komiser
eksctl
komiser | eksctl | |
---|---|---|
11 | 59 | |
3,861 | 4,795 | |
1.0% | 0.9% | |
9.7 | 9.5 | |
1 day ago | 5 days ago | |
Go | Go | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
komiser
- Komiser โ Your cloud resources will have nowhere to hide
-
Can I Mention My Open Source Contributions On My Resume?
Here's my recent Pull request that got merged i am quite new to it its been like 2 months i started open source
-
Productivity hacks for OSS contributors
Note: this comes from the tailwarden project which advertises themselves as open source while using a ELv2 license which puts limitations on certain use. Looks like the project switched from MIT last year.
-
How to practice FinOps with Komiser
Yes its free and open-source project, here's the repo: https://github.com/tailwarden/komiser :)
-
Discover cloud cost savings opportunities with Komiser (OSS Community call)
For anybody interested in cloud savings: Join us tomorrow at 10am UTC to learn how to optimise cloud costs (including Azure) with the open source tool Komiser!
-
Manage Kubernetes objects all in one place with Komiser
Komiser is an open-source cloud cost optimization tool that can help with this challenge. It provides insights into the costs associated with different regions, managed services, and individual resources, making it a valuable addition to any cloud environment. But not only that, Komiser's Kubernetes integration offers even greater visibility into the Kubernetes clusters running on compute instances, allowing users to create custom views that dynamically update to reflect the current state of their microservice resources.
-
Why we made Komiser open sourcea
The tool was open-sourced and become a cloud-agnostic with the support of major cloud providers. Upon release, it gained popularity and my colleague Cyril and I noticed that many organizations shared similar challenges, particularly regarding limited visibility into their infrastructure and related tools. To address this challenge, we launched Tailwarden, an open-core company founded on the principles of Komiser and built on an open-source model. Our aim is to empower developers by improving transparency and collaboration in the cloud. Our mission is to put control of the cloud into the hands of developers by tackling one of the most pressing issues in the space.
-
Tagging Cloud Resources with Komiser
With Komiser, you can connect multiple cloud accounts, and build your cloud inventory in seconds. In the example below, weโve connected an AWS production and sandbox accounts:
-
A multi-cloud cost inspector & optimizer (almost 3k stars)
Neat project! But I noticed it's licensed as ELv2 which isn't typically considered open source, since such a license does not meet the common open source definition due to it's limitations on usage.
-
Komiser vs AWS Resource Explorer
Komiser is an open-source cloud-agnostic resource manager. It integrates with multiple cloud providers (including AWS), builds a cloud asset inventory, and helps you break down your cost at the resource level.
eksctl
-
Auto-scaling DynamoDB Streams applications on Kubernetes
There are a variety of ways in which you can create an Amazon EKS cluster. I prefer using eksctl CLI because of the convenience it offers. Creating an an EKS cluster using eksctl, can be as easy as this:
-
How to migrate Apache Solr from the existing cluster to Amazon EKS
There are many ways to create a cluster such as using eksctl. In my case, I will use terraform module cause itโs easy to reuse and comprehend.
-
Ultimate EKS Baseline Cluster: Part 1 - Provision EKS
eksctl [eksctl] is the tool that can provision EKS cluster as well as supporting VPC network infrastructure.
-
[AWS] EKS vs Self managed HA k3s running on 1x2 ec2 machines, for medium production workload
For this and many other reasons I recommend doing everything in Terraform EXCEPT EKS and its node groups. For that, I use https://eksctl.io/ because it much better manages the lifecycle of EKS and your node groups. I have an blog article better explaining why I recommend it, and another blog article explaining how to do zero-downtime upgrades with EKSCTL.
-
Automating Kong API Gateway deployment with Flux
eksctl
- Export a docker container to a VPC in AWS and exposing it publicly through a loadbalancer
-
Anybody using spot instances for worker nodes?
Second, make sure you create a spot instance group that attempts to launch MULTIPLE different instance types. This way if one instance type gets flushed, your autoscaler will kick in and launch a different type. Without this, you WILL HAVE DOWNTIME if a sudden price hike and flush occurs. If you're using eksctl I have example configurations that use multi-instance types on Github here.
-
Use AWS Controllers for Kubernetes to deploy a Serverless data processing solution with SQS, Lambda and DynamoDB
There are a variety of ways in which you can create an Amazon EKS cluster. I prefer using eksctl CLI because of the convenience it offers. Creating an an EKS cluster using eksctl, can be as easy as this:
-
strategy to upgrade eks cluster
I've written an article on this, with my recommended tool for managing eks EKSCTL.
-
Bootstrapping Kubernetes Cluster with CloudFormation
--- AWSTemplateFormatVersion: '2010-09-09' Parameters: VpcId: Type: AWS::EC2::VPC::Id Description: ID of the VPC in which to create the Kubernetes cluster SubnetIds: Type: List Description: List of Subnet IDs in which to create the Kubernetes cluster KeyPairName: Type: AWS::EC2::KeyPair::KeyName Description: Name of the EC2 Key Pair to use for SSH access to worker nodes ClusterName: Type: String Description: Name of the Kubernetes cluster to create Resources: ControlPlaneSecurityGroup: Type: AWS::EC2::SecurityGroup Properties: VpcId: !Ref VpcId GroupDescription: Allow inbound traffic to the Kubernetes control plane SecurityGroupIngress: - IpProtocol: tcp FromPort: 22 ToPort: 22 CidrIp: 0.0.0.0/0 WorkerNodeSecurityGroup: Type: AWS::EC2::SecurityGroup Properties: VpcId: !Ref VpcId GroupDescription: Allow inbound traffic to Kubernetes worker nodes SecurityGroupIngress: - IpProtocol: tcp FromPort: 22 ToPort: 22 CidrIp: 0.0.0.0/0 ControlPlaneInstanceProfile: Type: AWS::IAM::InstanceProfile Properties: Roles: - !Ref ControlPlaneRole ControlPlaneRole: Type: AWS::IAM::Role Properties: AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: - ec2.amazonaws.com Action: - sts:AssumeRole ManagedPolicyArns: - arn:aws:iam::aws:policy/AmazonEKSClusterPolicy - arn:aws:iam::aws:policy/AmazonEKSServicePolicy ControlPlaneInstance: Type: AWS::EC2::Instance Properties: ImageId: ami-0b69ea66ff7391e80 InstanceType: t2.micro KeyName: !Ref KeyPairName NetworkInterfaces: - DeviceIndex: 0 AssociatePublicIpAddress: true GroupSet: - !Ref ControlPlaneSecurityGroup SubnetId: !Select [0, !Ref SubnetIds] IamInstanceProfile: !Ref ControlPlaneInstanceProfile UserData: Fn::Base64: !Sub | #!/bin/bash echo 'net.bridge.bridge-nf-call-iptables=1' | tee -a /etc/sysctl.conf sysctl -p yum update -y amazon-linux-extras install docker -y service docker start usermod -a -G docker ec2-user curl -o /usr/local/bin/kubectl https://amazon-eks.s3.us-west-2.amazonaws.com/1.21.2/2021-07-05/bin/linux/amd64/kubectl chmod +x /usr/local/bin/kubectl echo 'export PATH=$PATH:/usr/local/bin' >> /etc/bashrc curl --silent --location "https://github.com/weaveworks/eksctl/releases
What are some alternatives?
doctl - The official command line interface for the DigitalOcean API.
terraform-aws-eks - Terraform module to create AWS Elastic Kubernetes (EKS) resources ๐บ๐ฆ
awesome-kubernetes - A curated list of awesome references collected since 2018.
kops - Kubernetes Operations (kOps) - Production Grade k8s Installation, Upgrades and Management
helm - Helm chart for komiser
argo-cd - Declarative Continuous Deployment for Kubernetes
cloud-provider-azure - Cloud provider for Azure
terraform-aws-eks-blueprints - Configure and deploy complete EKS clusters.
aws-cdk - The AWS Cloud Development Kit is a framework for defining cloud infrastructure in code
cluster-api - Home for Cluster API, a subproject of sig-cluster-lifecycle
komiser - The open-source cloud environment inspector ๐ฎ [Moved to: https://github.com/tailwarden/komiser]
eks-anywhere - Run Amazon EKS on your own infrastructure ๐