Skip to content
View Debasish-87's full-sized avatar
Premium
Premium

Highlights

  • Pro

Block or report Debasish-87

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Debasish-87/README.md

Open Source Contributions

Merged contributions to production-grade open source projects in the cloud-native ecosystem — fixing real bugs in systems used at scale.

Contributions

Project Description Status
kubernetes/autoscaler#9506 Noticed that Exoscale instance pool node groups were completely ignoring the configured minSize and always falling back to 1. This meant the Cluster Autoscaler would under-provision nodes regardless of what you set. Traced it to missing minSize/maxSize fields in instancePoolNodeGroup — the SKS implementation had them, but instance pools didn't. Added the fields, wired them through NodeGroupSpec, and left a comment around the >= 1 assumption so future scale-from-zero work doesn't get silently broken. Merged

kubernetes-9506 merged
falcosecurity/libs#2930 Found that VMSIZE and VMRSS were silently producing wrong values for any process using more than 4 GB of memory. The KB→byte multiplication was happening in 32-bit, then getting assigned to a uint64_t — so the overflow was invisible. A one-line fix: explicitly cast the operands to uint64_t before multiplying. Small change, but it was quietly corrupting memory telemetry and could affect Falco rule evaluation for high-memory workloads. Merged v0.24.0

falcosecurity-2930 merged
falcosecurity/libs#2926 Spotted a file descriptor leak in scap_linux_get_threadlisttaskdir_p was opened with opendir() but never closed when the function hit an error path and jumped to the goto error label. Fixed by moving the declaration to the top of the function, initializing it to NULL, and closing it in the error path. Ran Heaptrack to confirm — 0B leaked after the fix. Merged v0.24.0

falcosecurity-2926 merged
helm/helm#31973 The comments in registry/client.go were describing the wrong behavior for ClientOptPlainHTTP and a few related auth options — misleading anyone reading the code about when plain HTTP and credential passing actually kicks in. Cleaned up and corrected all the affected comments. No functional changes, just making the code easier to reason about. Merged

Pinned Loading

  1. ZeroTrustOps-Platform ZeroTrustOps-Platform Public

    ZeroTrustOps — Kubernetes-native DevSecOps enforcement platform that scans Infrastructure-as-Code and repositories on every Git push, evaluating security rules and blocking deployments via a determ…

    Go 7 3

  2. kubertsec kubertsec Public

    KubeRTSec — eBPF-based Kubernetes runtime security system that intercepts execve syscalls to detect and optionally terminate malicious processes in real time, providing kernel-level visibility and …

    JavaScript 2

  3. Polyglot-CICD-Engine Polyglot-CICD-Engine Public

    A universal CI/CD automation engine for polyglot microservices (Java, Node.js, Python), powered by Jenkins, GitHub Actions, Tekton, and Kubernetes.

    Python 7 4

  4. k3s-istio-canary-deployment k3s-istio-canary-deployment Public

    K3s-Istio Canary Deployment — Kubernetes progressive delivery system using Istio traffic routing to implement canary releases, enabling controlled traffic splitting, real-time observability, and ra…

    Shell 8 4