CI / DI
Pull-based CD Pipelines for Security
Comparisons
EKS vs GKE vs AKS
Free tier
GitOps
GitOps Conversation Kit
Network
Reverse Proxy Server In Kubernetes Using with Sidecar
Patterns
Attack Matrix
Free e-book: O’Reilly: Kubernetes patterns for designing cloud-native apps
Proxy / Mesh / Ingress
Comparing Ingress controllers for Kubernetes
Resource Quota
Keep your Kubernetes cluster balanced: the secret to High Availability
Security
11 Ways (Not) to Get Hacked
Top 10 Kubernetes Best Practices
Service Mesh
The Service Mesh: What Every Software Engineer Needs to Know about the World's Most Over-Hyped Technology
Source:
Stack
CNCF landscape
The Architecture of a Large-Scale Web Search Engine, circa 2019
Trends
What Future Holds for DevOps in 2020: A Complete Guide
Tutorials
35 Advanced Tutorials to Learn Kubernetes — Faun
The Kubernetes Learning Resources List