How To Setup GitHub Authentication for an Exposed Service in Kubernetes
Setting up an exposed service or ingress on a Kubernetes cluster needs authentication with OAuth 2 Proxy: here’s how to get it done in 6 easy steps.
Continue ReadingI'm a devops / SRE / sysadmin originally from NOLA, did my time out in the IT mines of the bay area, and have returned home to move tech forward in my hometown. I am an avid rockhound and a decent amateur silversmith.
Setting up an exposed service or ingress on a Kubernetes cluster needs authentication with OAuth 2 Proxy: here’s how to get it done in 6 easy steps.
Continue Reading
At Revelry, we use kubeadm to build our Kubernetes clusters. Here’s the four-step process we used to setup and test kubeadm in an AWS ASG.
Continue Reading
Chris from our Cluster Ops team dives deeper into etcd to understand its impact on Kubernetes, used in our managed cloud clusters.
Continue Reading
What happens when you get really inflated Datadog logging bills? Christian and Adam got together to share how we made some changes to our config to eliminate some unnecessary logs. Here’s how we decided what to exclude.
Continue Reading
Having tried more than a few different VPN services at more than a few different companies this one is definitely the easiest to set up, uses the most modern and secure protocol, and is relatively easy to maintain.
Continue Reading