: https://github.com/anderspitman/awesome-tunneling
- https://news.ycombinator.com/item?id=39754786
- FWIU headscale works with the tailscale client and supports MagicDNS
-
Do You Need IPv4 Anymore?
There are a whole bunch of alternatives too - https://github.com/anderspitman/awesome-tunneling. I will advocate for zrok.io as I work on its parent project, OpenZiti. zrok is open source and has a free SaaS as well as more built in security.
-
Reverst: Reverse Tunnels in Go over HTTP/3 and QUIC
https://github.com/anderspitman/awesome-tunneling. Seems similar to zrok.io, ngrok, cloudflare tunnels, tailscale funnels and zrok although you're using http/3 explicitly.
Personally I work on two similar projects you might want to check out: zrok and OpenZiti. Similar projects, but zrok is closest to what you did here.
-
Portr β open-source ngrok alternative designed for teams
Thanks for the history. I maintain this list[0], and wasn't aware of OG localtunnel, likely because there's a somewhat newer and now more popular project with the same name[1]. You appear to be correct on timing. Here's the earliest commits on GitHub for each of the projects:
OG localtunnel (2010): https://github.com/progrium/localtunnel/tree/fb82920d9d3e538...
Other localtunnel (2012): https://github.com/localtunnel/localtunnel/tree/93d62b9dbb9f...
ngrok (2012): https://github.com/inconshreveable/ngrok/tree/8f4795ecac7f92...
I'll see that OG localtunnel gets added to the list for posterity.
[0]: https://github.com/anderspitman/awesome-tunneling
[1]: https://github.com/localtunnel/localtunnel
-
Tunnelmole, an ngrok alternative (open source)
I haven't tried vscode forwarding. What features does it have that are missing from most of the options on the list[0]?
If you want a nice GUI for remote managing maybe check out one of my tools, boringproxy
[0]: https://github.com/anderspitman/awesome-tunneling
-
JIT WireGuard
I maintain this list:
https://github.com/anderspitman/awesome-tunneling
Your use case sounds interesting and there may be a tool out there that will do it, but I can't quite wrap my head around your description of how everything is connected and what runs where with your current setup.
I agree with sibling that my main question is what prevents you from using SSHFS or similar?
-
Hesitating between Tailscale Funnel / Cloudflare tunnel and others
I'm starting to try to get into Cloudflare tunnel, Tailscale funnel and other alternatives. What I need is my services to be accessible without any installation client-side, and I'm unsure what services provide this. I also looked at solutions like BoringProxy, TunnelMole from this page : https://github.com/anderspitman/awesome-tunneling My goal is to have my current domain rented at OVH pointing to my server to make it as much like before as possible.
-
My ISP doesn't allow port forwarding. What are my options ?
Here's a list of options to get around CGNAT: https://github.com/anderspitman/awesome-tunneling
-
Would we still create Nebula today?
We have a section for overlay networks on the tunneling list[0] I maintain. This is a very interesting space with some excellent software.
I certainly have my gripes about the closed nature of Slack itself, in particular using a closed protocol when the model is clearly "federated" between multiple servers internally. That said, the contribution of something on the scale and quality of Nebula back to the open source community is hard to argue with.
[0]: https://github.com/anderspitman/awesome-tunneling#overlay-ne...
What are some alternatives?
jib - π Build container images for your Java applications.
cloudflared - Cloudflare Tunnel client (formerly Argo Tunnel)
spin - Spin is the open source developer tool for building and running serverless applications powered by WebAssembly.
frp - A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
proxmox-lxc-idmapper - Proxmox unprivileged container/host uid/gid mapping syntax tool.
Jellyfin - The Free Software Media System
appleprivacyletter - An open letter against Apple's new privacy-invasive client-side content scanning.
yunohost - YunoHost is an operating system aiming to simplify as much as possible the administration of a server. This repository corresponds to the core code, written mostly in Python and Bash.
dive - A tool for exploring each layer in a docker image
SirTunnel - Minimal, self-hosted, 0-config alternative to ngrok. Caddy+OpenSSH+50 lines of Python.
bartholomew - The Micro-CMS for WebAssembly and Spin
remotemoe - tunnels to localhost and other ssh plumbing