Reza Alavi (@rezamalavi) 's Twitter Profile
Reza Alavi

@rezamalavi

Ever tried. Ever failed. No matter. Try Again. Fail again. Fail better. #riskmanagement #cybersecurity #DevSecOps #Cloudsecurity #devops #DevRiskOps

ID: 84676394

calendar_today23-10-2009 20:09:30

44,44K Tweet

344 Followers

1,1K Following

Kubernetes Architect (@k8sarchitect) 's Twitter Profile Photo

In this two-part tutorial, you'll learn how to use the Atlas Operator with Atlas Cloud and ArgoCD to create a modern GitOps workflow for managing your database migrations natively in Kubernetes ➤ atlasgo.io/blog/2023/12/0…

In this two-part tutorial, you'll learn how to use the Atlas Operator with Atlas Cloud and ArgoCD to create a modern GitOps workflow for managing your database migrations natively in Kubernetes

➤ atlasgo.io/blog/2023/12/0…
Kubernetes Architect (@k8sarchitect) 's Twitter Profile Photo

This article discusses the difference between Kubernetes readiness and GCP's Application Load Balancer health checks Despite a pod being marked as unready by Kubernetes, if GCP's health check deems it healthy, traffic will still be forwarded to it ➜ medium.com/google-cloud/u…

This article discusses the difference between Kubernetes readiness and GCP's Application Load Balancer health checks

Despite a pod being marked as unready by Kubernetes, if GCP's health check deems it healthy, traffic will still be forwarded to it

➜ medium.com/google-cloud/u…
Kubesploit (@kubesploit) 's Twitter Profile Photo

The tutorial discusses the importance of using signed and encrypted container images to enhance security in Kubernetes workloads It uses Podman to create, sign, and verify container images on standalone systems and Kubernetes clusters ➤ itnext.io/securing-kuber…

Kubernetes Architect (@k8sarchitect) 's Twitter Profile Photo

This article introduces Argo Events and covers producing events with EventSource, creating webhook event sources, and consuming events with sensors, including HTTP triggers ➜ medium.com/@chukmunnlee/a…

This article introduces Argo Events and covers producing events with EventSource, creating webhook event sources, and consuming events with sensors, including HTTP triggers

➜ medium.com/@chukmunnlee/a…
Kubesploit (@kubesploit) 's Twitter Profile Photo

This introduction to Kubernetes security discusses authentication, authorization, admission controllers, pod security policies, control plane hardening, logging and network security ➤ medium.com/@noah_h/an-int…

This introduction to Kubernetes security discusses authentication, authorization, admission controllers, pod security policies, control plane hardening, logging and network security

➤ medium.com/@noah_h/an-int…
Learnk8s (@learnk8s) 's Twitter Profile Photo

In this article, you will explore Kubernetes Events and learn to use kubectl events to monitor and troubleshoot your cluster's issues effectively ➜ decisivedevops.com/kubernetes-eve…

In this article, you will explore Kubernetes Events and learn to use kubectl events to monitor and troubleshoot your cluster's issues effectively

➜ decisivedevops.com/kubernetes-eve…
Kubernetes Architect (@k8sarchitect) 's Twitter Profile Photo

GitOps Bridge is a community project that aims to showcase best practices and patterns for bridging the process of creating a Kubernetes cluster and subsequently managing everything through GitOps It focuses on using ArgoCD or FluxCD ➜ github.com/gitops-bridge-…

Learnk8s (@learnk8s) 's Twitter Profile Photo

The article explains how taints and tolerations work, provides use cases for this feature, and a step-by-step guide on how to apply them ➤ semaphoreci.com/blog/kubernete…

The article explains how taints and tolerations work, provides use cases for this feature, and a step-by-step guide on how to apply them

➤ semaphoreci.com/blog/kubernete…
Cloud Native Islamabad (@cloudislamabad) 's Twitter Profile Photo

Best Practices for Continuous Security and Compliance for Google Kubernetes Engine (GKE — Standard Deployment) Read more: medium.com/@kessilerrodri…

Red Hat Developer (@rhdevelopers) 's Twitter Profile Photo

🎉 Red Hat Developer Hub 1.2 is now generally available. Explore new features, including new audit logs, RBAC conditional policies, FieldExtensions, and so much more. Check it out. red.ht/4cBWKnB

Reza Alavi (@rezamalavi) 's Twitter Profile Photo

Check out the latest article in my newsletter: Is Change Fatigue and Burnout Derailing Your Digital Transformation? Here's Your Action Plan linkedin.com/pulse/change-f… via LinkedIn

Learnk8s (@learnk8s) 's Twitter Profile Photo

The article discusses challenges in GPU virtualization on Kubernetes, focusing on underutilization due to exclusive GPU assignments It explores time-sharing GPUs and enforcing GPU memory slicing, highlighting their limitations ➜ arrikto.com/blog/gpu-virtu…

The article discusses challenges in GPU virtualization on Kubernetes, focusing on underutilization due to exclusive GPU assignments

It explores time-sharing GPUs and enforcing GPU memory slicing, highlighting their limitations

➜ arrikto.com/blog/gpu-virtu…
Kubesploit (@kubesploit) 's Twitter Profile Photo

Reflector is a Kubernetes addon designed to monitor changes to resources (Secrets and ConfigMaps) and reflect changes to mirror resources in the same or other namespaces ➜ github.com/emberstack/kub…

Learnk8s (@learnk8s) 's Twitter Profile Photo

This week on the Learn Kubernetes Weekly: 💰 Kubernetes cost benchmark report 2024 📕 Kubernetes API guide 🛟 ETCD: DR solution 📉 Reduce Prometheus load and cardinality 🙉 ConfigMap conundrum Read it now: learnk8s.io/issues/88

This week on the Learn Kubernetes Weekly:

💰 Kubernetes cost benchmark report 2024
📕 Kubernetes API guide
🛟 ETCD: DR solution
📉 Reduce Prometheus load and cardinality
🙉 ConfigMap conundrum

Read it now: learnk8s.io/issues/88
Kubernetes Architect (@k8sarchitect) 's Twitter Profile Photo

This article explores the interaction between containers, the JVM, and the CFS scheduler in the Linux Kernel It explains how CPU time is allocated, the impact of CPU requests and limits in Kubernetes, and the consequences of throttling ➜ medium.com/@frommeyerc/co…

This article explores the interaction between containers, the JVM, and the CFS scheduler in the Linux Kernel

It explains how CPU time is allocated, the impact of CPU requests and limits in Kubernetes, and the consequences of throttling

➜ medium.com/@frommeyerc/co…
Learnk8s (@learnk8s) 's Twitter Profile Photo

This case study discusses how the team at City Storage Systems manages over 100 multi-tenant Kubernetes clusters Using Cluster API, they have achieved complete automation in cluster provisioning, lifecycle management, and upgrades ➜ techblog.citystoragesystems.com/p/managing-100…

This case study discusses how the team at City Storage Systems manages over 100 multi-tenant Kubernetes clusters

Using Cluster API, they have achieved complete automation in cluster provisioning, lifecycle management, and upgrades

➜ techblog.citystoragesystems.com/p/managing-100…
Kubernetes Architect (@k8sarchitect) 's Twitter Profile Photo

Are you planning to deploy Argo CD and support a lot of Kubernetes clusters? In this article, you'll cover the different deployment strategies and architectures used, along with their pros and cons ➜ codefresh.io/blog/a-compreh…

Are you planning to deploy Argo CD and support a lot of Kubernetes clusters?

In this article, you'll cover the different deployment strategies and architectures used, along with their pros and cons

➜ codefresh.io/blog/a-compreh…
Kubernetes Architect (@k8sarchitect) 's Twitter Profile Photo

Glasskube will help you install your favorite Kubernetes packages using the Glasskube UI to reduce complexity and increase transparency ➤ github.com/glasskube/glas…

Kubesploit (@kubesploit) 's Twitter Profile Photo

kube-lock sits as an intermediary between you and kubectl, allowing you to lock and unlock contexts It prevents misfires to production / high-value Kubernetes clusters that you might have strong IAM privileges on ➜ github.com/chaosinthecrd/…

Kubesploit (@kubesploit) 's Twitter Profile Photo

The article explains the concept of Network Policies in AKS, their importance in securing clusters, and how to create basic network policies ➤ medium.com/@siddiquimoham…

The article explains the concept of Network Policies in AKS, their importance in securing clusters, and how to create basic network policies

➤ medium.com/@siddiquimoham…