-
Join 7 other subscribers
-
Also Read
- Kubernetes: Limits and Requests
- Jenkins agents on AWS EKS
- Jenkins Declarative Pipeline: Run a stage without holding up an agent
- AWS: Prevent VPC Modifications
- Cloudformation: Optional Resource Parameters
- AWS: Deleting Old Access-Key/Secret-Key Pairs
- Real Backups On The Cheap
- AWS S3 Bucket Policy to Only Allow Encrypted Object Uploads
- DC/OS Exhibitor on S3 – Issues & Workarounds
Author Archives: Jay V
Kubernetes: Limits and Requests
Recently at work, one of our workloads on kubernetes was erroring out a lot and grafana showed that the pods were being CPU-throttled 50-60% of the time. That was weird, because the pods were nowhere close to hitting their limits. … Continue reading
Posted in Tech.
Leave a comment
Jenkins agents on AWS EKS
The steps outlined here should help you setup Jenkins agents on AWS EKS clusters. The agents are one-time only. In other words, every build gets a fresh agent and then it is thrown away. The big advantage with Kubernetes is … Continue reading
Jenkins Declarative Pipeline: Run a stage without holding up an agent
If you have a Jenkins declarative pipeline , you’re generally bound to have more than one stage with steps within each of them. The usual way of declaring a node/agent/slave is by declaring an agent directive encompassing the stages{} directive, … Continue reading
AWS: Prevent VPC Modifications
If you have a busy AWS environment accessed by multiple developers, you will have someone modify your some aspect of your core infrastructure inadvertently. In our case, we have our VPC-related infrastructure deployed using Cloudformation and maintained via CF stack … Continue reading
Posted in Amazon Web Services, DevOps
Tagged aws, deny, developers, iam, modifications, mods, policy, sso, user, vpc
Leave a comment
Cloudformation: Optional Resource Parameters
When creating Cloudformation templates, occasionally, you come across situations where you only want to remove parameters from a Resource when on certain conditions. As an example, for an ECS Service resource, the parameters ‘LoadBalancers’ and ‘Role’ are both required only if you … Continue reading
Posted in Amazon Web Services, DevOps
Tagged aws, cloudformation, conditionals, conditions, optional, parameters, pseudo
Leave a comment
AWS: Deleting Old Access-Key/Secret-Key Pairs
If you have a busy AWS environment with access to multiple developers , it can be useful to automatically clean up IAM user Access Keys every so often for security. Here’s a simple Python script that can be plugged into … Continue reading
Posted in Amazon Web Services, DevOps
Leave a comment
Real Backups On The Cheap
So you have your data on the “cloud” – on Dropbox or GDrive folders – and you believe you’ve done a decent job of safe-guarding your precious files, while really you’ve only saved your files against total computer or hard-drive … Continue reading
AWS S3 Bucket Policy to Only Allow Encrypted Object Uploads
Amazon S3 supports two types of encryption (server-side-encryption or SSE) for security of data at rest — AES256, and AWS/KMS. AES256 is termed as S3-managed encryption keys [SSE-S3], whereas, KMS is termed, well, SSE-KMS where in the customer manages their … Continue reading
Posted in Amazon Web Services, Tech.
Tagged aes256, aws, bucket, deny, encryption, iam, kms, objects, policy, s3, sse, uploads
Leave a comment
DC/OS Exhibitor on S3 – Issues & Workarounds
If you want basic resiliency around your DC/OS master nodes when hosting them on AWS, you’ll want to have Exhibitor store its data in AWS S3. In order to do so, you’ll want to grant S3 IAM roles to your … Continue reading
DC/OS Kill Mesos Framework
You want to kill a Mesos framework but you’ve no idea how? You’ve looked at this page but it still doesn’t make sense? Then here’s what you need to do to kill a framework on Mesos. In my case, I … Continue reading