Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Grafana-Guide
Grafana Guide
https://github.com/mikeroyal/Grafana-Guide
Last synced: about 9 hours ago
JSON representation
-
Kubernetes Learning Resources
- Getting Kubernetes Certifications
- Getting started with Kubernetes on AWS
- Kubernetes on Microsoft Azure
- Intro to Azure Kubernetes Service
- Getting started with Google Cloud
- Getting started with Kubernetes on Red Hat
- Getting started with Kubernetes on IBM
- YAML basics in Kubernetes
- Elastic Cloud on Kubernetes
- Deploy a model to an Azure Kubernetes Service cluster
- Simplify Machine Learning Inference on Kubernetes with Amazon SageMaker Operators
- Running Apache Spark on Kubernetes
- Kubernetes Across VMware vRealize Automation
- VMware Tanzu Kubernetes Grid
- All the Ways VMware Tanzu Works with AWS
- VMware Tanzu Education
- Using Ansible in a Cloud-Native Kubernetes Environment
- Managing Kubernetes (K8s) objects with Ansible
- Setting up a Kubernetes cluster using Vagrant and Ansible
- Running MongoDB with Kubernetes
- Kubernetes Fluentd
- Understanding the new GitLab Kubernetes Agent
- Kubernetes Contributors
- KubeAcademy from VMware
- Docker
- Docker Enterprise - center/company-news/mirantis-acquires-docker-enterprise/).
- Docker Desktop
- Docker Hub - source projects, and the community.
- Docker Compose - container applications. With Docker Compose, you can create a YAML file to define the services and with a single command, can spin everything up or tear it all down.
- Docker Swarm - native clustering system swarm is a simple tool which controls a cluster of Docker hosts and exposes it as a single "virtual" host.
- Dockerfile - line instructions in succession.
- Docker Containers
- Docker Engine
- Docker Network
- Docker Daemon
- Docker Storage
- Kitematic
- Open Container Initiative
- Buildah
- Podman
- Containerd - level storage to network attachments and beyond. It is available for Linux and Windows.
- Docker and Kubernetes
- Getting Kubernetes Certifications
- Kubernetes on Microsoft Azure
- Intro to Azure Kubernetes Service
- Getting started with Kubernetes on IBM
- Deploy a model to an Azure Kubernetes Service cluster
- Running Apache Spark on Kubernetes
- Running MongoDB with Kubernetes
- Docker Enterprise - center/company-news/mirantis-acquires-docker-enterprise/).
- Docker Desktop
- Docker Containers
- Docker Engine
- Containerd - level storage to network attachments and beyond. It is available for Linux and Windows.
- Deploy a model to an Azure Kubernetes Service cluster
- Docker and Kubernetes
- Kubernetes on Microsoft Azure
- Kubernetes on Microsoft Azure
- Getting Kubernetes Certifications
-
Open Source Security Learning Resources
- Google Cloud Certified Professional Cloud Security Engineer
- Juniper Networks Certification Program Enterprise (JNCP)
- Microsoft Open Source Software Security
- Cloudflare Open Source Security
- The Seven Properties of Highly Secure Devices
- How Layer 7 of the Internet Works
- The 7 Kinds of Security
- The Libgcrypt Reference Manual
- The Open Web Application Security Project(OWASP) Foundation Top 10
- Best Practices for Using Open Source Code from The Linux Foundation
- Cybersecurity Training and Courses from IBM Skills
- Cybersecurity Courses and Certifications by Offensive Security
- RSA Certification Program
- Certified Cloud Security Professional(CCSP) Certification
- Certified Information Systems Security Professional (CISSP) Certification
- Security Training Certifications and Courses from Udemy
- Security Training Certifications and Courses from Coursera
- Security Certifications Training from Pluarlsight
- Microsoft Certified: Azure Security Engineer Associate
- Microsoft Certified: Azure Security Engineer Associate
- Cybersecurity Training and Courses from IBM Skills
- Cybersecurity Courses and Certifications by Offensive Security
- Juniper Networks Certification Program Enterprise (JNCP)
- Cloudflare Open Source Security
- Google Cloud Certified Professional Cloud Security Engineer
- Security Training Certifications and Courses from Coursera
- Cisco Security Certifications
- Certified Information Security Manager(CISM)
- Linux Professional Institute LPIC-3 Enterprise Security Certification
- The Red Hat Certified Specialist in Security: Linux
- AWS Certified Security - Specialty Certification
- Wireshark Certified Network Analyst (WCNA)
- Check Point Certified Security Master (CCSM) Certification
- CCNP Routing and Switching
-
Networking Learning Resources
-
Protocols
- JSON Web Token (JWT) - safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is digitally signed using JSON Web Signature (JWS).
- OAuth 2.0 - party applications to access the user account.
- JSON Web Token (JWT) - safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is digitally signed using JSON Web Signature (JWS).
- JSON Web Token (JWT) - safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is digitally signed using JSON Web Signature (JWS).
-
Virtualization
- KVM (for Kernel-based Virtual Machine) - V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko.
- QEMU
- Hyper-V
- oVirt - source distributed virtualization solution, designed to manage your entire enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible.Founded by Red Hat as a community project on which Red Hat Enterprise Virtualization is based allowing for centralized management of virtual machines, compute, storage and networking resources, from an easy-to-use web-based front-end with platform independent access.
- Packer
- Vagrant - to-use workflow and focus on automation, Vagrant lowers development environment setup time, increases production parity, and makes the "works on my machine" excuse a relic of the past. It provides easy to configure, reproducible, and portable work environments built on top of industry-standard technology and controlled by a single consistent workflow to help maximize the productivity and flexibility of you and your team.
- VMware Workstation
- QEMU
- Hyper-V
- oVirt - source distributed virtualization solution, designed to manage your entire enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible.Founded by Red Hat as a community project on which Red Hat Enterprise Virtualization is based allowing for centralized management of virtual machines, compute, storage and networking resources, from an easy-to-use web-based front-end with platform independent access.
-
Databases and Tools
- CouchbaseDB - model NoSQL document-oriented database](https://en.wikipedia.org/wiki/Multi-model_database). It creates a key-value store with managed cache for sub-millisecond data operations, with purpose-built indexers for efficient queries and a powerful query engine for executing SQL queries.
- Amazon DynamoDB - value and document database that delivers single-digit millisecond performance at any scale. It is a fully managed, multiregion, multimaster, durable database with built-in security, backup and restore, and in-memory caching for internet-scale applications.
- Azure SQL Database - powered and automated features that optimize performance and durability for you. Serverless compute and Hyperscale storage options automatically scale resources on demand, so you can focus on building new applications without worrying about storage size or resource management.
- Azure SQL Managed Instance - premises applications to the cloud with very few application and database changes. Managed instance has split compute and storage components.
- Azure Synapse Analytics
- MSSQL for Visual Studio Code
- SQL Server Data Tools (SSDT)
- Bulk Copy Program - line tool that comes with Microsoft SQL Server. BCP, allows you to import and export large amounts of data in and out of SQL Server databases quickly snd efficeiently.
- SQL Server Migration Assistant
- SQL Server Integration Services - level data integration and data transformations solutions. Use Integration Services to solve complex business problems by copying or downloading files, loading data warehouses, cleansing and mining data, and managing SQL Server objects and data.
- SQL Server Business Intelligence(BI)
- Tableau - releases/press-release-details/2019/Salesforce-Completes-Acquisition-of-Tableau/default.aspx).
- DataGrip - sensitive code completion, helping you to write SQL code faster. Completion is aware of the tables structure, foreign keys, and even database objects created in code you're editing.
- RStudio - highlighting editor that supports direct code execution, and tools for plotting, history, debugging and workspace management.
- MySQL - native applications using the world's most popular open source database.
- PostgreSQL - relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance.
- FoundationDB - value store and employs ACID transactions for all operations. It is especially well-suited for read/write workloads but also has excellent performance for write-intensive workloads. FoundationDB was acquired by [Apple in 2015](https://techcrunch.com/2015/03/24/apple-acquires-durable-database-company-foundationdb/).
- MongoDB - like documents.
- OracleDB - critical data with the highest availability, reliability, and security.
- MariaDB - critical applications.
- SQLite - language library that implements a small, fast, self-contained, high-reliability, full-featured, SQL database engine.SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.
- SQLite Database Browser
- dbWatch - premise, hybrid/cloud database environments.
- Adminer
- DBeaver
- DbVisualizer
- AppDynamics Database - Volume Production Environment.
- Toad - in expertise. This SQL management tool resolve issues, manage change and promote the highest levels of code quality for both relational and non-relational databases.
- Lepide SQL Server - to-use, graphical user interface.
- Sequel Pro
- VMware
- Azure SQL Database - powered and automated features that optimize performance and durability for you. Serverless compute and Hyperscale storage options automatically scale resources on demand, so you can focus on building new applications without worrying about storage size or resource management.
- Azure SQL Managed Instance - premises applications to the cloud with very few application and database changes. Managed instance has split compute and storage components.
- Azure Synapse Analytics
- SQL Server Data Tools (SSDT)
- Bulk Copy Program - line tool that comes with Microsoft SQL Server. BCP, allows you to import and export large amounts of data in and out of SQL Server databases quickly snd efficeiently.
- SQL Server Integration Services - level data integration and data transformations solutions. Use Integration Services to solve complex business problems by copying or downloading files, loading data warehouses, cleansing and mining data, and managing SQL Server objects and data.
- RStudio - highlighting editor that supports direct code execution, and tools for plotting, history, debugging and workspace management.
- IBM DB2 - empowered capabilities designed to help you manage both structured and unstructured data on premises as well as in private and public cloud environments. Db2 is built on an intelligent common SQL engine designed for scalability and flexibility.
- DbVisualizer
- Lepide SQL Server - to-use, graphical user interface.
- IBM DB2 - empowered capabilities designed to help you manage both structured and unstructured data on premises as well as in private and public cloud environments. Db2 is built on an intelligent common SQL engine designed for scalability and flexibility.
- Cosmos DB Profiler - time visual debugger allowing a development team to gain valuable insight and perspective into their usage of Cosmos DB database. It identifies over a dozen suspicious behaviors from your application’s interaction with Cosmos DB.
- Azure SQL Database - powered and automated features that optimize performance and durability for you. Serverless compute and Hyperscale storage options automatically scale resources on demand, so you can focus on building new applications without worrying about storage size or resource management.
-
Database Learning Resources
- SQL
- SQL Tutorial by W3Schools
- Learn SQL Skills Online from Coursera
- SQL Courses Online from Udemy
- SQL Online Training Courses from LinkedIn Learning
- Learn SQL For Free from Codecademy
- GitLab's SQL Style Guide
- OracleDB SQL Style Guide Basics
- Databases on AWS
- Best Practices and Recommendations for SQL Server Clustering in AWS EC2.
- Connecting from Google Kubernetes Engine to a Cloud SQL instance.
- Educational Microsoft Azure SQL resources
- MySQL Certifications
- SQL vs. NoSQL Databases: What's the Difference?
- What is NoSQL?
- Tableau CRM: BI Software and Tools
- Educational Microsoft Azure SQL resources
- SQL vs. NoSQL Databases: What's the Difference?
- Tableau CRM: BI Software and Tools
-
Telco Learning Resources
- HPE(Hewlett Packard Enterprise) Telco Blueprints overview
- Network Functions Virtualization Infrastructure (NFVI) by Cisco
- Introduction to vCloud NFV Telco Edge from VMware
- VMware Telco Cloud Automation(TCA) Architecture Overview
- 5G Telco Cloud from VMware
- Maturing OpenStack Together To Solve Telco Needs from Red Hat
- Red Hat telco ecosystem program
- OpenStack for Telcos by Canonical
- Open source NFV platform for 5G from Ubuntu
- Understanding 5G Technology from Verizon
- Verizon and Unity partner to enable 5G & MEC gaming and enterprise applications
- Understanding 5G Technology from Intel
- Understanding 5G Technology from Qualcomm
- Telco Acceleration with Xilinx
- VIMs on OSM Public Wiki
- Amazon EC2 Overview and Networking Introduction for Telecom Companies
- Cloud Native Computing Foundation Training and Certification Program
- Maturing OpenStack Together To Solve Telco Needs from Red Hat
- Understanding 5G Technology from Qualcomm
- Amazon EC2 Overview and Networking Introduction for Telecom Companies
- Cloud Native Computing Foundation Training and Certification Program
- Citrix Certified Associate – Networking(CCA-N)
- Citrix Certified Professional – Virtualization(CCP-V)
-
Tools
- Open Stack - as-a-service (IaaS) to orchestrate data center operations on bare metal, private cloud hardware, public cloud resources, or both (hybrid/multi-cloud architecture). OpenStack includes advance use of virtualization & SDN for network traffic optimization to handle the core cloud-computing services of compute, networking, storage, identity, and image services.
- StarlingX - low latency use cases.
- Airship
- Network functions virtualization (NFV)
- Software Defined Networking (SDN) - based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network. This model differs from that of traditional networks, which use dedicated hardware devices (routers and switches) to control network traffic.
- Virtualized Infrastructure Manager (VIM)
- Management and Orchestration(MANO) - hosted initiative to develop an Open Source NFV Management and Orchestration (MANO) software stack aligned with ETSI NFV. Two of the key components of the ETSI NFV architectural framework are the NFV Orchestrator and VNF Manager, known as NFV MANO.
- Magma - effective and extensible carrier-grade networks. Magma is 3GPP generation (2G, 3G, 4G or upcoming 5G networks) and access network agnostic (cellular or WiFi). It can flexibly support a radio access network with minimal development and deployment effort.
- OpenRAN - vendor deployments.
- Open vSwitch(OVS)
- Edge
- Multi-access edge computing (MEC) - parties across multi-vendor Multi-access Edge Computing platforms.
- Virtualized network functions(VNFs)
- Cloud-Native Network Functions(CNF)
- Physical Network Function(PNF)
- Network functions virtualization infrastructure(NFVI)
- Open Source Security Foundation (OpenSSF) - industry collaboration that brings together leaders to improve the security of open source software by building a broader community, targeted initiatives, and best practices. The OpenSSF brings together open source security initiatives under one foundation to accelerate work through cross-industry support. Along with the Core Infrastructure Initiative and the Open Source Security Coalition, and will include new working groups that address vulnerability disclosures, security tooling and more.
- Magma - effective and extensible carrier-grade networks. Magma is 3GPP generation (2G, 3G, 4G or upcoming 5G networks) and access network agnostic (cellular or WiFi). It can flexibly support a radio access network with minimal development and deployment effort.
- Edge
- Virtualized network functions(VNFs)
-
Security Tools
- Metasploit Project
- AppArmor - to-use Linux application security system. AppArmor proactively protects the operating system and applications from external or internal threats, even zero-day attacks, by enforcing good behavior and preventing both known and unknown application flaws from being exploited. AppArmor supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been included in the mainline Linux kernel since version 2.6.36 and its development has been supported by Canonical since 2009.
- Control Groups(Cgroups) - defined groups of tasks (processes) running on a system.
- Libgcrypt
- Kali Linux - class information security training and penetration testing services.
- Pi-hole - side software, intended for use on a private network. It is designed for use on embedded devices with network capability, such as the Raspberry Pi, but it can be used on other machines running Linux and cloud implementations.
- Aircrack-ng - PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.
- Burp Suite
- KernelCI - based open source distributed test automation system focused on upstream kernel development. The primary goal of KernelCI is to use an open testing philosophy to ensure the quality, stability and long-term maintenance of the Linux kernel.
- Continuous Kernel Integration project
- eBPF - rich without continuing to add additional layers of complexity to the system.
- Cilium
- Istio
- Scapy - based interactive packet manipulation program & library.
- OSSEC - source host-based intrusion detection system. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response.
- Nmap
- pfSense
- Snort - source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats.
- Wireshark - source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.
- OpenSCAP
- OWASP - available articles, methodologies, documentation, tools, and technologies in the field of web application security.
- Open Vulnerability and Assessment Language
- ClamAV
- eBPF - rich without continuing to add additional layers of complexity to the system.
- OWASP - available articles, methodologies, documentation, tools, and technologies in the field of web application security.
-
Security Standards, Frameworks and Benchmarks
- STIGs Benchmarks - Security Technical Implementation Guides
- CIS Benchmarks - CIS Center for Internet Security
- NIST - Current FIPS
- ISO Standards Catalogue
- Common Criteria for Information Technology Security Evaluation (CC)
- ISO 22301 - practice framework for implementing an optimised BCMS (business continuity management system).
- ISO27001 - effectively.
- ISO 27701
- EU GDPR (General Data Protection Regulation)
- CCPA (California Consumer Privacy Act)
- Payment Card Industry (PCI) Data Security Standards (DSS)
- SOC 2
- NIST CSF
- CIS Benchmarks - CIS Center for Internet Security
- NIST - Current FIPS
- ISO 22301 - practice framework for implementing an optimised BCMS (business continuity management system).
- ISO27001 - effectively.
- ISO 27701
- Payment Card Industry (PCI) Data Security Standards (DSS)
- SOC 2
- SOC 2
Categories
Kubernetes Learning Resources
59
Databases and Tools
44
Open Source Security Learning Resources
34
Security Tools
25
Telco Learning Resources
23
Security Standards, Frameworks and Benchmarks
21
Tools
20
Database Learning Resources
19
Virtualization
10
Protocols
4
Networking Learning Resources
3
License
1
Sub Categories