





















































Stateful apps in Kubernetes. From history and fundamentals to operators
Stateful applications in Kubernetes require additional attention due to their need to persist data across instances and reboots, unlike stateless applications.
In this article, you'll learn how to integrate Backstage with Kubernetes, first by running Backstage outside the cluster using the Kubernetes API, and then deploying it directly on the cluster with the official Helm chart.
Manage secrets in AWS EKS with AWS Secrets Manager securely
AWS Secrets Manager integrates with EKS through the AWS Secrets and Configuration Provider (ASCP) for the Kubernetes Secrets Store CSI Driver.
Your guide to observability engineering in 2024
In 2024, an observability engineer's role is multifaceted, requiring expertise in data pipelines, system analysis, and troubleshooting to maintain and optimize complex, distributed systems.
The complete guide to serverless apps
While the term implies the absence of servers, it actually refers to a model where developers don't need to manage server infrastructure. Instead, the cloud provider handles server management
🔍Secret Knowledge
How Stripe’s Document Databases Supported 99.999% Uptime with Zero-Downtime Data Migrations
This reliability is largely due to their custom-built database infrastructure, called DocDB, which is an extension of MongoDB Community.
Anomaly Alerting in Prometheus
Using Prometheus with Istio, we can set up a generic anomaly detection system for response times that applies to all services running on a mesh.
The ROI of improving and investing in DORA
DORA Metrics provide a comprehensive view of your software team's performance, helping identify areas for improvement and measure the return on investment (ROI) of these enhancements.
AWS Managed KMS Keys and their Key Policies: Security Implications and Coverage for AWS Services
AWS Managed KMS Keys are encryption keys managed by AWS but used within your own AWS account, often applied as default keys for various services.
Attack Paths Into VMs in the Cloud
This post reviews how attackers might exploit VMs and offers strategies for organizations to secure their environments.
⚡Techwave
Kubernetes History Inspector (KHI) visualizes cluster logs: by Google Cloud
Troy Hunt: Processing 23 Billion Rows of ALIEN TXTBASE Stealer Logs
Get insights from multimodal content with Amazon Bedrock Data Automation, now generally available
Optimizing incident management with AIOps using the Triangle System
New Cloud Trace features to troubleshoot latency and errors
🛠️Hackhub
SQLSync: collaborative offline-first wrapper around SQLite. It is designed to synchronize web application state between users, devices, and the edge.
lambda_helpers_metrics:A library that simplifies sending custom metrics to CloudWatch using EMF (Embedded Metric Format).
cloudysetup: Automate cloud environment setup using generative AI and AWS Cloud Control API.
kftray: A cross-platform system tray application for managing multiple kubectl port-forward commands, with support for UDP and proxy connections through k8s clusters
keycloak: Open Source Identity and Access Management For Modern Applications and Services
Cheers,
Editor-in-Chief
LLMs have tapped all of publicly available data. The last mile training of models requires private data. Use private data without compromising security. Redact, label, and prep freetext for LLM ingestion or data pipelines.
📢 If your company is interested in reaching an audience of developers and, technical professionals, and decision makers, you may want toadvertise with us.
If you have any comments or feedback, just reply back to this email.
Thanks for reading and have a great day!