Kubernetes

Building a Hacky AWS Proxy Service with kube-proxy, socat, and Bash

Disclaimer: My good friend Claude wrote this post. I only created a hack and told him about it.

Ever needed to connect to AWS services like RDS or DocumentDB from your local machine, but they’re locked away in private subnets? Instead of doing something reasonable like setting up a VPN, here’s a solution that involves using your production Kubernetes cluster as an impromptu bastion host. What could possibly go wrong?

Building a Kubernetes Operator for the sake of building a Kubernetes Operator

The Problem

At my current $job, we recently migrated to ArgoCD from Terraform for application deployments 🙏. With that came a challenge: how do we pass Terraform outputs into Kubernetes manifests?

For example, our AWS Managed Prometheus endpoint lives in Terraform state, but our apps deployed via ArgoCD need that URL. Sure, we could use External Secrets Operator (and we do!), but it adds an extra layer of indirection when you just want to see what values are being injected into pods.