1_r/devopsish

1_r/devopsish

54499 bookmarks
Custom sorting
Redis users considering alternatives after licensing move
Redis users considering alternatives after licensing move

Redis users considering alternatives after licensing move

Around 70 percent of Redis users are considering alternatives after the database company made a shift away from permissive open source licensing. According to a…

September 24, 2024 at 09:30AM

via Instapaper

·theregister.com·
Redis users considering alternatives after licensing move
I’m not saying I agree/disagree here, but I always appreciate different views and perspectives for many reasons. Telling the future is hard and often changes outcomes | Will A.I. Be a Bust? A Wall Street Skeptic Rings the Alarm.
I’m not saying I agree/disagree here, but I always appreciate different views and perspectives for many reasons. Telling the future is hard and often changes outcomes | Will A.I. Be a Bust? A Wall Street Skeptic Rings the Alarm.
Jim Covello, Goldman Sachs’s head of stock research, warned that building too much of what the world doesn’t need “typically ends badly.”
·nytimes.com·
I’m not saying I agree/disagree here, but I always appreciate different views and perspectives for many reasons. Telling the future is hard and often changes outcomes | Will A.I. Be a Bust? A Wall Street Skeptic Rings the Alarm.
Configuring requests & limits with the HPA at scale with Alexandre Souza
Configuring requests & limits with the HPA at scale with Alexandre Souza

Configuring requests & limits with the HPA at scale, with Alexandre Souza

https://kube.fm/hpa-at-scale-alex

Alexandre Souza, a senior platform engineer at Getir, shares his expertise in managing large-scale environments and configuring requests, limits, and autoscaling.

He explores the challenges of over-provisioning and under-provisioning and discusses strategies for optimizing resource allocation using tools like Horizontal Pod Autoscaler (HPA) and Vertical Pod Autoscaler (VPA).

You will learn:

How to set appropriate resource requests and limits to balance application performance and cost-efficiency in large-scale Kubernetes environments.

Strategies for implementing and configuring Horizontal Pod Autoscaler (HPA), including scaling policies and behavior management.

The differences between CPU and memory management in Kubernetes and their impact on workload performance.

Techniques for leveraging tools like KubeCost and StormForge to automate resource optimization.

Sponsor

This episode is sponsored by VictoriaMetrics - request a free trial for VictoriaMetrics enterprise today.

More info

Find all the links and info for this episode here: https://kube.fm/hpa-at-scale-alex

Interested in sponsoring an episode? Learn more.

via KubeFM https://kube.fm

September 24, 2024 at 06:00AM

·kube.fm·
Configuring requests & limits with the HPA at scale with Alexandre Souza
Spotlight on SIG Scheduling
Spotlight on SIG Scheduling

Spotlight on SIG Scheduling

https://kubernetes.io/blog/2024/09/24/sig-scheduling-spotlight-2024/

In this SIG Scheduling spotlight we talked with Kensei Nakada, an approver in SIG Scheduling.

Introductions

Arvind: Hello, thank you for the opportunity to learn more about SIG Scheduling! Would you like to introduce yourself and tell us a bit about your role, and how you got involved with Kubernetes?

Kensei: Hi, thanks for the opportunity! I’m Kensei Nakada (@sanposhiho), a software engineer at Tetrate.io. I have been contributing to Kubernetes in my free time for more than 3 years, and now I’m an approver of SIG-Scheduling in Kubernetes. Also, I’m a founder/owner of two SIG subprojects, kube-scheduler-simulator and kube-scheduler-wasm-extension.

About SIG Scheduling

AP: That's awesome! You've been involved with the project since a long time. Can you provide a brief overview of SIG Scheduling and explain its role within the Kubernetes ecosystem?

KN: As the name implies, our responsibility is to enhance scheduling within Kubernetes. Specifically, we develop the components that determine which Node is the best place for each Pod. In Kubernetes, our main focus is on maintaining the kube-scheduler, along with other scheduling-related components as part of our SIG subprojects.

AP: I see, got it! That makes me curious--what recent innovations or developments has SIG Scheduling introduced to Kubernetes scheduling?

KN: From a feature perspective, there have been several enhancements to PodTopologySpread recently. PodTopologySpread is a relatively new feature in the scheduler, and we are still in the process of gathering feedback and making improvements.

Most recently, we have been focusing on a new internal enhancement called QueueingHint which aims to enhance scheduling throughput. Throughput is one of our crucial metrics in scheduling. Traditionally, we have primarily focused on optimizing the latency of each scheduling cycle. QueueingHint takes a different approach, optimizing when to retry scheduling, thereby reducing the likelihood of wasting scheduling cycles.

A: That sounds interesting! Are there any other interesting topics or projects you are currently working on within SIG Scheduling?

KN: I’m leading the development of QueueingHint which I just shared. Given that it’s a big new challenge for us, we’ve been facing many unexpected challenges, especially around the scalability, and we’re trying to solve each of them to eventually enable it by default.

And also, I believe kube-scheduler-wasm-extention (SIG sub project) that I started last year would be interesting to many people. Kubernetes has various extensions from many components. Traditionally, extensions are provided via webhooks (extender in the scheduler) or Go SDK (Scheduling Framework in the scheduler). However, these come with drawbacks - performance issues with webhooks and the need to rebuild and replace schedulers with Go SDK, posing difficulties for those seeking to extend the scheduler but lacking familiarity with it. The project is trying to introduce a new solution to this general challenge - a WebAssembly based extension. Wasm allows users to build plugins easily, without worrying about recompiling or replacing their scheduler, and sidestepping performance concerns.

Through this project, sig-scheduling has been learning valuable insights about WebAssembly's interaction with large Kubernetes objects. And I believe the experience that we’re gaining should be useful broadly within the community, beyond sig-scheduling.

A: Definitely! Now, there are currently 8 subprojects inside SIG Scheduling. Would you like to talk about them? Are there some interesting contributions by those teams you want to highlight?

KN: Let me pick up three sub projects; Kueue, KWOK and descheduler.

Kueue:

Recently, many people have been trying to manage batch workloads with Kubernetes, and in 2022, Kubernetes community founded WG-Batch for better support for such batch workloads in Kubernetes. Kueue is a project that takes a crucial role for it. It’s a job queueing controller, deciding when a job should wait, when a job should be admitted to start, and when a job should be preempted. Kueue aims to be installed on a vanilla Kubernetes cluster while cooperating with existing matured controllers (scheduler, cluster-autoscaler, kube-controller-manager, etc).

KWOK:

KWOK is a component in which you can create a cluster of thousands of Nodes in seconds. It’s mostly useful for simulation/testing as a lightweight cluster, and actually another SIG sub project kube-scheduler-simulator uses KWOK background.

descheduler:

Descheduler is a component recreating pods that are running on undesired Nodes. In Kubernetes, scheduling constraints (PodAffinity, NodeAffinity, PodTopologySpread, etc) are honored only at Pod schedule, but it’s not guaranteed that the contrtaints are kept being satisfied afterwards. Descheduler evicts Pods violating their scheduling constraints (or other undesired conditions) so that they’re recreated and rescheduled.

Descheduling Framework.

One very interesting on-going project, similar to Scheduling Framework in the scheduler, aiming to make descheduling logic extensible and allow maintainers to focus on building a core engine of descheduler.

AP: Thank you for letting us know! And I have to ask, what are some of your favorite things about this SIG?

KN: What I really like about this SIG is how actively engaged everyone is. We come from various companies and industries, bringing diverse perspectives to the table. Instead of these differences causing division, they actually generate a wealth of opinions. Each view is respected, and this makes our discussions both rich and productive.

I really appreciate this collaborative atmosphere, and I believe it has been key to continuously improving our components over the years.

Contributing to SIG Scheduling

AP: Kubernetes is a community-driven project. Any recommendations for new contributors or beginners looking to get involved and contribute to SIG scheduling? Where should they start?

KN: Let me start with a general recommendation for contributing to any SIG: a common approach is to look for good-first-issue. However, you'll soon realize that many people worldwide are trying to contribute to the Kubernetes repository.

I suggest starting by examining the implementation of a component that interests you. If you have any questions about it, ask in the corresponding Slack channel (e.g., #sig-scheduling for the scheduler, #sig-node for kubelet, etc). Once you have a rough understanding of the implementation, look at issues within the SIG (e.g., sig-scheduling), where you'll find more unassigned issues compared to good-first-issue ones. You may also want to filter issues with the kind/cleanup label, which often indicates lower-priority tasks and can be starting points.

Specifically for SIG Scheduling, you should first understand the Scheduling Framework, which is the fundamental architecture of kube-scheduler. Most of the implementation is found in pkg/scheduler. I suggest starting with ScheduleOne function and then exploring deeper from there.

Additionally, apart from the main kubernetes/kubernetes repository, consider looking into sub-projects. These typically have fewer maintainers and offer more opportunities to make a significant impact. Despite being called "sub" projects, many have a large number of users and a considerable impact on the community.

And last but not least, remember contributing to the community isn’t just about code. While I talked a lot about the implementation contribution, there are many ways to contribute, and each one is valuable. One comment to an issue, one feedback to an existing feature, one review comment in PR, one clarification on the documentation; every small contribution helps drive the Kubernetes ecosystem forward.

AP: Those are some pretty useful tips! And if I may ask, how do you assist new contributors in getting started, and what skills are contributors likely to learn by participating in SIG Scheduling?

KN: Our maintainers are available to answer your questions in the #sig-scheduling Slack channel. By participating, you'll gain a deeper understanding of Kubernetes scheduling and have the opportunity to collaborate and network with maintainers from diverse backgrounds. You'll learn not just how to write code, but also how to maintain a large project, design and discuss new features, address bugs, and much more.

Future Directions

AP: What are some Kubernetes-specific challenges in terms of scheduling? Are there any particular pain points?

KN: Scheduling in Kubernetes can be quite challenging because of the diverse needs of different organizations with different business requirements. Supporting all possible use cases in kube-scheduler is impossible. Therefore, extensibility is a key focus for us. A few years ago, we rearchitected kube-scheduler with Scheduling Framework, which offers flexible extensibility for users to implement various scheduling needs through plugins. This allows maintainers to focus on the core scheduling features and the framework runtime.

Another major issue is maintaining sufficient scheduling throughput. Typically, a Kubernetes cluster has only one kube-scheduler, so its throughput directly affects the overall scheduling scalability and, consequently, the cluster's scalability. Although we have an internal performance test (scheduler_perf), unfortunately, we sometimes overlook performance degradation in less common scenarios. It’s difficult as even small changes, which look irrelevant to performance, can lead to degradation.

AP: What are some upcoming goals or initiatives for SIG Scheduling? How do you envision the SIG evolving in the future?

KN: Our primary goal is always to build and maintain extensible and stable scheduling runtime, and I bet this goal will remain unchanged forever.

As already mentioned, extensibility is

·kubernetes.io·
Spotlight on SIG Scheduling
Blog: Spotlight on SIG Scheduling
Blog: Spotlight on SIG Scheduling

Blog: Spotlight on SIG Scheduling

https://www.kubernetes.dev/blog/2024/09/24/sig-scheduling-spotlight-2024/

In this SIG Scheduling spotlight we talked with Kensei Nakada, an approver in SIG Scheduling.

Introductions

Arvind: Hello, thank you for the opportunity to learn more about SIG Scheduling! Would you like to introduce yourself and tell us a bit about your role, and how you got involved with Kubernetes?

Kensei: Hi, thanks for the opportunity! I’m Kensei Nakada (@sanposhiho), a software engineer at Tetrate.io. I have been contributing to Kubernetes in my free time for more than 3 years, and now I’m an approver of SIG-Scheduling in Kubernetes. Also, I’m a founder/owner of two SIG subprojects, kube-scheduler-simulator and kube-scheduler-wasm-extension.

About SIG Scheduling

AP: That’s awesome! You’ve been involved with the project since a long time. Can you provide a brief overview of SIG Scheduling and explain its role within the Kubernetes ecosystem?

KN: As the name implies, our responsibility is to enhance scheduling within Kubernetes. Specifically, we develop the components that determine which Node is the best place for each Pod. In Kubernetes, our main focus is on maintaining the kube-scheduler, along with other scheduling-related components as part of our SIG subprojects.

AP: I see, got it! That makes me curious–what recent innovations or developments has SIG Scheduling introduced to Kubernetes scheduling?

KN: From a feature perspective, there have been several enhancements to PodTopologySpread recently. PodTopologySpread is a relatively new feature in the scheduler, and we are still in the process of gathering feedback and making improvements.

Most recently, we have been focusing on a new internal enhancement called QueueingHint which aims to enhance scheduling throughput. Throughput is one of our crucial metrics in scheduling. Traditionally, we have primarily focused on optimizing the latency of each scheduling cycle. QueueingHint takes a different approach, optimizing when to retry scheduling, thereby reducing the likelihood of wasting scheduling cycles.

A: That sounds interesting! Are there any other interesting topics or projects you are currently working on within SIG Scheduling?

KN: I’m leading the development of QueueingHint which I just shared. Given that it’s a big new challenge for us, we’ve been facing many unexpected challenges, especially around the scalability, and we’re trying to solve each of them to eventually enable it by default.

And also, I believe kube-scheduler-wasm-extention (SIG sub project) that I started last year would be interesting to many people. Kubernetes has various extensions from many components. Traditionally, extensions are provided via webhooks (extender in the scheduler) or Go SDK (Scheduling Framework in the scheduler). However, these come with drawbacks - performance issues with webhooks and the need to rebuild and replace schedulers with Go SDK, posing difficulties for those seeking to extend the scheduler but lacking familiarity with it. The project is trying to introduce a new solution to this general challenge - a WebAssembly based extension. Wasm allows users to build plugins easily, without worrying about recompiling or replacing their scheduler, and sidestepping performance concerns.

Through this project, sig-scheduling has been learning valuable insights about WebAssembly’s interaction with large Kubernetes objects. And I believe the experience that we’re gaining should be useful broadly within the community, beyond sig-scheduling.

A: Definitely! Now, there are currently 8 subprojects inside SIG Scheduling. Would you like to talk about them? Are there some interesting contributions by those teams you want to highlight?

KN: Let me pick up three sub projects; Kueue, KWOK and descheduler.

Kueue:

Recently, many people have been trying to manage batch workloads with Kubernetes, and in 2022, Kubernetes community founded WG-Batch for better support for such batch workloads in Kubernetes. Kueue is a project that takes a crucial role for it. It’s a job queueing controller, deciding when a job should wait, when a job should be admitted to start, and when a job should be preempted. Kueue aims to be installed on a vanilla Kubernetes cluster while cooperating with existing matured controllers (scheduler, cluster-autoscaler, kube-controller-manager, etc).

KWOK:

KWOK is a component in which you can create a cluster of thousands of Nodes in seconds. It’s mostly useful for simulation/testing as a lightweight cluster, and actually another SIG sub project kube-scheduler-simulator uses KWOK background.

descheduler:

Descheduler is a component recreating pods that are running on undesired Nodes. In Kubernetes, scheduling constraints (PodAffinity, NodeAffinity, PodTopologySpread, etc) are honored only at Pod schedule, but it’s not guaranteed that the contrtaints are kept being satisfied afterwards. Descheduler evicts Pods violating their scheduling constraints (or other undesired conditions) so that they’re recreated and rescheduled.

Descheduling Framework.

One very interesting on-going project, similar to Scheduling Framework in the scheduler, aiming to make descheduling logic extensible and allow maintainers to focus on building a core engine of descheduler.

AP: Thank you for letting us know! And I have to ask, what are some of your favorite things about this SIG?

KN: What I really like about this SIG is how actively engaged everyone is. We come from various companies and industries, bringing diverse perspectives to the table. Instead of these differences causing division, they actually generate a wealth of opinions. Each view is respected, and this makes our discussions both rich and productive.

I really appreciate this collaborative atmosphere, and I believe it has been key to continuously improving our components over the years.

Contributing to SIG Scheduling

AP: Kubernetes is a community-driven project. Any recommendations for new contributors or beginners looking to get involved and contribute to SIG scheduling? Where should they start?

KN: Let me start with a general recommendation for contributing to any SIG: a common approach is to look for good-first-issue. However, you’ll soon realize that many people worldwide are trying to contribute to the Kubernetes repository.

I suggest starting by examining the implementation of a component that interests you. If you have any questions about it, ask in the corresponding Slack channel (e.g., #sig-scheduling for the scheduler, #sig-node for kubelet, etc). Once you have a rough understanding of the implementation, look at issues within the SIG (e.g., sig-scheduling), where you’ll find more unassigned issues compared to good-first-issue ones. You may also want to filter issues with the kind/cleanup label, which often indicates lower-priority tasks and can be starting points.

Specifically for SIG Scheduling, you should first understand the Scheduling Framework, which is the fundamental architecture of kube-scheduler. Most of the implementation is found in pkg/scheduler. I suggest starting with ScheduleOne function and then exploring deeper from there.

Additionally, apart from the main kubernetes/kubernetes repository, consider looking into sub-projects. These typically have fewer maintainers and offer more opportunities to make a significant impact. Despite being called “sub” projects, many have a large number of users and a considerable impact on the community.

And last but not least, remember contributing to the community isn’t just about code. While I talked a lot about the implementation contribution, there are many ways to contribute, and each one is valuable. One comment to an issue, one feedback to an existing feature, one review comment in PR, one clarification on the documentation; every small contribution helps drive the Kubernetes ecosystem forward.

AP: Those are some pretty useful tips! And if I may ask, how do you assist new contributors in getting started, and what skills are contributors likely to learn by participating in SIG Scheduling?

KN: Our maintainers are available to answer your questions in the #sig-scheduling Slack channel. By participating, you’ll gain a deeper understanding of Kubernetes scheduling and have the opportunity to collaborate and network with maintainers from diverse backgrounds. You’ll learn not just how to write code, but also how to maintain a large project, design and discuss new features, address bugs, and much more.

Future Directions

AP: What are some Kubernetes-specific challenges in terms of scheduling? Are there any particular pain points?

KN: Scheduling in Kubernetes can be quite challenging because of the diverse needs of different organizations with different business requirements. Supporting all possible use cases in kube-scheduler is impossible. Therefore, extensibility is a key focus for us. A few years ago, we rearchitected kube-scheduler with Scheduling Framework, which offers flexible extensibility for users to implement various scheduling needs through plugins. This allows maintainers to focus on the core scheduling features and the framework runtime.

Another major issue is maintaining sufficient scheduling throughput. Typically, a Kubernetes cluster has only one kube-scheduler, so its throughput directly affects the overall scheduling scalability and, consequently, the cluster’s scalability. Although we have an internal performance test (scheduler_perf), unfortunately, we sometimes overlook performance degradation in less common scenarios. It’s difficult as even small changes, which look irrelevant to performance, can lead to degradation.

AP: What are some upcoming goals or initiatives for SIG Scheduling? How do you envision the SIG evolving in the future?

KN: Our primary goal is always to build and maintain extensible and stable scheduling runtime, and I bet this goal will remain unchanged forever.

As already mentioned, extensi

·kubernetes.dev·
Blog: Spotlight on SIG Scheduling
Stop Writing Tedious Security Rules! Let Kubescape Do the Work
Stop Writing Tedious Security Rules! Let Kubescape Do the Work

Stop Writing Tedious Security Rules! Let Kubescape Do the Work

Discover how to enhance your Kubernetes security with Kubescape's Runtime Threat Detection! In this video, we dive into the Anomaly Detection Engine, which learns the normal behavior of your applications and alerts you to any deviations. We'll set up a demo environment, deploy Kubescape, and simulate both normal and malicious activities to see how it performs. Learn how to configure alerts, understand application profiles, and integrate with AlertManager for effective monitoring. Perfect for anyone looking to improve their Kubernetes security posture with open-source tools.

KubernetesSecurity #Kubescape #RuntimeThreatDetection #AnomalyDetection

Consider joining the channel: https://www.youtube.com/c/devopstoolkit/join

▬▬▬▬▬▬ 🔗 Additional Info 🔗 ▬▬▬▬▬▬ ➡ Transcript and commands: https://devopstoolkit.live/security/stop-writing-tedious-security-rules-let-kubescape-do-the-work ➡ Kubescape: https://kubescape.io 🎬 How to Secure Kubernetes Clusters with Kubescape and Armo: https://youtu.be/ZATGiDIDBQk

▬▬▬▬▬▬ 💰 Sponsorships 💰 ▬▬▬▬▬▬ If you are interested in sponsoring this channel, please visit https://devopstoolkit.live/sponsor for more information. Alternatively, feel free to contact me over Twitter or LinkedIn (see below).

▬▬▬▬▬▬ 👋 Contact me 👋 ▬▬▬▬▬▬ ➡ Twitter: https://twitter.com/vfarcic ➡ LinkedIn: https://www.linkedin.com/in/viktorfarcic/

▬▬▬▬▬▬ 🚀 Other Channels 🚀 ▬▬▬▬▬▬ 🎤 Podcast: https://www.devopsparadox.com/ 💬 Live streams: https://www.youtube.com/c/DevOpsParadox

▬▬▬▬▬▬ ⏱ Timecodes ⏱ ▬▬▬▬▬▬ 00:00 Introduction to Runtime Security 02:55 Kubescape Runtime Threat Detection 04:14 Kubescape Anomaly Detection Engine In Action 14:41 Kubescape Anomaly Detection Engine Pros and Cons

via YouTube https://www.youtube.com/watch?v=xilNX_mh6vE

·youtube.com·
Stop Writing Tedious Security Rules! Let Kubescape Do the Work
Stop Writing Tedious Security Rules! Let Kubescape Do the Work
Stop Writing Tedious Security Rules! Let Kubescape Do the Work

Stop Writing Tedious Security Rules! Let Kubescape Do the Work

Discover how to enhance your Kubernetes security with Kubescape's Runtime Threat Detection! In this video, we dive into the Anomaly Detection Engine, which learns the normal behavior of your applications and alerts you to any deviations. We'll set up a demo environment, deploy Kubescape, and simulate both normal and malicious activities to see how it performs. Learn how to configure alerts, understand application profiles, and integrate with AlertManager for effective monitoring. Perfect for anyone looking to improve their Kubernetes security posture with open-source tools.

KubernetesSecurity #Kubescape #RuntimeThreatDetection #AnomalyDetection

Consider joining the channel: https://www.youtube.com/c/devopstoolkit/join

▬▬▬▬▬▬ 🔗 Additional Info 🔗 ▬▬▬▬▬▬ ➡ Transcript and commands: https://devopstoolkit.live/security/stop-writing-tedious-security-rules-let-kubescape-do-the-work 🔗 Kubescape Node Agent: https://kubescape.io 🎬 How to Secure Kubernetes Clusters with Kubescape and Armo: https://youtu.be/ZATGiDIDBQk

▬▬▬▬▬▬ 💰 Sponsorships 💰 ▬▬▬▬▬▬ If you are interested in sponsoring this channel, please visit https://devopstoolkit.live/sponsor for more information. Alternatively, feel free to contact me over Twitter or LinkedIn (see below).

▬▬▬▬▬▬ 👋 Contact me 👋 ▬▬▬▬▬▬ ➡ Twitter: https://twitter.com/vfarcic ➡ LinkedIn: https://www.linkedin.com/in/viktorfarcic/

▬▬▬▬▬▬ 🚀 Other Channels 🚀 ▬▬▬▬▬▬ 🎤 Podcast: https://www.devopsparadox.com/ 💬 Live streams: https://www.youtube.com/c/DevOpsParadox

▬▬▬▬▬▬ ⏱ Timecodes ⏱ ▬▬▬▬▬▬ 00:00 Introduction to Runtime Security 02:55 Kubescape Runtime Threat Detection 04:14 Kubescape Anomaly Detection Engine In Action 14:41 Kubescape Anomaly Detection Engine Pros and Cons

via YouTube https://www.youtube.com/watch?v=EYET9aXnv9c

·youtube.com·
Stop Writing Tedious Security Rules! Let Kubescape Do the Work
DevOps Toolkit - Observability Metrics - Feat. Prometheus Cortex and Thanos (You Choose! Ch. 4 Ep. 03) - https://www.youtube.com/watch?v=UXC9w3R9k8M
DevOps Toolkit - Observability Metrics - Feat. Prometheus Cortex and Thanos (You Choose! Ch. 4 Ep. 03) - https://www.youtube.com/watch?v=UXC9w3R9k8M

Observability Metrics - Feat. Prometheus, Cortex, and Thanos (You Choose!, Ch. 4, Ep. 03)

Metrics - Choose Your Own Adventure: The Observability Odyssey

In this episode, we'll go through metrics. The contestants are Prometheus, Cortex, and Thanos.

Vote for your choice of a tool for signing artifacts at https://cloud-native.slack.com/archives/C05M2NFNVRN. If you have not already joined CNCF Slack, you can do so from https://slack.cncf.io.

This and all other episodes are available at https://www.youtube.com/playlist?list=PLyicRj904Z9-FzCPvGpVHgRQVYJpVmx3Z.

More information about the "Choose Your Own Adventure" project including the source code and links to all the videos can be found at https://github.com/vfarcic/cncf-demo.

٩( ᐛ )و Whitney's YouTube Channel → https://www.youtube.com/@wiggitywhitney

prometheus #cortex #thanos

▬▬▬▬▬▬ 🔗 Additional Info 🔗 ▬▬▬▬▬▬ 🔗 Open Standards: https://github.com/vfarcic/cncf-demo/tree/main/manuscript/metrics/README.md

via YouTube https://www.youtube.com/watch?v=UXC9w3R9k8M

·youtube.com·
DevOps Toolkit - Observability Metrics - Feat. Prometheus Cortex and Thanos (You Choose! Ch. 4 Ep. 03) - https://www.youtube.com/watch?v=UXC9w3R9k8M
How the Next Generation of Managers Is Using Gen AI
How the Next Generation of Managers Is Using Gen AI
Only 15% of managers consistently use gen AI, but 40% of business graduate students do. These managers and leaders of the near future will soon enter a workforce that is underprepared for them and poorly designed for them to put their abilities to use. This article explores how organizations should respond. Companies should learn to become a magnet for gen AI-savvy talent, and discover how to best onboard, engage, integrate, and retain the next generation of AI-capable managers.
·hbr.org·
How the Next Generation of Managers Is Using Gen AI
Atkinson Hyperlegible Font - Braille Institute
Atkinson Hyperlegible Font - Braille Institute

Atkinson Hyperlegible Font - Braille Institute

HomeRead Easier With our Free Font Is this font easy for you to read? Good—that’s the idea. Our font, Atkinson Hyperlegible was carefully developed by the…

September 20, 2024 at 12:44PM

via Instapaper

·brailleinstitute.org·
Atkinson Hyperlegible Font - Braille Institute
Microsoft deal would reopen Three Mile Island nuclear plant to power AI
Microsoft deal would reopen Three Mile Island nuclear plant to power AI

Microsoft deal would reopen Three Mile Island nuclear plant to power AI

Pennsylvania’s dormant Three Mile Island nuclear plant would be brought back to life to feed the voracious energy needs of Microsoft under an unprecedented deal…

September 20, 2024 at 11:27AM

via Instapaper

·washingtonpost.com·
Microsoft deal would reopen Three Mile Island nuclear plant to power AI
The 2024 Tidelift state of the open source maintainer report
The 2024 Tidelift state of the open source maintainer report

The 2024 Tidelift state of the open source maintainer report

2024 TIDELIFT STATE OF THE OPEN SOURCE MAINTAINER REPORT September 2024 Top headlines from our annual survey of open source maintainers

September 20, 2024 at 09:25AM

via Instapaper

·explore.tidelift.com·
The 2024 Tidelift state of the open source maintainer report
Open source maintainers underpaid and going gray
Open source maintainers underpaid and going gray

Open source maintainers underpaid and going gray

The majority of open source project maintainers are not being paid for their work, spend three times as much time on security than they did three years ago, and…

September 20, 2024 at 09:25AM

via Instapaper

·theregister.com·
Open source maintainers underpaid and going gray
OPEN SOURCE OBSERVABILITY DAY
OPEN SOURCE OBSERVABILITY DAY

OPEN SOURCE OBSERVABILITY DAY

OPEN SOURCE OBSERVABILITY DAY October 24, 2024 Event starts in: 34 days 3 hours 32 sec + Add to Calendar 600+ Attendees 15+ Key Industry Experts 20+ Talks…

September 19, 2024 at 04:16PM

via Instapaper

·osoday.com·
OPEN SOURCE OBSERVABILITY DAY
Last Week in Kubernetes Development - Week Ending September 15 2024
Last Week in Kubernetes Development - Week Ending September 15 2024

Week Ending September 15, 2024

https://lwkd.info/2024/20240918

Developer News

You have nine days left to vote for the Steering Committee, and five days left to request an eligibility exception.

The first New Contributor Orientation in Europe/Asia time zones has been rescheduled to Thursday September 19th, 2024, at 1:30 PT / 8:30 UTC / 10:30 CET / 14:00 IST.

Cailyn Edwards is joining SIG-Security as co-Chair.

If you’re interested in sharing an unconference topic at the Kubernetes Contributor Summit, it’s time to add yours to the list

Release Schedule

Next Deadline: Production Readiness Freeze, October 3

The release team is collecting Enhancements for tracking in 1.32. They will need to be ready for PRR on October 3 and Enhancements freeze a week later.

KEP of the Week

KEP 3960: Introducing Sleep Action for PreStop Hook

This KEP proposes to add a “sleep” action for the Pod Lifecycle’s PreStop and PostStart hooks. Before this KEP, for achieving the same result, users had to use the exec action and run the sleep command inside it. This required you to have a binary for the sleep command inside your image. Since this is a common usecase, this KEP proposed adding the sleep action as a first class citizen.

This KEP is targeting stable in the upcoming v1.32 release.

Other Merges

Allow Relaxed DNS search string validation per KEP-4427, a first-time feature contribution from Adrian Moisey

Contextually log client-go request and response with code locations

kubelet: add log and event for cgroup v2 with kernel older than 5.8

Proper request context for accessing the RBAC etcd registry replacing context.TODO()

Speed up Job controller, cutting response times by 99%, and double the speed of the event delete handler

Update CEL and its tests to be current for 1.32

Evaluate allow-metrics-labels while initializing metrics; can cause some to show up as “unexpected”

Keep the ImageVolume source for existing pods even if the feature gate is disabled while updating

kubeadm: handle bad subcommands more consistently, add activeDeadlineSeconds

Reregister kubelet plugins successfully on Windows

Add a couple new metrics to measure Event handling and a test case

Fix a bug that prevented reconciling large groups of Endpoints

Test Improvements: StorageFactory cohabiting

Deprecated

Remove some deprecated upgrade flags from kubeadm 1.32

GA Feature Gates removal: NodeOutOfServiceVolumeDetach, MinDomainsInPodTopologySpread, NewVolumeManagerReconstruction

Replace old json newSerializers with current NewSerializerWithOptions()

Version Updates

go.mod to go 1.23

etcd client to 3.5.16

via Last Week in Kubernetes Development https://lwkd.info/

September 18, 2024 at 06:00PM

·lwkd.info·
Last Week in Kubernetes Development - Week Ending September 15 2024
Valkey 8.0 rides high at Open Source Summit in Vienna
Valkey 8.0 rides high at Open Source Summit in Vienna

Valkey 8.0 rides high at Open Source Summit in Vienna

The Linux Foundation put Valkey centre stage at the Open Source Summit Europe this week, as the Redis fork hit its first full-digit release. Redis switched the…

September 18, 2024 at 01:47PM

via Instapaper

·thestack.technology·
Valkey 8.0 rides high at Open Source Summit in Vienna
Open Source Summit Vienna 2024 | Notes In The Margin
Open Source Summit Vienna 2024 | Notes In The Margin

Open Source Summit Vienna 2024 | Notes In The Margin

This week I’ve been in Vienna for Open Source Summit EU. I’ve been attending this event for many years, and it’s always valuable in many ways. A lot of that…

September 18, 2024 at 10:46AM

via Instapaper

·drbacchus.com·
Open Source Summit Vienna 2024 | Notes In The Margin
rodyherrera/Quantum: 🚀 Hackable & Self-hosted Open-Source alternative to Vercel, Heroku, Netlify, etc. All your applications, just in one place. Develop and deploy with your favorite tools, and enjoy continuous deployment with GitHub.
rodyherrera/Quantum: 🚀 Hackable & Self-hosted Open-Source alternative to Vercel, Heroku, Netlify, etc. All your applications, just in one place. Develop and deploy with your favorite tools, and enjoy continuous deployment with GitHub.
🚀 Hackable & Self-hosted Open-Source alternative to Vercel, Heroku, Netlify, etc. All your applications, just in one place. Develop and deploy with your favorite tools, and enjoy continuous...
·github.com·
rodyherrera/Quantum: 🚀 Hackable & Self-hosted Open-Source alternative to Vercel, Heroku, Netlify, etc. All your applications, just in one place. Develop and deploy with your favorite tools, and enjoy continuous deployment with GitHub.
Stargazers opencost/opencost
Stargazers opencost/opencost

Stargazers · opencost/opencost

OpenCost — your favorite open source cost monitoring tool for Kubernetes and cloud spend OpenCost give teams visibility into current and historical Kubernetes…

September 17, 2024 at 01:27PM

via Instapaper

·github.com·
Stargazers opencost/opencost