Steven's Knowledge

Infrastructure

Infrastructure technologies, platforms, and best practices for building reliable systems

Infrastructure

Infrastructure covers the foundational technologies and platforms that support application deployment, monitoring, scaling, and reliability. This section provides guides on key infrastructure components used in modern systems.

Topics

database

ELK Stack

Elasticsearch, Logstash, Kibana for log management and search

box

Containerization

Docker and Kubernetes for container orchestration

mail

Message Queues

Kafka, RabbitMQ for asynchronous messaging

activity

Monitoring

Prometheus, Grafana for infrastructure monitoring and alerting

terminal

Infrastructure as Code

Terraform, Ansible for automated infrastructure provisioning

network

Service Mesh

Istio, Linkerd for mTLS, traffic management, and observability

key

Secret Management

HashiCorp Vault for centralized secret storage, dynamic credentials, and rotation

door-open

API Gateway

Kong, Envoy, Traefik - the front door for your services with auth, rate limits, and routing

git-branch

CI/CD Platforms

GitHub Actions and GitLab CI in depth - pipelines, OIDC, runners, deployment patterns

toggle-right

Feature Flags

LaunchDarkly, Unleash, OpenFeature - decouple deployment from release with targeted rollouts

zap

Cache

Redis and Memcached - in-memory caching, patterns, and avoiding classic cache pitfalls

globe

CDN

Cloudflare, Fastly, CloudFront - global edge caching, image optimization, DDoS protection

globe-2

DNS

Records, zones, TTL, anycast, propagation - the original distributed system, still in your critical path

search

Search

Algolia, Meilisearch, Typesense - typo-tolerant instant search beyond Elasticsearch

cpu

Edge Functions

Cloudflare Workers, Vercel Edge, Deno Deploy - code running at the CDN edge, near every user

hard-drive

Object Storage

S3, R2, GCS, MinIO - blob storage at unlimited scale, the backbone of modern data persistence

git-merge

Tracing

OpenTelemetry, Jaeger, Tempo - see how a request flows across services; the third pillar of observability

user-check

Identity & Auth

Auth0, Clerk, WorkOS, Keycloak - user identity, SSO, OAuth/OIDC, SCIM; don't build your own

list-checks

Background Jobs

Sidekiq, BullMQ, Celery, Temporal - task queues, retries, scheduled work, durable workflows

binary

Vector Databases

Pinecone, Qdrant, Weaviate, pgvector - semantic search, RAG, the storage layer for embeddings

send

Email & Communication

Resend, SendGrid, SES, Postmark, Twilio - transactional email, SMS, push, deliverability

shield-check

VPN & Zero Trust

Tailscale, WireGuard, Cloudflare Tunnel - private networking without perimeter VPN

layout-template

Static Site Hosting

Cloudflare Pages, Vercel, Netlify - host frontends with edge CDN, preview deploys, and edge functions

waves

Stream Processing

Flink, Kafka Streams, Materialize - continuous computation over events in motion

zap-off

Chaos Engineering

Chaos Mesh, Litmus, Gremlin - inject controlled failure to find weaknesses before they find you

dollar-sign

FinOps & Cloud Cost

OpenCost, Kubecost, Vantage, Cloudability - bring engineering, finance, and product together to spend cloud dollars wisely

line-chart

Time-Series Databases

InfluxDB, TimescaleDB, VictoriaMetrics, QuestDB - purpose-built storage for timestamps, metrics, sensors, and event streams

git-pull-request

GitOps

ArgoCD, Flux, Jenkins X - declarative continuous delivery where Git is the source of truth for what runs in production

shield

Policy as Code

OPA, Kyverno, Cedar, Sentinel - express security, compliance, and operational rules as version-controlled code

filter

Observability Pipelines

Vector, OpenTelemetry Collector, Fluent Bit, Cribl - route, transform, sample, and reduce telemetry between producers and backends

layout-dashboard

Internal Developer Platforms

Backstage, Port, Cortex, Humanitec - service catalogs, golden paths, and self-service portals that turn infrastructure into a product

lock

Supply Chain Security

Sigstore, Cosign, SBOM, SLSA, in-toto - prove what is in your artifacts and that they came from where you think they did

life-buoy

Disaster Recovery & Backup

Velero, Restic, snapshot patterns, cross-region replication, RTO/RPO - getting back online when things go very wrong

shield-alert

WAF, DDoS & Bot Management

Cloudflare, AWS WAF, Akamai, Imperva - edge security for the public web; filtering attacks before they hit your origin

warehouse

Data Warehouses & Lakehouses

Snowflake, BigQuery, Databricks, ClickHouse, Redshift - column-oriented storage and compute for analytics over billions of rows

workflow

Workflow Orchestration

Airflow, Dagster, Prefect, Argo Workflows - scheduling, dependency management, and observability for DAG-based pipelines

brain

MLOps & AI Infrastructure

MLflow, Kubeflow, Ray, BentoML, vLLM, SageMaker - training, serving, monitoring, and lifecycle for ML and AI workloads

radar

Container Runtime Security

Falco, Tetragon, Tracee, eBPF-based detection - catch what supply-chain checks and admission policies miss, at runtime

On this page