I usually ignore current events in these introductions but that doesn’t feel appropriate this weekend. To all of my friends in the US, stay safe.
Threat modelling is a powerful technique for understanding how your service might be attacked. This detailed post services as a great introduction to software developers who might not have a string security background.
A lot can happen in a large cloud environment, that’s where audit logs come in. This post explains how to configure, collect and use audit logs in GCP.
Slides from a talk I gave this last week at DockerCon, talking about reusable Dockerfiles and using GitHub Actions to create a fast packaging pipeline for lots of images.
A look at building a deployment process around Kubernetes, using Helm and ArgoCD.
A review of Rejoiner, a tool looking to bridge gRPC APIs with GraphQL. Good discussion of both pros and cons.
A useful checklist for backend applications, covering networking, monitoring, logging, backups, secrets and more.
A quick introduction to enforcing policy in a Kubernetes cluster using Open Policy Agent.
King is looking for new members for the infrastructure engineering teams to help develop, manage and expand our software based networking setup across datacenters and (Google) cloud. Please take a look at the open role for networking engineer. We’re also still looking for both database and streaming data engineers, if that is more your style.
With the release of Server Side Apply in Kubernetes 1.16 we’re likely to see more client tools, and the new Terraform provider for Kubernetes looks like a good start. Some tooling as well for converting YAML into HCL to make migration easier.