Join us

ContentCurated links by FAUN.dev
Link
@devopslinks shared a link, 2 months, 3 weeks ago
FAUN.dev()

The best tools for bare metal automation that people actually use

Bare metal ops aren’t what they used to be. The game’s gone full stack:API-driven provisioning,declarative workflows, andconfig convergencenow run the show. Tools likeMAAS,Foreman,Ironic, andTinkerbelltreat physical servers as programmable units. Real hardware, real APIs. Meanwhile,Kubernetes-native.. read more  

The best tools for bare metal automation that people actually use
Dev Swag
@ByteVibe shared a product

Sudo - Developer T-Shirt

#developer  #merchandise  #swag 

You've now found the staple t-shirt of your wardrobe: With Great Power Comes Great Responsibility This tee sits nicely, maintains sharp lines around the edges, and goes perfectly with layered streetwe...

Link
@devopslinks shared a link, 2 months, 3 weeks ago
FAUN.dev()

SSH has no Host header

A dev built a custom SSH proxy that punches through IPv4 limits without handing out public IPs like candy. Their trick:shared IPv4s with per-user relative IP mapping. It maps incoming SSH traffic to the right VM using thesource IPandpublic key combo. No Host header? No problem. They sidestep that ho.. read more  

Link
@devopslinks shared a link, 2 months, 3 weeks ago
FAUN.dev()

Keeping Secrets Out of Logs

A new writeup lays out a layered plan to keep secrets out of logs, no silver bullets here, just ten solid "lead bullets" that actually stack. Think of it as defense in depth for log hygiene. Highlights include: Type-safe domain primitives for secrets, Taint-based static analysis, Read-once secret wr.. read more  

Keeping Secrets Out of Logs
Link
@varbear shared a link, 2 months, 4 weeks ago
FAUN.dev()

An Honest Review of Go

Go gets big props for its built-in concurrency model withgoroutinesandchannels, which make lightweight, scalable parallelism easy and ergonomic. The author criticizes Go's type system for lacking things likeenums, closed type sets, and tuples, making certain patterns awkward compared with Rust's ric.. read more  

Link
@varbear shared a link, 2 months, 4 weeks ago
FAUN.dev()

Reversing YouTube's "Most Replayed" Graph

An engineer cracked open YouTube’s “most replayed” heatmap. Turns out it runs onsampled view frequency arrays, client-sidenormalization, andSVG renderingstitched together withCubic Bézier splinesfor that smooth, snappy curve. Behind the scenes, playback gets logged with adifference array + prefix su.. read more  

Reversing YouTube's "Most Replayed" Graph
Link
@varbear shared a link, 2 months, 4 weeks ago
FAUN.dev()

How Github monopoly is destroying the open source ecosystem

Out of 238 student open source contributions over seven years, 237 landed onGitHub- even though they were told to look elsewhere. One short-lived GitHub IP block brought everything to a standstill. No commits. No reviews. Just silence. Turns out, a single platform holds the keys to a whole ecosystem.. read more  

How Github monopoly is destroying the open source ecosystem
Link
@varbear shared a link, 2 months, 4 weeks ago
FAUN.dev()

A better way to limit Claude Code (and other coding agents!) access to Secrets

A new workflow dropsClaude Codeinto aBubblewrap-based sandbox, cutting Anthropic's client-side code out of the trust loop. Compared to spinning up Docker or juggling user accounts, Bubblewrap locks things down tighter - with less setup and cleaner OS-level walls around files, network access, and sec.. read more  

Link
@kaptain shared a link, 2 months, 4 weeks ago
FAUN.dev()

v1.35: Restricting executables invoked by kubeconfigs via exec plugin allowList added to kuberc

Kubernetes v1.35 lands with acredential plugin allowlist, now in beta, no feature gate needed. It lets you lock down whichexecplugins your kubeconfigs can run. Tighter leash, lower risk. Especially when the credential pipeline gets sketchy... read more  

Link
@kaptain shared a link, 2 months, 4 weeks ago
FAUN.dev()

A Brief Deep-Dive into Attacking and Defending Kubernetes

A sharp teardown of Kubernetes’ attack surface maps out where things go sideways: pods, the control plane, RBAC, admission controllers, and etcd. Misconfigurations like anonymous API access, wildcard roles, and hostPath mounts aren't just sloppy- they're attack vectors. Fixes? ThinkFalco,RBAC lockdo.. read more  

A Brief Deep-Dive into Attacking and Defending Kubernetes
Link
@kaptain shared a link, 2 months, 4 weeks ago
FAUN.dev()

From Bare Metal to Containers: A Developer's Guide to Execution Environments

A sharp look at how execution environments evolved - from bare metal to VMs, containers, sandboxes, and language-level runtimes. The focus: isolation. Hardware, kernel, processes, runtimes - each adds a boundary. Modern stacks mix and match layers to dial in the right amount. VMs, containers, venvs... read more  

From Bare Metal to Containers: A Developer's Guide to Execution Environments