Lists (11)
Sort Name ascending (A-Z)
Starred repositories
The Elastic stack (ELK) powered by Docker and Compose.
A curated list for awesome kubernetes sources π’π
Performance analysis tools based on Linux perf_events (aka perf) and ftrace
a Docker + Kubernetes network trouble-shooting swiss-army container
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
Cloud-Native distributed storage built on and for Kubernetes
Kubernetes application example tutorials
Command-line tools for working with Architecture Decision Records
INACTIVE: Docker garbage collection of containers and images
Online resources that will help you prepare for taking the CNCF CKA 2020 "Kubernetes Certified Administrator" Certification exam. with time, This is not likely the comprehensive up to date list - pβ¦
A posix script to find and watch youtube videos from the terminal. (Without API)
pre-commit git hooks to take care of Terraform configurations πΊπ¦
An open-source, next-generation "runc" that empowers rootless containers to run workloads such as Systemd, Docker, Kubernetes, just like VMs.
Dynamic sub-dir volume provisioner on a remote NFS server.
Packer configuration for building a custom EKS AMI
Amazon EKS Distro (EKS-D) is a Kubernetes distribution based on and used by Amazon Elastic Kubernetes Service (EKS) to create reliable and secure Kubernetes clusters.
π Secure L7/L4 (HAProxy) Ingress Controller for Kubernetes
[EOL] A Kubernetes multi-node test cluster based on kubeadm
An HTTPS Proxy for Docker providing centralized configuration and caching of any registry (quay.io, DockerHub, registry.k8s.io, ghcr.io)
Main package repository for production Wolfi images
Kubernetes without the root privileges
VPS benchmark script β based on the popular bench.sh, plus CPU and ioping tests, and dual-stack IPv4 and v6 speedtests by default
Use YubiKey to unlock a LUKS partition
Official repository for TGI Kubernetes (TGIK)!
An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.