Articles & Videos

Articles & Videos

Stop Using CPU Limits

Makes the case that CPU limits are an antipattern in Kubernetes. CPU is compressible—pods get throttled but keep running—so limits just prevent pods from using available resources. Memory is different: it’s incompressible and needs limits to prevent OOM chaos. The takeaway: use CPU requests (not limits) and always set memory limits.

Production-Ready Dockerfiles

Tackles a critical but often overlooked aspect of containerization: writing secure, optimized Dockerfiles for production. Exposes common mistakes—running as root, using latest tags, copying secrets, bloated images—then systematically walks through best practices: minimal base images, multi-stage builds, layer caching, non-root users, and pinned versions. Concludes with AI-powered tools that can automatically generate production-ready Dockerfiles.

Why KRM is the Royal Road to AI Ops

Makes the case for Kubernetes Resource Model (KRM) as the foundation for AI-driven infrastructure operations. The argument: KRM provides a universal, declarative API for managing all infrastructure — not just containers. Tools like Crossplane extend this to cloud resources, making everything manageable through the same Kubernetes control plane. This uniformity is what enables AI agents to reason about and operate infrastructure at scale.

KRM-Native GitOps: Without Flux There is Nothing

A deep technical comparison of Flux vs ArgoCD. The core argument: Flux aligns with Kubernetes’ design principles while ArgoCD introduces architectural divergence. Key points: Flux delegates to Kubernetes RBAC (ArgoCD adds its own layer), Flux integrates SOPS natively for secrets (ArgoCD says “GitOps is not for secrets”), Flux uses the actual Helm SDK (ArgoCD uses helm template). “What you see is what you deploy.”

Last updated on