Newslurp

<< Stories

gRPC: Still worth it?❓, Migrating to Terraform ▢️, Fundamental Law of Software Dependencies πŸ§‘β€βš–οΈ

TLDR DevOps <dan@tldrnewsletter.com>

September 4, 11:06 am

TLDR DevOps
Torq chose gRPC over OpenAPI/Swagger due to past difficulties with Go, leading to more efficient microservice communication and code consistency 

TLDR

TLDR DevOps 2024-09-04

πŸ“±

News & Trends

Figma Moves from ECS to Kubernetes to Benefit from the CNCF Ecosystem and Reduce Costs (2 minute read)

Figma successfully migrated its compute platform from AWS ECS to Kubernetes (EKS) in under 12 months, leveraging the CNCF ecosystem for cost savings, improved developer experience, and enhanced resiliency.
Telemetry in Go 1.23 and beyond (5 minute read)

Go 1.23 introduces the option for users to enable telemetry to help improve its toolchain by sharing usage data with the Go team. This data will help the team fix bugs and make informed decisions about tool development. Users can activate telemetry with 'go telemetry on' and deactivate it with 'go telemetry off'.
πŸš€

Opinions & Tutorials

gRPC: 5 Years Later, Is It Still Worth It? (8 minute read)

Torq chose gRPC over OpenAPI/Swagger due to past difficulties with Go, leading to more efficient microservice communication and code consistency. Enhancements by buf.build have further simplified development and dependency management. Torq's use of tools like Linkerd and connectrpc has also addressed initial gRPC-web challenges, optimizing both security and service interaction.
Charlotte Tilbury's move from CloudFormation to Terraform (7 minute read)

Charlotte Tilbury's platform team transitioned from AWS CloudFormation to Terraform for its infrastructure management due to an appreciation of Terraform's drift detection and idempotency capabilities. The migration involved importing existing resources, modularizing code, and leveraging HCP Terraform for a user-friendly CI/CD experience. It ultimately enhanced scalability and security while empowering developers.
Tips to optimize and secure Azure Functions (5 minute read)

Organizations often adopt Azure Functions as part of their cloud modernization strategy for its serverless, event-driven capabilities and cost-efficient pay-per-use model. However, optimizing performance, managing costs, and ensuring security in Azure Functions requires careful selection of hosting plans, efficient design, and proactive monitoring to mitigate potential challenges like DDoS attacks and cold starts.
πŸ§‘β€πŸ’»

Resources & Tools

A simple way to evaluate your DevSecOps maturity (Sponsor)

Map your current level of DevSecOps readiness and create a plan to improve with Datadog's DevSecOps maturity model. Each of the six competency areas encompasses a series of separate competencies, at least two of which are security-related. See how your organization stacks up
Aws-mine (GitHub Repo)

aws-mine is a honey token system designed for AWS that allows users to detect unauthorized access attempts by planting decoy access keys and receiving alerts if they are used.
Blitz (GitHub Repo)

Blitz aims to revolutionize web rendering by offering a lightweight modular approach that emphasizes flexibility and performance.
🎁

Miscellaneous

Leveraging Azure native tooling to hunt Kubernetes security issues (5 minute read)

Container binary drift occurs when a running container deviates from its original image, potentially introducing security risks. This post is part of a three-part series on automating security hunts, leveraging AI, and monitoring Kubernetes security on Azure. It focuses on detecting and preventing binary drift using Microsoft's Defender for Cloud and XDR tools.
GenOps: learning from the world of microservices and traditional DevOps (6 minute read)

Managing generative AI applications presents unique challenges compared to traditional data and AI teams, suggesting the need for a dedicated β€˜GenOps' team. Unlike microservices, generative AI involves complex, non-deterministic agents requiring new operational strategies, including centralized model and tool management, and robust security measures.
The Fundamental Law Of Software Dependencies (2 minute read)

This article highlights the importance of incorporating checksums in software source code for all dependencies, including source code, third-party libraries, and compilers, to ensure security and reproducibility. It advocates for using a content-addressed system and lockfiles with checksums to reduce reliance on external distributors and improve dependency management.
⚑

Quick Links

Building an IDP With Help From the Open Source CNOE Framework (4 minute read)

The New York Times is building an internal developer platform (IDP) using the open-source Cloud Native Operational Excellence (CNOE) framework to standardize tools and deployment environments for its 1,000 developers.
Why I Still Use Python Virtual Environments in Docker (6 minute read)

Python virtual environments in Docker containers offer reliability, simplicity, and consistency across development and production environments, making them a valuable practice despite alternative methods.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? πŸ“°

If your company is interested in reaching an audience of devops professionals and decision makers, you may want to advertise with us.

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Kunal Desai & Martin Hauskrecht


If you don't want to receive future editions of TLDR DevOps, please unsubscribe from TLDR DevOps or manage all of your TLDR newsletter subscriptions.