cli
gardener
cli | gardener | |
---|---|---|
14 | 9 | |
276 | 2,755 | |
1.4% | 1.4% | |
0.0 | 9.9 | |
over 1 year ago | 6 days ago | |
Go | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cli
-
Show HN: Eleven – open-source alternative to Codespaces
Congratulations on your release
Please don't mandate the use of static AWS credentials; the aws sdk is capable of abstracting away all those gory details for you, including allowing someone to use those env-vars if they really want, but forcing them is a headache for an organization that uses AssumeRole (or its friends) for everything: https://github.com/eleven-sh/cli/blob/v0.0.4/internal/cloudp...
I wasn't readily able to find the Route53 logic; how are those "serve --as" domains created/updated?
- Show HN: Eleven – Self-hosted Codespaces alternative (side-project)
- Show HN: Eleven – Code sandboxes running in your cloud provider account
- Show HN: Eleven – Free, open-source, Codespaces alternative with automatic HTTPS
- Show HN: Free, open-source Codespaces alternative with automatic HTTPS
- I’m building a free and open-source Codespaces alternative
- Eleven - Free, open-source Codespaces alternative
-
Does anyone else finds AWS and other Amazon services overly complicated?
Same sentiment here.
Shameless plug but, as a side-project, I'm working on an open-source CLI to abstract away the complexity of deploying simple things on cloud providers.
If anyone wants to contribute.
[1] https://github.com/eleven-sh/cli
- Show HN: Eleven – Code sandboxes with automatic HTTPS
- Eleven – Code sandboxes with automatic HTTPS
gardener
- Introducing Gardener, your ultimate companion for effortless Kubernetes cluster management!
-
How does managed kubernetes providers hide the control plane?
Now, if you want to dig further on how cloud providers operate, like I said, most are actually using Kubernetes to automate the client control plane management. There is a cloud-neutral project for this out there called Gardener, they have a few architecture documents which explain the concept a bit further. In their garden metaphor, the seed cluster hosts the client control planes, and the shoot clusters are the client clusters (which are only made of worker nodes, no control-plane node). Another more specialized implementation is Kubernikus for OpenStack.
- Where can I find managed K8s for the price of managed ECS?
-
Alternative to Rancher as a multi-cluster management platform?
Gardener: https://github.com/gardener/gardener RH HyperShift: https://github.com/openshift/hypershift
-
Can we use a worker node of one kubernetes cluster as master node of another k8s cluster?
Gardener does exactly that. One global cluster manages smaller per-region/cloud provider management clusters and those will contain the control planes of your workload clusters. This way you can have like 10 000 clusters and not deal with multi-tenant issues. One workload = 1 cluster.
-
Over a fifty K8s clusters?
We had cluster of cluster style management managing 100s of cluster. Check out https://github.com/gardener/gardener for an inspiration
- Why aren't there any manged Kubernetes Control Plane as a Service offering out there?
- Datenschutz: SAP und Arvato bauen Verwaltungs-Cloud mit Microsoft-Technik
-
Amazon EKS Anywhere
How does this compare against simply using Gardener [0]?
[0] https://github.com/gardener/gardener
What are some alternatives?
club-noira - Amazon Product Lookup [Moved to: https://github.com/canercetin-randomguy/amazon-suppressed-check]
terraformer - CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code
crossplane - The Cloud Native Control Plane
eks-anywhere - Run Amazon EKS on your own infrastructure 🚀
kube-no-trouble - Easily check your clusters for use of deprecated APIs
eks-distro - Amazon EKS Distro (EKS-D) is a Kubernetes distribution based on and used by Amazon Elastic Kubernetes Service (EKS) to create reliable and secure Kubernetes clusters.
Pulumi - Pulumi - Infrastructure as Code in any programming language. Build infrastructure intuitively on any cloud using familiar languages 🚀
cloudpods - A cloud-native open-source unified multi-cloud and hybrid-cloud platform. 开源、云原生的多云管理及混合云融合平台
systemk - Systemk is a systemd backend for the virtual-kubelet. Instead of starting containers, you start systemd units.
kube-ns-suspender - A k8s controller that scales up and down namespaces on-demand with an embedded friendly UI and a Prometheus exporter. Inspired by kube-downscaler.
azure-key-vault-to-kubernetes - Azure Key Vault to Kubernetes (akv2k8s for short) makes it simple and secure to use Azure Key Vault secrets, keys and certificates in Kubernetes.
ocm - Core components in the OCM project. Report here if you found any issues in OCM.