If you work with Kubernetes or just want to, this video is a must-watch. I started it out of curiosity. I just want to know how things work or managed at scale. By the end, I had good solid notes. Somethings I learned: How upgrades at scale work What bottlenecks come at top scale How to manage rollout failures at scale How CRDs are used to make developers life easy Lessons from migrating from legacy systems to K8s And much more. Lastly, I have to thank Gaurav Gupta for recommending this. It was quite informative. watch it here https://lnkd.in/gqgqa-c6 Hope it's useful. Thank you for reading 😀
Learn Kubernetes at scale: A must-watch video
More Relevant Posts
-
🚀 Debugging Kubernetes Shouldn’t Be a Hassle — Meet K9s 🐶 “When debugging Kubernetes feels like chasing your tail, K9s is the leash you actually need.” I recently shared a write-up on how K9s, a terminal UI for Kubernetes, helps developers and SREs navigate and debug clusters with less friction and more clarity. Here’s what it brings to the table: ✅ One interface to browse pods, services, namespaces ✅ One‑key access to logs, shell, describe, edit, and restart ✅ Fast filtering and contextual navigation ✅ A practical example: fixing CrashLoopBackOff step-by-step ✅ Bonus: includes a visual flowchart + power tips If you work with Kubernetes daily, this tool can really help streamline your workflow — especially when you're deep in the terminal. 💬 Curious to hear what tools or tricks you use to troubleshoot in Kubernetes. 👇 Full article link: https://lnkd.in/ghUGxYVB #Kubernetes #DevOps #K9s #Debugging #CloudNative #TerminalTools #SRE #PlatformEngineering
To view or add a comment, sign in
-
For years, Docker has been the name in containers. But lately, Podman has been making waves not just as an alternative, but as a rethink of how containers should work. 🐳 Docker runs on a background daemon (dockerd), it’s consistent and familiar, but also means one central service with elevated privileges. 🪶 Podman, by contrast, is daemonless. Each container is a child process of your shell. No privileged background service, no single point of failure, just clean Unix simplicity. 🔒 Podman was also rootless from day one. That’s huge for security-conscious environments. Docker has rootless modes now, but it’s not the default. 💡 And here’s the clever bit: Podman kept the same CLI syntax as Docker. Most commands work the same, you can even alias docker to podman and keep muscle memory intact. The tradeoff? Docker still wins on polish, ecosystem, and developer tooling. Podman shines where security, simplicity, and system integration matter most. It’s not really a fight to the death, more like friendly competition that benefits everyone. Containers are growing up, and so are the tools that power them. Are you still team Docker, or have you made the switch to Podman? #Docker #Podman #Containers #DevOps #SoftwareEngineering #Infrastructure
To view or add a comment, sign in
-
-
GitOps brings version control to your infrastructure. No more drift. No more mystery configs. Declare your infra in Git, sync it continuously, and roll back when needed — just like code. Your CI/CD pipeline's best friend. Read more: https://lnkd.in/gqB7uN57 #GitOps #InfrastructureAsCode #SlickFinch
To view or add a comment, sign in
-
-
GitOps brings version control to your infrastructure. No more drift. No more mystery configs. Declare your infra in Git, sync it continuously, and roll back when needed — just like code. Your CI/CD pipeline's best friend. Read more: https://lnkd.in/gWHKyzDg #GitOps #InfrastructureAsCode #SlickFinch
To view or add a comment, sign in
-
-
My latest addition to the EKS platform project is a safety net for deployments: automated Helm rollbacks. The reasoning is pretty practical. While CI pipelines are great, some deployment failures only become obvious after they're applied to a cluster. Instead of requiring manual intervention to fix a bad release, I wanted the platform to be able to heal itself and decrease my MTTR during failed changes. https://lnkd.in/g_RcaxJx Now, if a Helm deployment fails its health checks, the system will automatically trigger a rollback to the last known-good version. https://lnkd.in/g_RcaxJx
To view or add a comment, sign in
-
🚀 Silent Conversations Between Docker Containers Most teams jump straight to heavy service meshes or API gateways for container-to-container communication. But sometimes, the simplest way is also the most powerful. Gave one container Docker privileges and kept the rest fully isolated. No over-engineering — just raw TCP sockets + socat + bash. ✅ What it does: - A single “docker host” container listens on a TCP port. - It safely exposes only what’s needed: docker start / docker stop. - Other containers can signal when they’re ready — so Jenkins stops guessing and starts waiting for real readiness. 💡 Why it matters: 🔒 Security — only one node can control Docker. 🪶 Lightweight — no REST APIs or service mesh. ⏱ Predictable — builds wait for actual readiness, not arbitrary sleeps. This approach quietly powers Android emulators, Appium servers, and a full CI/CD flow — reliable and minimal. Full article and source code : https://lnkd.in/eP2vGkzz 👉 Sometimes the best architecture isn’t more complexity — it’s removing it. #Docker #DevOps #CI/CD #KotlinMultiplatform #Android
To view or add a comment, sign in
-
🚀 For DevOps Engineers Who Live in the Terminal I’ve just published a comprehensive Linux command reference guide on my GitHub. This isn’t just another command list — it’s a well-structured, practical .md reference with: ✅ Clear explanation of what each command does 🧰 Syntax and options simplified 🧠 Usage notes that help you understand why and when to use them 📝 Real-world examples you can copy-paste into your workflow If you work with: Servers (Ubuntu / Linux) Cloud infrastructure CI/CD pipelines DevOps automation …this reference can save you a lot of time in your daily terminal operations. 🔗 Check it out on GitHub: https://lnkd.in/ei7yUNDh I built this for myself, but I believe it can help anyone building, deploying, or managing systems on Linux. If you’re also in the DevOps or platform engineering space, I’d love your feedback — and if it helps, feel free to ⭐ the repo and share it with your team. #DevOps #Linux #Ubuntu #PlatformEngineering #Automation #OpenSource #SRE #CloudEngineering #ShellScripting #Terminal #GitHub #EngineeringTools
To view or add a comment, sign in
-
Kubernetes v1.34 introduces a significant enhancement with the separation of the node lifecycle and pod eviction responsibilities into distinct components. I found it interesting that this decoupled taint manager can lead to more efficient management of cluster resources. What are your thoughts on how this change might impact cluster operations and developer workflows?
To view or add a comment, sign in
-
Kubernetes (often stylized as K8s) is an open-source platform for automating the deployment, scaling, and management of containerized applications. It groups containers (e.g., Docker desktop containers) that make up an application into logical units for easy management and discovery.
To view or add a comment, sign in
-
-
🚨 GitLab Patch Releases: 18.4.1, 18.3.3, 18.2.7 Are Now Available 📅 Release Date: September 25, 2025 🛡️ Type: Security & Bug Fixes 📦 Applies to: GitLab Community Edition (CE) & Enterprise Edition (EE) GitLab has released three patch versions with critical security and stability improvements. These updates address multiple vulnerabilities, including: 🔐 High-Severity Security Fixes: CVE-2025-9642: XSS via Script Gadgets (CVSS 8.7) CVE-2025-10858: DoS via malicious JSON files (CVSS 7.5) CVE-2025-8014: Bypass of GraphQL query limits (CVSS 7.5) 🧵 Other notable vulnerabilities fixed: Information disclosure in virtual registry configs Privilege escalation from Developer role DoS via GraphQL blobSearch & string conversion methods Improper authorization and project ownership reassignment 📝 Bug Fixes Across All Versions: These releases also include dozens of backported fixes improving performance, user experience, and internal stability across GitLab CE/EE. 📌 Important Notes: No new DB migrations GitLab.com is already patched All self-managed instances should upgrade immediately GitLab Dedicated customers do not need to take action 🔄 Recommended Action: Upgrade your instance to 18.4.1, 18.3.3, or 18.2.7 depending on your version stream. 📖 Full release notes → GitLab Patch Blog 🔒 Read best practices → Securing GitLab Instances Source Link : https://lnkd.in/e_GmpN9J #GitLab #SecurityUpdate #CVE #DevSecOps #ApplicationSecurity #PatchNow #OpenSourceSecurity #BugFixes #GitLabEE #GitLabCE
To view or add a comment, sign in
Thanks for sharing this Mutha Nagavamsi Kubernetes at scale is definitely a beast, and these insights are super valuable!