Trending

Latest Posts by Darryl Ruggles

Engineer in the Dark out! (4/4)

7 hours ago 0 0 0 0

The steps are laid out clearly with solid fundamentals applied in the right order. It shows how so much can be gained from simple changes like fixing COPY commands and switching base images before ever reaching the more advanced techniques. Check this article from (3/4)

7 hours ago 1 0 1 0

that separates smooth deployments from expensive headaches. The article below walks through a real journey of taking a 2.4GB Node.js image down to 24MB, covering everything from .dockerignore basics to #distroless builds. (2/4)

7 hours ago 1 0 1 0

https://lckhd.eu/V4qlA1

Running code in #containers is super common now and #optimizing your container images is one of those quiet, practical skills 🧵

7 hours ago 0 0 2 0

AI agents, ML pipelines, and traditional file-based applications can all read and write to S3 as a file system without code changes. #aws #S3Files (3/3)

17 hours ago 2 1 0 0

S3 Files lets you mount S3 buckets as file systems directly, no data duplication, no sync pipelines, no workarounds. Your data stays in S3 while apps access it natively.

This looks really useful and a nice improvement over previous approaches like S3 Mount Point. (2/3)

17 hours ago 2 0 1 0

https://lckhd.eu/WjDMCi

A really big S3 announcement - #S3 Files!!

If you've ever had to copy data out of S3 just so a file-based tool could use it, you know the frustration. 🧵

17 hours ago 2 0 1 0

It includes real config examples, triage workflows, and a good approach to cutting down false positives. This article from Ramesh Avutu is worth reading for anyone running production clusters. (3/3)

21 hours ago 1 0 0 0

The article below digs into the runtime detection gap that many teams don't address until something goes wrong quietly.

A practical four-layer threat detection stack built around #Falco, #eBPF, and Kubernetes audit logs is discussed. (2/3)

21 hours ago 1 0 1 0

https://lckhd.eu/npUVSw

Most #Kubernetes #security conversations stop at #RBAC, network policies, and image scanning. What happens after a workload passes all those checks and starts running? 🧵

21 hours ago 1 0 1 0
Advertisement

containerization to AI integration. This is worth looking at if you're working on cost optimization or want to see how these AWS services fit together in practice. #finops (4/4)

1 day ago 0 0 0 0

I think there is a lot of promise using AI-tools for this. Everything runs serverless with GitHub Actions handling CI/CD. This example is practical DevOps without the complexity.

Abdul Rahim Shaikh breaks down each phase clearly, from Terraform setup to Docker (3/4)

1 day ago 0 0 1 0

The article below describes some approaches on how to tackle that problem with automation instead of manual audits.

The system uses #Terraform for Infrastructure as Code (IaC), Lambda functions for scanning and remediation, and Amazon Bedrock for AI-driven insights. (2/4)

1 day ago 1 0 1 0

https://lckhd.eu/TJSm6q

Cloud costs can quietly spiral out of control. Idle EC2 instances and unused S3 buckets drain budgets while teams focus on building features. 🧵

1 day ago 0 0 1 0

spend time checking it out! (3/3)

1 day ago 0 0 0 0

Instead of manually configuring filters and date ranges, you can now ask plain English questions and get visualizations and insights back in seconds.

This should make it easier for people who are not well versed in #Finops topics to get important data. Will have to (2/3)

1 day ago 0 1 1 0
Post image

https://lckhd.eu/MaOFls

Tracking spend in the cloud with tools like #AWS #CostExplorer is important. AWS just added natural language cost analysis here which sounds quite interesting. 🧵

1 day ago 0 0 1 0
Post image

https://lckhd.eu/veqbW2

🆕 New blog post: #Kubectl Commands I Actually Use Every Day

After years of #debugging #Kubernetes clusters, 🧵

1 day ago 0 1 1 0

• JSONPath tricks, RBAC checks with `auth can-i`, and `kubectl diff` before you apply

If you work with Kubernetes day to day, I'd love your feedback, and if there's a command you swear by that I missed, tell me in the comments. (4/4)

1 day ago 0 0 0 0
Advertisement

• The one alias + tab completion setup that saves thousands of keystrokes

• Why `--previous` is the flag most people forget during crash loops

• Using `kubectl debug` when your distroless image has no shell

• Node-level debugging on #EKS without SSH or SSM (3/4)

1 day ago 0 0 1 0

I finally wrote down the commands I reach for first - not a comprehensive reference, just the ones that actually solve problems in real incidents.

The post walks through a simple workflow I use every day: Assess → Investigate → Interact → Resolve. Along the way I cover: (2/4)

1 day ago 0 0 1 0
Post image

https://lckhd.eu/veqbW2

🆕 New blog post: #Kubectl Commands I Actually Use Every Day

After years of #debugging #Kubernetes clusters, 🧵

1 day ago 0 1 1 0

It covers the full implementation, from install to Pod Identity to cost tuning. Check this out from Sanath Waghela if you are running GPU workloads in production or planning to. (4/4)

2 days ago 0 0 0 0

money. (3/4)

2 days ago 0 0 1 0

tooling feels too complex to fine-tune. The article below discusses a practical path through that.

The architecture pairs #KEDA with SQS on #EKS to scale GPU workloads from zero based on actual queue depth. With this approach there should be no idle nodes burning (2/4)

2 days ago 1 0 1 0

https://lckhd.eu/1muLik

#GPU autoscaling on #Kubernetes is a problem that quietly drains budgets if you get it wrong. Most teams either leave expensive nodes sitting idle or over-provision because the 🧵

2 days ago 2 0 2 0

Management Service (KMS) setup for improving security, and a discussion of some common pitfalls. Check it out! (5/5)

2 days ago 1 0 0 0

Users get one link, cookies handle the rest, and your bucket stays hidden behind the CDN. This seems like a solution that would work well for many cases.

Harshvijaythakkar has put together a solid guide below including architecture decisions, AWS #Lambda code, Key (4/5)

2 days ago 1 0 1 0

single signed URL to a manifest file. (3/5)

2 days ago 2 0 1 0
Advertisement

sounds straightforward until you hit this. Each one exposes your bucket name, and generating thousands of them quickly becomes a maintenance headache nobody wants.

The example architecture below proposes a cleaner approach: #CloudFront signed cookies paired with a (2/5)

2 days ago 2 0 1 0