icco / postmortemsLinks
Postmortem metadata from danluu/post-mortems.
☆38Updated last week
Alternatives and similar repositories for postmortems
Users that are interested in postmortems are comparing it to the libraries listed below
Sorting:
- A list of common Disaster Recovery (DR) scenarios for software companies☆34Updated 4 years ago
- A sample of major outages and incidents☆18Updated 6 years ago
- ☆47Updated 5 years ago
- The Container Security Book—a free book for practitioners☆82Updated 5 years ago
- ☆24Updated 5 years ago
- Production grade Kubernetes controller for managing AWS Services using CRDs☆16Updated 5 years ago
- List Kubernetes objects in a problematic state☆60Updated 4 years ago
- Look up region and other information for any AWS IP address☆90Updated 2 years ago
- A collection of SRE tools☆62Updated 6 years ago
- A multi-cloud setup of managed Kubernetes Clusters.☆20Updated last year
- Calculate how much downtime should be permitted in your Service Level Agreement or Objective☆68Updated 4 years ago
- Tools for Chaos Engineers☆42Updated 7 years ago
- The Agile Operations methodology☆145Updated 2 years ago
- A collection of Twilio SRE's Gameday Templates☆140Updated 5 years ago
- Marking instances dirty since 2018☆47Updated 6 years ago
- A Chaos Engineering Bootcamp☆173Updated 7 years ago
- This repository contains tooling used to build the EKS Distro, and all the projects contained in https://github.com/aws/eks-distro.☆83Updated this week
- A library for representing OCI image layers in an abstract filesystem☆27Updated 5 years ago
- cloud native software supply chain ☁️🔗☆64Updated 4 years ago
- ☆48Updated 6 years ago
- Easier way to unit test terraform☆51Updated 4 years ago
- DEPRECATED Collection of python scripts to run failure injection on AWS infrastructure☆93Updated 2 years ago
- ☆67Updated 5 years ago
- A collection templates ported from the SRE Workbook☆42Updated 7 years ago
- Falco Running with Ptrace(2) for Kernel Events☆37Updated 5 years ago
- A collection of step by step guides for fixing common tech problems.☆128Updated 2 years ago
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 5 years ago
- ☆53Updated 5 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated this week
- Create a dedicated IaaS instance per Pod to mitigate container breakout (including CPU vulnerabilities depending on the instance type)☆22Updated 5 years ago