1_r/devopsish

1_r/devopsish

54597 bookmarks
Custom sorting
&udm=14 | the disenshittification Konami code
&udm=14 | the disenshittification Konami code

&udm=14 | the disenshittification Konami code

What is "&udm=14"? • TenBlueLinks • FrogFind • Built by Tedium Grab the code: Glitch | Github Versions Regular | SFW Note: The feature this relies on, while…

May 28, 2024 at 10:10AM

via Instapaper

·udm14.com·
&udm=14 | the disenshittification Konami code
KuberTENes Regional Events
KuberTENes Regional Events
KuberTENes regional events are organized by our local community groups to celebrate 10 years of Kubernetes. If you’re unable to attend in the Bay Area or simply can’t make it, don’t fret!
·cncf.io·
KuberTENes Regional Events
Allocatable memory and CPU in Kubernetes Nodes
Allocatable memory and CPU in Kubernetes Nodes
Pods deployed in your Kubernetes cluster consume resources such as memory, CPU and storage. However, not all resources in a Node can be used to run Pods.
·learnk8s.io·
Allocatable memory and CPU in Kubernetes Nodes
russh - Rust
russh - Rust
Server and client SSH asynchronous library, based on tokio/futures.
·docs.rs·
russh - Rust
Tailscale and TunnelVision: our analysis
Tailscale and TunnelVision: our analysis
Since the disclosure of the TunnelVision bug some users have asked us whether and how it affects Tailscale. The short answer: it’s complicated. While we don’t think TunnelVision constitutes a major security concern for most Tailscale users, some users may be affected.
·tailscale.com·
Tailscale and TunnelVision: our analysis
Documenting my DNS records
Documenting my DNS records
Exporting my DNS records as YAML gives me a plaintext file where I can track changes, add comments, and feel more confident about managing my DNS.
·alexwlchan.net·
Documenting my DNS records
Terraform vs. Crossplane vs. Ansible - Rivals or Allies?
Terraform vs. Crossplane vs. Ansible - Rivals or Allies?

Terraform vs. Crossplane vs. Ansible - Rivals or Allies?

In this video we dive deep into the world of Infrastructure as Code (IaC) and resource management and explore tools like Terraform, Crossplane, Ansible, Helm, and a few others. Are they competitors, or can they function as allies within your DevOps toolkit?

Terraform #Ansible #Crossplane

Consider joining the channel: https://www.youtube.com/c/devopstoolkit/join

▬▬▬▬▬▬ 🔗 Additional Info 🔗 ▬▬▬▬▬▬ ➡ Transcript: https://devopstoolkit.live/infrastructure-as-code/ansible-vs-terraform-vs-crossplane

▬▬▬▬▬▬ 💰 Sponsorships 💰 ▬▬▬▬▬▬ If you are interested in sponsoring this channel, please use https://calendar.app.google/Q9eaDUHN8ibWBaA7A to book a timeslot that suits you, and we'll go over the details. Or feel free to contact me over Twitter or LinkedIn (see below).

▬▬▬▬▬▬ 👋 Contact me 👋 ▬▬▬▬▬▬ ➡ Twitter: https://twitter.com/vfarcic ➡ LinkedIn: https://www.linkedin.com/in/viktorfarcic/

▬▬▬▬▬▬ 🚀 Other Channels 🚀 ▬▬▬▬▬▬ 🎤 Podcast: https://www.devopsparadox.com/ 💬 Live streams: https://www.youtube.com/c/DevOpsParadox

via YouTube https://www.youtube.com/watch?v=tgwxMfIsLJY

·youtube.com·
Terraform vs. Crossplane vs. Ansible - Rivals or Allies?
However, so far K-2576 seems to be similar to other Nivelir-L 'inspector satellites' which have shadowed US satellites at a large distance but have not interfered with them. I am highly skeptical of the suggestion that it is an antisatellite weapon
However, so far K-2576 seems to be similar to other Nivelir-L 'inspector satellites' which have shadowed US satellites at a large distance but have not interfered with them. I am highly skeptical of the suggestion that it is an antisatellite weapon
— Jonathan McDowell (@planet4589)
·x.com·
However, so far K-2576 seems to be similar to other Nivelir-L 'inspector satellites' which have shadowed US satellites at a large distance but have not interfered with them. I am highly skeptical of the suggestion that it is an antisatellite weapon
VCs Have Mostly Shut The Door On Smart Homes
VCs Have Mostly Shut The Door On Smart Homes
So far this year, less than $100 million has gone into U.S. companies in Crunchbase’s smart-home and smart-building categories.
·news.crunchbase.com·
VCs Have Mostly Shut The Door On Smart Homes
Goog Enough (@Goog_Enough) on X
Goog Enough (@Goog_Enough) on X
Here to collect and amplify bad Google SERPs and AI Overviews, tag your examples with #GoogEnough. Accepting submissions via DM if you want to remain anonymous.
·x.com·
Goog Enough (@Goog_Enough) on X
36 Hours in Traverse City, Mich. (Gift Article)
36 Hours in Traverse City, Mich. (Gift Article)
A new creative energy is invigorating this laid-back northern Michigan city, loved for its cherry festival, unspoiled lake vistas and access to epic dunes.
·nytimes.com·
36 Hours in Traverse City, Mich. (Gift Article)
Not soon enough | Linux 6.10 Is Disabling NFS v2 Client Support By Default
Not soon enough | Linux 6.10 Is Disabling NFS v2 Client Support By Default
Following the NFS server changes from a few days ago for Linux 6.10 that brought optimizations and prepping for the new 'nfsdctl' utility, the Network File System client changes have been submitted and merged for this new kernel.
·phoronix.com·
Not soon enough | Linux 6.10 Is Disabling NFS v2 Client Support By Default
Google fixes eighth actively exploited Chrome zero-day this year
Google fixes eighth actively exploited Chrome zero-day this year
Google has released a new emergency security update to address the eighth zero-day vulnerability in Chrome browser confirmed to be actively exploited in the wild.
·bleepingcomputer.com·
Google fixes eighth actively exploited Chrome zero-day this year
Apple Music 100 Best Albums
Apple Music 100 Best Albums
Welcome to 100 Best Albums, our definitive list of the greatest albums ever made. Sign up to stream full tracks or add these albums to your library.
·100best.music.apple.com·
Apple Music 100 Best Albums
Blog: Introducing Hydrophone
Blog: Introducing Hydrophone

Blog: Introducing Hydrophone

https://www.kubernetes.dev/blog/2024/05/23/introducing-hydrophone/

In the ever-changing landscape of Kubernetes, ensuring that clusters operate as intended is essential. This is where conformance testing becomes crucial, verifying that a Kubernetes cluster meets the required standards set by the community. Today, we’re thrilled to introduce Hydrophone, a lightweight runner designed to streamline Kubernetes tests using the official conformance images released by the Kubernetes release team.

Simplified Kubernetes testing with Hydrophone

Hydrophone’s design philosophy centers around ease of use. By starting the conformance image as a pod within the conformance namespace, Hydrophone waits for the tests to conclude, then prints and exports the results. This approach offers a hassle-free method for running either individual tests or the entire Conformance Test Suite.

Key features of Hydrophone

Ease of Use: Designed with simplicity in mind, Hydrophone provides an easy-to-use tool for conducting Kubernetes conformance tests.

Official Conformance Images: It leverages the official conformance images from the Kubernetes Release Team, ensuring that you’re using the most up-to-date and reliable resources for testing.

Flexible Test Execution: Whether you need to run a single test, the entire Conformance Test Suite, or anything in between.

Streamlining Kubernetes conformance with Hydrophone

In the Kubernetes world, where providers like EKS, Rancher, and k3s offer diverse environments, ensuring consistent experiences is vital. This consistency is anchored in conformance testing, which validates whether these environments adhere to Kubernetes community standards. Historically, this validation has either been cumbersome or requires third-party tools. Hydrophone offers a simple, single binary tool that streamlines running these essential conformance tests. It’s designed to be user-friendly, allowing for straightforward validation of Kubernetes clusters against community benchmarks, ensuring providers can offer a certified, consistent service.

Hydrophone doesn’t aim to replace the myriad of Kubernetes testing frameworks out there but rather to complement them. It focuses on facilitating conformance tests efficiently, without developing new tests or heavy integration with other tools.

Getting started with Hydrophone

Installing Hydrophone is straightforward. You need a Go development environment; once you have that:

go install sigs.k8s.io/hydrophone@latest

Running hydrophone by default will:

Create a pod, and supporting resources in the conformance namespace on your cluster.

Execute the entire conformance test suite for the cluster version you’re running.

Output the test results and export e2e.log and junit_01.xml needed for conformance validation.

There are supporting flags to specify which tests to run, which to skip, the cluster you’re targeting and much more!

Community and contributions

The Hydrophone project is part of SIG Testing and open to the community for bugs, feature requests, and other contributions. You can engage with the project maintainers via Kubernetes Slack channels

hydrophone, #sig-testing, and #k8s-conformance, or by filing an issue against the

repository. We’re also active in the Kubernetes SIG-Testing and SIG-Release Mailing Lists. We encourage pull requests and discussions to make Hydrophone even better.

Join us in simplifying Kubernetes testing

In SIG Testing, we believe Hydrophone will be a valuable tool for anyone looking to validate the conformance of their Kubernetes clusters easily. Whether you’re developing new features, or testing your application, Hydrophone offers an efficient testing experience.

via Kubernetes Contributors – Contributor Blog https://www.kubernetes.dev/blog/

May 22, 2024 at 08:00PM

·kubernetes.dev·
Blog: Introducing Hydrophone