💬 Host Commentary

Episode 3 is a “boring on purpose” platform episode, and I mean that as a compliment.

This one is about the stuff that quietly causes most real incidents: configuration drift, control plane bottlenecks, and CI/CD guardrails that are either too loose or too painful.

We start with Kubernetes’ new “Configuration Good Practices” guidance. It reads like a reality check for anyone who’s ever had a tiny YAML change turn into a day-long outage. The themes are simple but painfully true: stop treating config like an afterthought, standardize how you template and overlay manifests, avoid magic defaults, and validate early so you don’t discover problems at apply-time. If you’ve got a mix of Helm, Kustomize, raw YAML, and “hotfix manifests from someone’s laptop,” this is a good week to use the Kubernetes post as a neutral checklist and start converging on a sane pattern.

Then we move into AWS and EKS. The interesting shift here is AWS acknowledging the two areas that bite teams at scale: control plane capacity and networking visibility. Provisioned Control Plane is basically “stop guessing and reserve control plane headroom,” which matters a lot in multi-tenant clusters and during noisy deploy windows. And the container network observability updates are really about answering the question we all get: “who is talking to what, and why is it slow?” Without having to duct-tape five separate tools together to prove it.

After that, we hit GitHub. There are small changes that matter if you’re running CI as a platform. Actions OIDC tokens now include a check_run_id, which makes it easier to do tighter least-privilege policies and better audit trails. On the AI side, GitHub is pushing harder on “instructions files” and custom Copilot agents, which is basically the early version of “your platform has to work for humans and AI helpers at the same time.” That’s cool, but it also raises the bar for guardrails. The whole point is: we want automation, but we still want safety.

Lightning round is a mix of security and economics: Terrascan getting archived, Azure absorbing a massive DDoS, and AWS testing flat-rate CDN pricing. And we close with a human angle that I really like: if we wrote incident reports as if a future AI (and your future teammates) will rely on them to debug the next outage, we’d probably write better postmortems today too.

If you run clusters, own reliability, or you’re the person everybody pings when “the pipeline is weird” or “Kubernetes is sad,” this episode should feel very familiar. Show notes below have the source links if you want to go deeper.

📝 Show Notes

In this episode of Ship It Weekly, Brian digs into what’s new for people actually running infra: Kubernetes config, EKS control planes and networking, and GitHub’s latest CI/CD and Copilot updates.

We start with Kubernetes’ new configuration good practices post and how to turn it into a checklist to clean up Helm/Kustomize and kill off “hotfix from my laptop” manifests.

Then we hit AWS: EKS Provisioned Control Plane to size control plane capacity for big or noisy clusters, plus new network observability so you can see who’s talking to what across clusters and AZs instead of guessing from node metrics.

On the GitHub side, Actions OIDC tokens now include a check_run_id for tighter access control, and Copilot adds instructions files and custom agents so you can encode platform and security expectations directly into reviews and workflows.

In the lightning round, we touch on Terrascan being archived, Microsoft’s write-up of a 15.72 Tbps Aisuru DDoS attack against Azure, and AWS flat-rate CloudFront plans that bundle CDN and security into more predictable pricing.

We close with Lorin Hochstein’s “Two thought experiments” and what it looks like to write incident reports as if an AI (and your future teammates) will rely on them to debug the next outage.

If run Kubernetes in prod this one should give you a few concrete ideas for your roadmap.

Links from episode

https://kubernetes.io/blog/2025/11/25/configuration-good-practices/

https://aws.amazon.com/about-aws/whats-new/2025/11/amazon-eks-provisioned-control-plane/

https://aws.amazon.com/blogs/aws/monitor-network-performance-and-traffic-across-your-eks-clusters-with-container-network-observability/

https://github.blog/changelog/2025-11-13-github-actions-oidc-token-claims-now-include-check_run_id/

https://github.blog/ai-and-ml/unlocking-the-full-power-of-copilot-code-review-master-your-instructions-files/

https://docs.github.com/en/copilot/how-tos/use-copilot-agents/coding-agent/create-custom-agents

Lightning Round

https://github.com/tenable/terrascan

https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/

https://aws.amazon.com/about-aws/whats-new/2025/11/aws-flat-rate-pricing-plans/

https://sreweekly.com/sre-weekly-issue-498/ (Lorin's Article)