Member Post
Xline command deduplication mechanism (part one) — introduction to RIFL
Member post by DatenLord Why is deduplication of commands necessary? In a system that receives external commands, it is common for a command to be executed at least once, which we refer to as at-least-once semantics. If a...
January 19, 2024 | By DatenLord
Member Post
GitOps and mutating policies: the tale of two loops
Member post originally published on Nirmata’s blog by Jim Bugwadia Do policies that mutate or generate resources violate GitOps principles? In this blog post, I will show you how policy-based resource management can be complementary to GitOps, what...
January 18, 2024
Member Post
Time-series data ingestion from Rust WebAssembly application, leveraging GreptimeDB and WasmEdge
Member post originally published on Medium by Greptime What is WebAssembly WebAssembly is a new instruction format that offers cross-platform compatibility and execution speeds close to native machine code. By compiling C/C++ or Rust code into WebAssembly, program...
January 17, 2024
Member Post
Root cause chronicles: connection collapse
Member post originally published on InfraCloud’s blog by Joy Bhattacherjee On a usual Friday evening, Robin had just wrapped up their work, wished their colleagues a happy weekend, and turned themselves in for the night. At exactly 3...
January 12, 2024 | By Joy Bhattacherjee
Member Post
Container platforms: why and how?
Member post originally published on Elastisys’s blog by Lars Larsson This article is all about demystifying container platforms and showing what value they bring on several levels: business, organization, and tech. There is a summary at the end,...
January 10, 2024 | By Lars Larsson
Member Post
Top 10 observability resources by CNCF community in 2023
Member post by Tal Yitzhak, Solution Architect at Lightrun Introduction As we bid farewell to a remarkably productive year in 2023, the dedicated members of the Cloud Native Computing Foundation (CNCF) community have tirelessly toiled to craft innovative...
January 5, 2024 | By Tal Yitzhak
Member Post
Top four Kubernetes attack chains and how to break them
Member post originally published on ARMO’s blog by Oshrat Nir, Developer Advocate at ARMO While Kubernetes adoption continues to soar, it has become a prime target for cyberattacks. Unfortunately, Kubernetes clusters are complex and can be difficult to secure....
January 4, 2024 | By Oshrat Nir
Member Post
CURP state machine engine
Member post by DatenLord In the previous article on code interpretation, we briefly explained how the CurpServer of Xline is implemented. Now, let’s delve deeper into some core data structures in the CurpServer, particularly the conflict_checked_channel and command...
January 2, 2024 | By DatenLord
Member Post
Empowering platform engineers: a comprehensive guide to advanced DevOps practices
Member post by Abhilash A, Product Marketing at Ozone Today, Platform engineers find themselves at the forefront of transformative changes, steering the ship toward cloud-first and Kubernetes-centric architectures. The shift brings both opportunities and challenges, particularly when dealing...
December 29, 2023 | By Abhilash A
Member Post
Kubernetes rightsizing: save money and improve performance
Member post originally published on Fairwinds’s blog by Andy Suderman Kubernetes rightsizing is the process you use to ensure that your Kubernetes cluster has the right amount of resources to run your workloads efficiently. K8s rightsizing includes CPU,...
December 28, 2023 | By Andy Suderman