- 00:00:33 - Welcome to TGIK and intros
- 00:06:49 - Week in Review
- 00:21:21 - Digging into the Pulumi Kubernetes Operator
- 00:22:31 - What is Pulumi? How does it fit with other projects
- 00:29:44 - Pulumi pre-req including state file and secret management
- 00:38:53 - Installing the operator along with core arch
- 00:52:43 - Pulumi imperative/declarative split
- 01:04:18 - Applying the first stack (and debugging and Q&A!)
- 01:23:07 - Sidebar on impressions and where operator fits in
- 01:30:32 - Success! Dev wordpress running. Now looking at "prod" config.
- 01:47:55 - Secret generation and storage in Pulumi
- 02:07:00 - Success! And quick conclusions.
- Knative hits 1.0!
- GKE image streaming
- Nice blog post on k8s logging
- Introducing Azure Container Apps
- Pulumi Kubernetes Operator Tutorial
- TGIK operator demo
- Pulumi Kubernetes Operator Hits 1.0!
- Policy as Code
- Pulumi Registry
Pure OSS Pulumi references:
Create secret from AWS env variables:
kubectl create secret generic aws-creds-secret \
--from-literal=AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \
--from-literal=AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY
Init env from AWS CLI config: https://github.com/jbeda/dotfiles/blob/master/source/50_aws_env.sh
https://github.com/pulumi/pulumi-kubernetes-operator/archive/refs/tags/v1.2.1.tar.gz
pulumi login s3://<bucket>
https://github.com/pulumi/pulumi-kubernetes-operator/blob/master/docs/stacks.md
apiVersion: pulumi.com/v1
kind: Stack
metadata:
name: tgik-demo
spec:
backend: "<backend>"
secretsProvider: "awskms:///<kms-key>"
envRefs:
AWS_ACCESS_KEY_ID:
type: Secret
secret:
name: aws-creds-secret
key: AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY:
type: Secret
secret:
name: aws-creds-secret
key: AWS_SECRET_ACCESS_KEY
AWS_DEFAULT_REGION:
type: Literal
literal:
value: "us-east-1"
stack: "s3backend.tgik.dev"
projectRepo: https://github.com/jaxxstorm/tgik-operator-demo
branch: refs/heads/main
destroyOnFinalize: true