One of the hallmarks of “the edge” in computing is the array of sensors, controllers, and microcontroller unit (MCU) class devices that produce data and perform actions. For Kubernetes to be a versatile edge computing solution, a cluster needs to easily find these leaf devices. Most of these devices, however, are too small to run Kubernetes themselves. How can they be leveraged by a Kubernetes workload? How can a Kubernetes Pod find or access their outputs? Akri is the answer!
Kubernetes config generator is an interactive command line tool that lets you create kubeconfig files related to a service account in a given namespace. The user can interactively chose a namespace and service account from a K8 cluster. The output is a config file with token authentication that has same RBAC permissions assigned to chosen service account.
Kyverno is a policy engine built for Kubernetes: policies as Kubernetes resources (no new language to learn!), validate, mutate, or generate any resource, match resources using label selectors and wildcards, validate and mutate using overlays (like Kustomize!), generate and synchronize defaults across namespaces, block or report violations, test using kubectl.
Kdo is a command line tool that enables developers to run, develop and test code changes in a realistic deployed setting without having to deal with the complexity of Kubernetes deployment and configuration.
Deciding when to invest in developer productivity improvements is hard. If you’re on the ops side of things, you’re usually concerned about production and releases. If you’re a developer, you’re concerned about getting new features out as quickly as possible.
version-checker is a Kubernetes utility for observing the current versions of images running in the cluster, as well as the latest available upstream. These checks get exposed as Prometheus metrics to be viewed on a dashboard, or soft alert cluster operators.
Kev helps developers port and iterate Docker Compose apps onto Kubernetes. It understands the Docker Compose application topology and prepares it for deployment in (multiple) target environments, with minimal user input.