goss
istio
Our great sponsors
goss | istio | |
---|---|---|
13 | 87 | |
5,441 | 34,943 | |
0.8% | 1.3% | |
7.6 | 10.0 | |
4 days ago | 5 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
goss
-
Tools for validating K8s features
Certain checks may be possible with goss and the kgoss wrapper: https://github.com/goss-org/goss/tree/master/extras/kgoss
-
Is docker the right tool for my use case? (testing an installscript)
Docker would work. I suggest also integrating infrastructure tests to validate your install script behaved as expected. For example, you could use goss.
-
Alternative to InSpec: what do you use to "assert things have been correctly configured"?
I've used https://github.com/goss-org/goss in the past and enjoyed it
-
Portable security testing tooling (not chef inspec)
To answer my own question... https://github.com/goss-org/goss looks like it might do the job - at least for Linux. Windows support is alpha - and there isn't a wealth of CIS benchmarks. Might be a good project to contribute to
-
Implement DevSecOps to Secure your CI/CD pipeline
Adding an extra layer of security on the container image to verify if it is working as expected and has all required files with correct permissions. We can use dgoss to do validation tests of container images.
-
What are some of the best tools you have discovered as a Sysadmin?
Bit of a strange one here - Goss. This is a testing tool that we use on all of our servers to validate they are working as expected. Think of it as a sanity check after changes. We have a set of tests setup that validate that the server is working as expected and we run it automatically after any change.
-
what's your goto tool for smoke-testing your site? tls, security headers, 401's, 403's, custom 404, 500 pages, redirects etc.
check out https://github.com/aelsabbahy/goss
- CI/CD Pipelines for testing standard open-source Distro like Ubuntu with docker images on it?
- Looking for tools to help smoke test kubernetes clusters
-
How To Use Terraform like a Pro: Part 1
Use GOSS, a YML-based open-source tool that can assert the test results (i.e., verifying if the SSH port 22 is closed or not).
istio
-
Improve your EKS cluster with Istio and Cilium : Better networking and security
Istio is a popular open-source service mesh framework that provides a comprehensive solution for managing, securing, and observing microservices-based applications running on Kubernetes.
-
Optimal JMX Exposure Strategy for Kubernetes Multi-Node Architecture
Leverage a service mesh like Istio or Linkerd to manage communication between microservices within the Kubernetes cluster. These service meshes can be configured to intercept JMX traffic and enforce access control policies. Benefits:
-
Open Source Ascendant: The Transformation of Software Development in 2024
Open Source and Cloud Computing: A Match Made in Heaven The cloud is accelerating OSS adoption. Cloud-native technologies like Kubernetes [https://kubernetes.io/] and Istio [https://istio.io/], both open-source projects, are revolutionizing how applications are built and deployed across cloud platforms.
-
Delving Deeper: Enriching Microservices with Golang with CloudWeGo
Consider the case of Bookinfo, a sample application provided by Istio, rewritten using CloudWeGo's Kitex for superior performance and extensibility.
-
How to Build & Deploy Scalable Microservices with NodeJS, TypeScript and Docker || A Comprehesive Guide
It is a dedicated infrastructure layer that manages service-to-service communication, providing features like load balancing, encryption, authentication, and monitoring. Istio deploys sidecar proxies alongside each microservice instance. These proxies handle communication, providing features like load balancing, service discovery, encryption, monitoring and authentication.
-
Caddy for Certs and Istio for Reverse Proxy
5Y old post that sounds like they've done similar here: Caddy Issue Istio Issue but doesn't cover much of the implementation
- Understanding Istio: A Beginner's Guide to Service Mesh
-
Developer’s Guide to Building Kubernetes Cloud Apps ☁️🚀
In a production environment there will be a load balancer setup with an Ingress Controller, Service Mesh or some type of Custom Router. This allows all traffic to be sent to the single load balancer IP address and then route the traffic to a service based on the Domain name or subpath. We are using a NGINX ingress controller but service meshes like Istio have been becoming the most popular solution to use as they offer more segmentation, security and granular control.
-
Progressive Delivery on AKS: A Step-by-Step Guide using Flagger with Istio and FluxCD
Flagger is a progressive delivery tool that enables a Kubernetes operator to automate the promotion or rollback of deployments based on metrics analysis. It supports a variety of metrics including Prometheus, Datadog, and New Relic to name a few. It also works well with Istio service mesh, and can implement progressive traffic splitting between primary and canary releases.
-
Implementing TLS in Kubernetes
End-to-end data encryption with a service mesh: Using an end-to-end data encryption mechanism with a service mesh like Istio, TLS can secure communication between different microservices within a Kubernetes cluster. This is a popular approach for modern, distributed microservice architectures.
What are some alternatives?
container-structure-test - validate the structure of your container images
osm - Open Service Mesh (OSM) is a lightweight, extensible, cloud native service mesh that allows users to uniformly manage, secure, and get out-of-the-box observability features for highly dynamic microservice environments.
inspec - InSpec: Auditing and Testing Framework
keda - KEDA is a Kubernetes-based Event Driven Autoscaling component. It provides event driven scale for any container running in Kubernetes
ansible-collection-hardening - This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL
anthos-service-mesh-packages - Packaged configuration for setting up a Kubernetes cluster with Anthos Service Mesh features enabled
rspec-terraform-based
crossplane - The Cloud Native Control Plane
configure-aws-credentials - Configure AWS credential environment variables for use in other GitHub Actions.
falco - Cloud Native Runtime Security
bats - Bash Automated Testing System
kratos - Your ultimate Go microservices framework for the cloud-native era.