kured
kubespy

kured | kubespy | |
---|---|---|
5 | 12 | |
2,242 | 2,907 | |
1.2% | 0.3% | |
9.2 | 5.4 | |
8 days ago | 10 months ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kured
-
Update notification for kubernetes and control plane components
Maaaaybe, but it's not really what it's suited for. For the Kubernetes host, I'd recommend you enable auto-updates, and then deploy https://github.com/kubereboot/kured to perform reboots as required (you can have it check alertmanager for current alerts, and only do a reboot during a maintenance window if there are no alerts)
-
Examples of how to automatically handle EKS managed node upgrade?
OS patches, which are installed automatically by AKS. If restarts are required, we let https://github.com/weaveworks/kured handle it
-
Interesting tools?
kured : automatic restarts of kubernetes nodes
-
How can I restart a kubernetes node?
See https://github.com/weaveworks/kured or https://github.com/MnrGreg/kubectl-node-restart
-
How do you upgrade your Kubernetes clusters?
You may want to check this https://github.com/weaveworks/kured It is very useful when updating underlying OS on nodes - allows you detect and restart gracefuly
kubespy
-
Python in DevOps: Automation, Efficiency, and Scalability
Terraform and Pulumi automate the provisioning of cloud resources. IaC ensures consistency and eliminates manual errors when setting up infrastructure.
-
Platform Engineering Abstraction: How to Scale IaC for Enterprise
With declarative IaC, integrating external processes into infrastructure deployment often requires workarounds. Platform teams frequently combine declarative IaC with one-off scripts or API calls in their CI/CD pipelines. Tools like AWS CDK (Cloud Development Kit), CDK for Terraform, and Pulumi allow teams to generate IaC using imperative programming languages, enabling platform engineers to create infrastructure code alongside dynamic processes. While this provides greater flexibility and abstraction, it poses a higher adoption barrier for application teams less familiar with these "CDK" frameworks.
-
How I get better feedback on my PRs (and how you can, too)
lang="en"> charset="utf-8"> Hello, world! Hello, world! 👋 Deployed with 💜 by new href="https://pulumi.com/">Pulumi.
-
AWS EC2 Auto Scaling, Target Tracking Policies and Prometheus Exporters
Pulumi IaC will help us bring up our infrastructure on the AWS Cloud. Check out pulumi.com if you still need to become familiar with it. You can deploy this demo stack using the Pulumi button below.
-
Terraform - How do you handle secrets?
There are other infrastructure as code tools that take secrets seriously. Pulumi encrypts all values in state and you can even bring your own key from your cloud provider
-
Observability Mythbusters: Yes, Observability-Landscape-as-Code is a Thing
*Codifying the deployment of the OTel Collector *(to Nomad, Kubernetes, or a VM) using tools such as Terraform, Pulumi, or Ansible. The Collector funnels your OTel data to your Observability back-end. ✅
-
Interesting tools?
KubeSpy - to see what's going on a deployment real time. https://github.com/pulumi/kubespy
-
My "infrastructure as code" tool to manage production-grade clusters
it takes too much time, terraform configs are not easy to use also. Pulumi is much better to maintenance. Cloudy is good enough for launching a production-ready cluster in 5-10 minutes. It could be an alternative to kops
-
We're building an open-source tool to deploy infrastructure in multiple clouds
Just wanted to mention a Terraform alternative I really like, especially cause it's infrastructure as code (IaC) http://pulumi.com/, though I'm not sure about their approach on multi cloud, haven't used it in quite a while
-
Deploying Kubernetes Clusters in Increasingly absurd languages
That is the entire point of Pulumi, you should give it a try
What are some alternatives?
upgrade-manager - Reliable, extensible rolling-upgrades of Autoscaling groups in Kubernetes
google-cloud-cpp - C++ Client Libraries for Google Cloud Services
karpenter-provider-aws - Karpenter is a Kubernetes Node Autoscaler built for flexibility, performance, and simplicity.
pluto - A cli tool to help discover deprecated apiVersions in Kubernetes
draino - Automatically cordon and drain Kubernetes nodes based on node conditions
terraform-aws-ec2-instance - Terraform module for provisioning a general purpose EC2 host
node-ttl - Enforces a time to live (TTL) on Kubernetes nodes and evicts nodes which have expired.
nginx-prometheus-exporter - NGINX Prometheus Exporter for NGINX and NGINX Plus
awesome-k8s-resources - A curated list of awesome Kubernetes tools and resources.
terraform-layout-example - Example of a Truss Terraform project
helm-x - Treat any Kustomization or K8s manifests directory as a Helm chart
OpenSLO - Open specification for defining and expressing service level objectives (SLO)
