kubernetes-conjur-demo
axiom-demo
kubernetes-conjur-demo | axiom-demo | |
---|---|---|
1 | 3 | |
11 | 13 | |
- | - | |
2.9 | 4.9 | |
6 months ago | over 2 years ago | |
Shell | Shell | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubernetes-conjur-demo
-
Securing Kubernetes Secrets with Conjur
Conjur policies help define objects in its database in a tree structure. Some examples of the objects defined in the policies are users, roles, secrets & applications. It also defines rules the for role based access control. While the Conjur documentation defines the policy best practices, we will use one of the Conjur demo repositories to define policies. I've used policies in the demo repository as the base and have further simplified them to understand the basic concepts better. Download and review the simplified policy files from my repository. Note that all the policies need to have a .yml extension.
axiom-demo
-
Observability Is Not Only for SREs
> The solution goes - Splunk is too expensive, let's ditch logs altogether and hope we capture some metrics and plot them in nice dashboards. Instead of dumping the logs highly compressed into cheap s3 and running some Snowflake or Spark on it later.
I don't usually promote on HN but this is exactly why we built https://axiom.co! We've been working on this problem for some time, essentially allowing schema-less/index-free ingest, S3-based storage in a highly-efficient format, and then querying with a Splunk-like (specifically Kusto-inspired) language via serverless functions.
We built it because we also realised we would avoid or think too much about logging (cost, scaling, retention, etc) which led to compromises either in our monitoring or later when we wanted to dive in and try and draw some insights/analytics from that kind of data.
-
Better log/analytics for your Vercel projects
At Axiom we put together a Vercel integration, that enables you to monitor the health and performance of your Vercel deployments by ingesting all your request and function logs.
- Show HN: Axiom Demo
What are some alternatives?
examples - Apache Kafka, Apache Flink and Confluent Platform examples and demos
conjur-oss-helm-chart - Helm chart for deploying Conjur OSS to Kubernetes
kenzer - automated web assets enumeration & scanning [DEPRECATED]
tuterm - A better way to learn CLI programs.
axiom-honeycomb-proxy - A log forwarder/multiplexer for Axiom and Honeycomb.
drone-on-k8s - A simple demo and on how to setup Drone on local Kubernetes cluster
aeson-pretty - JSON pretty-printing library and command-line tool.
k3d-demo - Demo of k3d: Tool to run k3s (Kubernetes) in Docker
avro-piper - Console utilities for Avro
axiom - The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
demo-scene - Scripts and samples to support Confluent Demos, Talks, and Blogs. Not all of the examples in this repository are kept up to date. For automated tutorials and QA'd code, see https://github.com/confluentinc/tutorials/