Join us

ContentUpdates and recent posts about Arti..
Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

Why "What Happened First?" Is One of the Hardest Questions in Large-Scale Systems

Logical clocks trackevent orderin distributed systems—no need for synced wall clocks. Each node keeps a counter. On every event: tick it. On every message: tack on your counter. When you receive one? Merge and bump. This flips the script. Instead of chasing global time, distributed systems lean int.. read more  

Why "What Happened First?" Is One of the Hardest Questions in Large-Scale Systems
Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

Easy will always trump simple

Rich Hickey’s classic “Simple Made Easy” talk is making the rounds again—as a mirror held up to dev culture under pressure. The punchline: we keep picking solutions that areeasy but tangled, instead ofsimple and sane. The essay draws a sharp line between that habit and a concept from biology: exapt.. read more  

Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

The Hidden AWS Cost Traps No One Warns You About (and How I Avoid Them)

Calling outfive sneaky AWS cost traps—the kind that creep in through overlooked defaults and quiet misconfigs, then blow up your bill while no one's watching... read more  

The Hidden AWS Cost Traps No One Warns You About (and How I Avoid Them)
Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

Kubernetes DNS Exploit Enables Git Credential Theft from ArgoCD

A new attack chain messes withKubernetes DNS resolutionandArgoCD’s certificate injectionto swipe GitHub credentials. With the right permissions, a user inside the cluster can reroute GitOps traffic to a fake internal service, sniff auth headers, and quietly walk off with tokens. What’s broken:GitOp.. read more  

Kubernetes DNS Exploit Enables Git Credential Theft from ArgoCD
Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

Kubernetes right-sizing with metrics-driven GitOps automation

AWS just dropped a GitOps-native pattern for tuning EKS resources—built to runoutsidethe cluster. It’s wired up withAmazon Managed Service for Prometheus,Argo CD, andBedrockto automate resource recommendations straight into Git. Here’s the play: it maps usage metrics to templated manifests, then sp.. read more  

Kubernetes right-sizing with metrics-driven GitOps automation
Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

Amazon EKS Enables Ultra-Scale AI/ML Workloads with Support for 100K Nodes per Cluster

Amazon EKS just cranked its Kubernetes cluster limit to100,000 nodes—a 10x jump. The secret sauce? A reworkedetcdwith an internaljournalsystem andin-memorystorage. Toss in tightAPI server tuningand network tweaks, and the result is wild: 500 pods per second, 900K pods, 10M+ objects, no sweat—even un.. read more  

Amazon EKS Enables Ultra-Scale AI/ML Workloads with Support for 100K Nodes per Cluster
Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

Kubernetes Primer: Dynamic Resource Allocation (DRA) for GPU Workloads

Kubernetes 1.34 brings serious heat for anyone juggling GPUs or accelerators. MeetDynamic Resource Allocation (DRA)—a new way to schedule hardware like you mean it. DRA addsResourceClaims,DeviceClasses, andResourceSlices, slicing device management away from pod specs. It replaces the old device plu.. read more  

Kubernetes Primer: Dynamic Resource Allocation (DRA) for GPU Workloads
Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

Lucidity turns spotlight onto Kubernetes storage costs

Lucidity has upgraded itsAutoScaler. It now handles persistent volumes on AWS-hosted Kubernetes, automatically scaling storage and reducing waste. The upgrade bringspod-level isolation,fault tolerance, andbulk Linux onboarding. Azure and GCP are next on the list... read more  

Lucidity turns spotlight onto Kubernetes storage costs
Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

The Quiet Revolution in Kubernetes Security

Nigel Douglas discusses the challenges of security in Kubernetes, particularly with traditional base operating systems. Talos Linux offers a different approach with a secure-by-default, API-driven model specifically for Kubernetes. CISOs play a critical role in guiding organizations through the shif.. read more  

Link
@faun shared a link, 3 months, 1 week ago
FAUN.dev()

Kubernetes VPA: Limitations, Best Practices, and the Future of Pod Rightsizing

Kubernetes'Vertical Pod Autoscaler (VPA)tries to be helpful by tweaking CPU and memory requests on the fly. Problem is, it needs to bounce your pods to do it. And if you're also runningHorizontal Pod Autoscaler (HPA)on the same metrics? Now they're fighting over control. VPA sees a narrow slice of .. read more  

Kubernetes VPA: Limitations, Best Practices, and the Future of Pod Rightsizing
Arti is an official Tor Project initiative to rewrite the Tor client stack in Rust. Its primary goal is to address long-standing safety, reliability, and maintainability challenges inherent in the legacy C-based Tor implementation. By leveraging Rust’s strong compile-time guarantees for memory safety and concurrency, Arti eliminates entire classes of bugs that have historically affected Tor, including many security vulnerabilities.

Arti is architected as a modular, embeddable library rather than a monolithic application. This makes it easier for developers to integrate Tor networking capabilities directly into other applications, services, and platforms. From its earliest versions, Arti has supported multi-core cryptography, cleaner APIs, and a more maintainable internal design.

While early releases focused on client functionality such as bootstrapping, running as a SOCKS proxy, and routing traffic over the Tor network, the long-term roadmap includes full feature parity with the existing Tor client, support for onion services, anti-censorship mechanisms, and eventually Tor relay functionality. Arti represents the future foundation of the Tor ecosystem, prioritizing long-term security, developer velocity, and adaptability.