Join us

ContentUpdates and recent posts about Argo CD..
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Automated Kubernetes Threat Detection with Tetragon and Azure Sentinel

Kubernetes security tools usually drop the ball. Enter the dynamic duo:Tetragonwielding eBPF magic for deep observability, and smart notifications for sniper-precise alerts.Fluent Bitpairs withAzure Logic Appsin an automated setup so you can hunt down threats in real-time. Not a drop of sweat needed.. read more  

Automated Kubernetes Threat Detection with Tetragon and Azure Sentinel
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Post-Quantum Cryptography in Kubernetes

Kubernetes v1.33quietly rides thepost-quantum securitywave, thanks to Go 1.24's hybrid key exchanges. Watch out for version mismatches, though—those could sneakily downgrade your defenses... read more  

Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Under the hood: Amazon EKS ultra scale clusters

Amazon EKScranked up its gear—you can now spin up clusters with a staggering100,000 nodesat your beck and call. That’s a cozy home for either1.6 million AWS Trainium chipsor800,000 NVIDIA GPUs. Welcome to the playground for ultra-scale AI/ML. Performance soars skyward by ditching old etcd consensus .. read more  

Under the hood: Amazon EKS ultra scale clusters
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Upcoming changes to the Bitnami catalog

Bitnamiclears out the virtual cobwebs by tucking its oldDebian-based imagesinto a digital time capsule, also known as theLegacy repository. It throws a friendly nudge to devs: get with the times and swap to the "latest" images. In production-ville, serious users should hitch a ride on theBitnami Sec.. read more  

Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Rethinking Node Drains: A Webhook Based Approach to Graceful Pod Removal

Eviction Reschedule Hooksticks its nose in Kubernetes eviction requests, letting operator-managed stateful apps wriggle their way through node drains without breaking a sweat. 🎯.. read more  

Rethinking Node Drains: A Webhook Based Approach to Graceful Pod Removal
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

OpenShift LACP bonding performance expectations

Red Hat OpenShift and NIC bonding for high availability is getting popular in data centers. Consider layer2/layer2+3 configurations for balanced traffic distribution across bonded links. Layer3+4 hashing offers highest throughput but may lead to out-of-order packets due to 802.3ad non-compliance. It.. read more  

Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Kubernetes Scaling Strategies

Horizontal Pod Autoscaler(HPA) cranks up pods based on CPU, memory, or custom quirks. A dream for stateless adventures, but you'll need a metrics server.Vertical Pod Autoscaler(VPA) fine-tunes CPU and memory for pods. Works like a charm for jobs where scaling out is sketchy, though it demands restar.. read more  

Kubernetes Scaling Strategies
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

6 Design Principles for Edge Computing Systems

Edge systemseach have their eccentricities, needing solutions as unique as they are:Chick-fil-Aswears byKubernetesto herd its standard operations. TheAir Force, however, prizes nimbleness and ironclad security for deployments scattered across the globe. Smart edge management? It’s a mix ofInfrastruc.. read more  

6 Design Principles for Edge Computing Systems
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Securing Kubernetes 1.33 Pods: The Impact of User Namespace Isolation

Kubernetes 1.33rolls out with a security upgrade. It flips the switch onuser namespacesby default, shoving pods into the safety zone as unprivileged users. Potential breaches? Curbed. But don't get too comfy—idmap-capable file systems and up-to-date runtimes are now your new best friends if you want.. read more  

Securing Kubernetes 1.33 Pods: The Impact of User Namespace Isolation
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Kubernetes Observability with OpenTelemetry | A Complete Setup Guide

OpenTelemetrydelivers a full observability package for Kubernetes—traces, metrics, logs—all without handcuffs to a single vendor. Deployyour own OTEL Collectorson Minikube usingHelm charts. Dive into node and pod-level metrics and grab those can't-miss Kubernetes cluster events... read more  

Kubernetes Observability with OpenTelemetry | A Complete Setup Guide
At its core, Argo CD treats Git as the single source of truth for application definitions. You declare the desired state of your Kubernetes applications in Git (manifests, Helm charts, Kustomize overlays), and Argo CD continuously compares that desired state with what is actually running in the cluster. When drift is detected, it can alert you or automatically reconcile the cluster back to the Git-defined state.

Argo CD runs inside Kubernetes and provides:

- Declarative application management
- Automated or manual sync from Git to cluster
- Continuous drift detection and health assessment
- Rollbacks by reverting Git commits
- Fine-grained RBAC and multi-cluster support

It integrates natively with common Kubernetes configuration formats:

- Plain YAML
- Helm
- Kustomize
- Jsonnet

Operationally, Argo CD exposes both a web UI and CLI, making it easy to visualize application state, deployment history, diffs, and sync status. It is commonly used in platform engineering and SRE teams to standardize deployments, reduce configuration drift, and enforce auditability.

Argo CD is part of the Argo Project, which is hosted by the Cloud Native Computing Foundation (CNCF), and is widely adopted in production Kubernetes environments ranging from startups to large enterprises.