Datasets:
add all 2021 summaries
Browse files- A monorepo of serverless microservices_summary.txt +43 -0
- A universal deployment engine_summary.txt +50 -0
- Assemble all your infrastructure_summary.txt +41 -0
- Bare metal meets Kubernetes_summary.txt +55 -0
- Cloud Native fundamentals_summary.txt +39 -0
- Cloud-native chaos engineering_summary.txt +37 -0
- Connecting your daily work to intent & vision_summary.txt +43 -0
- Crossing the platform gap_summary.txt +55 -0
- Docs are not optional_summary.txt +40 -0
- Elixir observability using PromEx_summary.txt +33 -0
- Find the infrastructure advantage_summary.txt +52 -0
- Gerhard at KubeCon NA 2021 Part 1_summary.txt +77 -0
- Gerhard at KubeCon NA 2021 Part 2_summary.txt +70 -0
- Gerhard at KubeCon NA 2021: Part 1_summary.txt +151 -0
- Gerhard at KubeCon NA 2021: Part 2_summary.txt +133 -0
- Grafana’s "Big Tent" idea_summary.txt +88 -0
- Grafana’s Big Tent idea_summary.txt +62 -0
- Honeycomb's secret to high-performing teams_summary.txt +39 -0
- Introducing Ship It!_summary.txt +37 -0
- Is Kubernetes a platform_summary.txt +44 -0
- Is Kubernetes a platform?_summary.txt +91 -0
- It's crazy and impossible_summary.txt +42 -0
- Kaizen! Are we holding it wrong_summary.txt +66 -0
- Kaizen! Are we holding it wrong?_summary.txt +127 -0
- Kaizen! Five incidents later_summary.txt +48 -0
- Kaizen! The day half the internet went down_summary.txt +59 -0
- Learning from incidents_summary.txt +47 -0
- Let's Ship It!_summary.txt +5 -0
- Money flows rule everything_summary.txt +50 -0
- OODA for operational excellence_summary.txt +38 -0
- OpenTelemetry in your CICD_summary.txt +45 -0
- OpenTelemetry in your CI⧸CD_summary.txt +134 -0
- Optimize for smoothness not speed_summary.txt +40 -0
- Real-world implications of shipping many times a day_summary.txt +49 -0
- Shipping KubeCon EU 2021_summary.txt +49 -0
- The foundations of Continuous Delivery_summary.txt +58 -0
- What does good DevOps look like_summary.txt +38 -0
- What does good DevOps look like?_summary.txt +70 -0
- What is good release engineering_summary.txt +36 -0
- What is good release engineering?_summary.txt +63 -0
- Why Kubernetes_summary.txt +42 -0
- Why Kubernetes?_summary.txt +66 -0
- üéÑ Merry Shipmas üéÅ_summary.txt +68 -0
- 🎄 Merry Shipmas 🎁_summary.txt +136 -0
A monorepo of serverless microservices_summary.txt
ADDED
|
@@ -0,0 +1,43 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• The Skyhook team worked together in 2019 on a serverless project and have since been out of touch.
|
| 2 |
+
• The COVID-19 pandemic had a significant impact on Skyhook as a travel website business, but also presented an opportunity to rethink their product and improve it.
|
| 3 |
+
• Skyhook is a website that allows users to book adventure trips with local guides, providing a unique and authentic experience.
|
| 4 |
+
• The team decided to move towards serverless technology, initially using AWS Lambda functions backed by an RDS database (Aurora).
|
| 5 |
+
• They later realized the limitations of this approach and began exploring other options, including DynamoDB and splitting their services into separate databases.
|
| 6 |
+
• The team eventually moved to a more modular architecture with each service having its own DynamoDB database.
|
| 7 |
+
• Switch from REST API to GraphQL/AppSync
|
| 8 |
+
• Implementation of a microservices-based architecture with serverless functions
|
| 9 |
+
• Improved reliability and reduced bugs in the system
|
| 10 |
+
• Reduced deploy times from 20 minutes to 3 minutes
|
| 11 |
+
• Increased testing and faster feedback cycles
|
| 12 |
+
• Addition of feature flags for rapid feature deployment and customer testing
|
| 13 |
+
• Using AWS AppSync for synchronous communication between microservices
|
| 14 |
+
• Utilizing AWS Event Bridge for asynchronous communication between services
|
| 15 |
+
• Implementing Next.js with Vercel for server-side rendering and caching of static pages
|
| 16 |
+
• Serving the application through a custom deployment environment using GitHub Actions and Vercel's zero-config option
|
| 17 |
+
• Achieving fast latency (10ms) in internal service interactions, but potentially improving it
|
| 18 |
+
• Exposing API services to individual microservices for data querying
|
| 19 |
+
• Using standardized JSON objects with schemas for event bus messages
|
| 20 |
+
• Discussion of Vercel vs Netlify for zero-config deployment
|
| 21 |
+
• Benefits of using Vercel with Next.js as the parent company
|
| 22 |
+
• Managing environments, including multiple PR-specific URLs and data migration
|
| 23 |
+
• GitHub Actions setup for automated testing and deployments
|
| 24 |
+
• Single repository approach for microservices, including benefits and challenges
|
| 25 |
+
• Automated testing and linting on code changes, including integration tests
|
| 26 |
+
• Configuration and setup of services using Hygen tool for CDK and AWS
|
| 27 |
+
• Storage of configuration in the repository next to usage
|
| 28 |
+
• Changes to infrastructure deployment using AWS CDK
|
| 29 |
+
• Avoidance of CloudFormation due to complexity and yaml issues
|
| 30 |
+
• Development experience improvements, including environment portability and data management
|
| 31 |
+
• Challenges with payments provider during pandemic, including disabled refunds and changed regulations
|
| 32 |
+
• Discussing potential solutions for improving development experience and overcoming current challenges
|
| 33 |
+
• The importance of customer experience and managing risks in third-party services, particularly with payment providers
|
| 34 |
+
• A case study on a travel company's experience with a payment provider that suddenly prevented automatic refunds across their API
|
| 35 |
+
• How the company resolved the issue by convincing their provider to re-enable automatic refunds for them
|
| 36 |
+
• An alternative solution using tools like Spreedly to hook in with multiple payment providers
|
| 37 |
+
• A second incident where a system issue was solved with an unorthodox approach involving event streams and Lambda functions
|
| 38 |
+
• The importance of prioritizing customers' needs over shipping code or adding new features
|
| 39 |
+
• A discussion on the feature "hosts sign-up" that improved the process for hosts to get signed up, resulting in a 5-fold increase in host sign-ups
|
| 40 |
+
• Development of a user-friendly cancellation feature on the Skyhook marketplace
|
| 41 |
+
• Utilization of third-party tooling (e.g. Algolia) to implement features such as search functionality and improve development speed
|
| 42 |
+
• Adoption of serverless tools (e.g. AWS Lambda) for faster code deployment and improved customer experience
|
| 43 |
+
• Use of Drip for email marketing services due to its e-commerce specialization
|
A universal deployment engine_summary.txt
ADDED
|
@@ -0,0 +1,50 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Introduction to Dagger, a new tool for application delivery
|
| 2 |
+
• Origins of Dagger: founders' experience at Docker and desire to work together on a new project
|
| 3 |
+
• Problem of fragmentation in CI/CD systems and infrastructure management tools
|
| 4 |
+
• Dagger's solution: unifying existing tools into a cohesive platform for application delivery
|
| 5 |
+
• Focus on applications rather than infrastructure, considering infrastructure as a dependency
|
| 6 |
+
• The "value line" and how it shifts over time, with changes in technology and building blocks (e.g. containers)
|
| 7 |
+
• Definition of an application: everything needed to deploy it, including continuous deployment tasks
|
| 8 |
+
• Dagger's goal is to provide a ubiquitous application delivery standard that allows companies to define their own answer to the question "Where is the line between application and infrastructure?"
|
| 9 |
+
• Dagger differs from Docker by not trying to be a runtime for applications, but rather allowing users to tell it how they want to run and deploy their applications.
|
| 10 |
+
• CUE (Configuration Superpowers for Everyone) is the configuration language used by Dagger to declare application delivery flows.
|
| 11 |
+
• CUE provides a powerful way for platform engineers or application developers to define everything needed to take code from a repository to running live on any environment.
|
| 12 |
+
• Dagger uses CUE packages to provide reusable building blocks, including standard library packages and cloud provider-specific packages.
|
| 13 |
+
• Users can import these packages and use them in their configuration files.
|
| 14 |
+
• Configuration files are used to declare inputs (including secrets) and define how to deploy the application.
|
| 15 |
+
• Running "dagger up" executes the defined deployment plan.
|
| 16 |
+
• Deployment fragmentation: multiple tools and scripts required for deployment
|
| 17 |
+
• Yaml configuration complexity and limitations
|
| 18 |
+
• The need for a more portable and reusable deployment solution
|
| 19 |
+
• Dagger as a potential solution, offering a better development experience and reusability
|
| 20 |
+
• Comparison to Docker's impact on packaging and running applications
|
| 21 |
+
• Potential for Dagger to change the way code is deployed in the future
|
| 22 |
+
• Buildkit and LLB (Low-Level Binary) explanation
|
| 23 |
+
• Dagger using Buildkit for more than just building
|
| 24 |
+
• DAG computation and pipelines
|
| 25 |
+
• Docker dependency and alternatives (Containerd, runC)
|
| 26 |
+
• Volumes and remote execution
|
| 27 |
+
• Comparison with TerraForm (infrastructure management vs CI/CD pipeline portability)
|
| 28 |
+
• Internal use of Dagger at the company
|
| 29 |
+
• Implementing tests using CUE
|
| 30 |
+
• Dagger replacing CI logic for portable test running
|
| 31 |
+
• Deployment of DAGs with Dagger
|
| 32 |
+
• Go Releaser being used in conjunction with Dagger
|
| 33 |
+
• Dagger's closed beta and access process
|
| 34 |
+
• Learning from Docker's success and mistakes
|
| 35 |
+
• Designing a cloud product alongside the open source tool
|
| 36 |
+
• Importance of community involvement in Dagger development
|
| 37 |
+
• Encouraging external contributions as an extension of the internal team
|
| 38 |
+
• The importance of community engagement in building an ecosystem
|
| 39 |
+
• Defining open source contributors as "power users" who contribute to code and documentation
|
| 40 |
+
• How to best contribute to the project: using it, engaging with it, and providing feedback on its usability and documentation
|
| 41 |
+
• Priorities for the project, including:
|
| 42 |
+
+ Building a strong and engaged core community of developers
|
| 43 |
+
+ Creating successful accounts (actual projects using Dagger)
|
| 44 |
+
+ Developing a cloud product with good conversion and retention rates
|
| 45 |
+
• Job openings for founding team members to help build the company and evolve the product
|
| 46 |
+
• The difficulty of finding the ideal candidate for a project or role
|
| 47 |
+
• The pain points and challenges of DevOps and CI/CD
|
| 48 |
+
• The potential for innovation and excitement in the industry despite current difficulties
|
| 49 |
+
• The Dagger platform's closed beta and plans to make it widely available once ready
|
| 50 |
+
• The availability of support and resources from the Dagger team, including community access and expert advice.
|
Assemble all your infrastructure_summary.txt
ADDED
|
@@ -0,0 +1,41 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Marques is still involved with Crossplane, but not part of the current podcast
|
| 2 |
+
• The version of Crossplane in November 2019 was 0.5.0, and now it's on 1.3.0
|
| 3 |
+
• There have been over 1,800 commits since 0.5.0 from 24 contributors
|
| 4 |
+
• The user experience of Crossplane has changed significantly, with more flexibility and power in defining compositions and abstractions
|
| 5 |
+
• Compositions are a way to combine resources to satisfy abstract types, and can be combined within each other
|
| 6 |
+
• Configuration packages declare dependencies on providers and other configurations, allowing for the creation of complex platforms
|
| 7 |
+
• Defining abstractions in Crossplane and enabling flexibility for users to define their own
|
| 8 |
+
• Discovering and sharing abstractions through registries and repositories
|
| 9 |
+
• Packaging and sharing of abstractions using OCI-compliant registries
|
| 10 |
+
• Building a registry with rich discoverability features by Upbound
|
| 11 |
+
• Creating a directed acyclic graph (DAG) to resolve dependencies and conflicts between configuration packages
|
| 12 |
+
• Importance of Crossplane in providing a unified API for infrastructure management
|
| 13 |
+
• Evolution of the story behind Crossplane, from storage orchestration to dynamic provisioning of various infrastructure resources
|
| 14 |
+
• Business value of using Crossplane in shared services infrastructure platform teams and application teams
|
| 15 |
+
• Challenges of managing infrastructure across different cloud services and providers
|
| 16 |
+
• Overview of Crossplane's value proposition for building customized infrastructure platforms
|
| 17 |
+
• Importance of discoverability and ease of use in onboarding with Crossplane
|
| 18 |
+
• Role of Upbound Cloud in providing additional features and functionality beyond the open-source version
|
| 19 |
+
• Reference platforms and documentation available to help users get started and learn more about Crossplane
|
| 20 |
+
• Crossplane abstractions for defining entire infrastructure setup
|
| 21 |
+
• Linode provider exists and can be used with Crossplane
|
| 22 |
+
• Integrating CDN (Fastly) with Crossplane as a resource
|
| 23 |
+
• Helm and Kubernetes providers available in Crossplane
|
| 24 |
+
• Template or configuration package for deploying Phoenix web app possible through Crossplane registry
|
| 25 |
+
• Relationship between Crossplane and Argo CD, including using GitOps to provision infrastructure and applications
|
| 26 |
+
• Two options for managing control plane: running Crossplane on premises or using Upbound Cloud's hosted instance
|
| 27 |
+
• Issues with Kubernetes are not relevant as long as Crossplane is always available and healthy.
|
| 28 |
+
• The value proposition of Crossplane lies in its decoupling from infrastructure management, allowing users to focus on other tasks.
|
| 29 |
+
• A hosted control plane is important for provisioning infrastructure and ensuring infrastructure health.
|
| 30 |
+
• Automating infrastructure management through managed services can free up teams to work on more complex and interesting problems.
|
| 31 |
+
• Crossplane's goal is to automate tedious tasks, not eliminate jobs, but rather enable teams to focus on higher-level tasks.
|
| 32 |
+
• Open sourcing and community development for Crossplane
|
| 33 |
+
• Extending Crossplane through APIs and providers for multi-cloud support
|
| 34 |
+
• Comparison with Terraform, including differences in active reconciliation and permissioning at abstraction level
|
| 35 |
+
• Crossplane's composition model and its benefits for infrastructure management and isolation
|
| 36 |
+
• Hack week results, including new provider developments and tooling enhancements
|
| 37 |
+
• Development of tools for integrating designers into the app development process
|
| 38 |
+
• Hack week project: k8s container registry, allowing direct image pushing into Kubernetes without an external registry
|
| 39 |
+
• WebAssembly and browser-based OCI image building
|
| 40 |
+
• Community growth and contribution to Crossplane.io
|
| 41 |
+
• Future vision of infrastructure management with higher-level abstractions and control planes
|
Bare metal meets Kubernetes_summary.txt
ADDED
|
@@ -0,0 +1,55 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Gerhard Lazu shares his personal experience of almost joining Packet in the summer of 2019 due to an email mix-up
|
| 2 |
+
• Marques Johansson and David Flanagan discuss what attracted them to Equinix Metal (formerly Packet), highlighting their interest in bare metal infrastructure and networking capabilities
|
| 3 |
+
• The impact of the Equinix acquisition on Packet's products and services, including expanded global reach and integration with Equinix's existing infrastructure
|
| 4 |
+
• David Flanagan shares his experience using Packet before the Equinix acquisition and notes the benefits of integrating with Equinix's extensive network
|
| 5 |
+
• Acquisition of Packet by Equinix
|
| 6 |
+
• Evolution from bare metal servers to Equinix Metal platform
|
| 7 |
+
• Benefits of leveraging Equinix network and infrastructure
|
| 8 |
+
• Trade-offs in instance size and pricing
|
| 9 |
+
• Importance of maintaining the "purity" of bare metal experience
|
| 10 |
+
• Challenges and considerations for providing managed Kubernetes on top of bare metal
|
| 11 |
+
• Definition of Kubernetes and its components
|
| 12 |
+
• Challenges of running Kubernetes on bare metal, particularly for HPC workloads
|
| 13 |
+
• Evolution of Kubernetes over the next five years towards more bespoke implementations
|
| 14 |
+
• Kubeadm as a popular tool for deploying Kubernetes
|
| 15 |
+
• Cluster API as an opinionated way to deploy Kubernetes clusters with automated remediation
|
| 16 |
+
• Tools for managing multiple clusters and visualizing cluster infrastructure
|
| 17 |
+
• Discussion of UI tools for Kubernetes management, including Argo CD and Flux
|
| 18 |
+
• Use cases for managing multiple Kubernetes clusters through a management cluster
|
| 19 |
+
• Introduction to Rawkode Academy, a YouTube channel focused on cloud-native technology and Kubernetes learning
|
| 20 |
+
• Challenges of keeping up with evolving technology and importance of sharing knowledge and expertise
|
| 21 |
+
• Example episode of Klustered, where hosts Thomas Stromberg and Kris Nova intentionally try to "wreck each other's clusters" in a livestream
|
| 22 |
+
• The hosts discuss episodes of Rawkode Academy where they fix broken Kubernetes clusters with varying levels of complexity.
|
| 23 |
+
• Kris Nova uses advanced techniques (LD_PRELOAD, kernel modules, eBPF) to debug a cluster, while Thomas Stromberg uses forensic analysis tools to help identify issues.
|
| 24 |
+
• David Flanagan recommends an episode featuring MayaData's team discussing CSI driver development and storage architecture.
|
| 25 |
+
• The hosts discuss the format shift of Rawkode Academy from individual fixes to more complex cluster breaks.
|
| 26 |
+
• They also mention the evolution of breaks in clusters over time, with participants now modifying Go code for kubelet and recompiling it.
|
| 27 |
+
• Gerhard Lazu suggests renaming Rawkode Academy to "Break my Kubernetes" or a similar title due to its focus on debugging and fixing issues.
|
| 28 |
+
• The conversation turns to the complexity of Kubernetes clusters and how each one is unique in its problems, making debugging and running them efficiently challenging.
|
| 29 |
+
• Challenges of managing workloads across many servers
|
| 30 |
+
• Kubernetes as a solution for container management
|
| 31 |
+
• Trade-offs between microservices architecture and operational complexity
|
| 32 |
+
• Declarative configuration and stateful declaration in Kubernetes
|
| 33 |
+
• Using Kubernetes with monolithic applications
|
| 34 |
+
• Benefits of using Kubernetes, including service discovery, DNS, reconciliation, and remediation
|
| 35 |
+
• Ecosystem and community around Kubernetes and its software extensions (controllers and CRDs)
|
| 36 |
+
• Crossplane as an alternative to Terraform for managing infrastructure as code
|
| 37 |
+
• Infrastructure deployment using Crossplane
|
| 38 |
+
• User data scripts for provisioning devices
|
| 39 |
+
• Equinix Metal provider integration with Crossplane
|
| 40 |
+
• Complexity of deploying Changelog's monolithic app
|
| 41 |
+
• Kubernetes issues with Kube-proxy, Calico, and Cilium
|
| 42 |
+
• Performance problems with long HTTP request tails
|
| 43 |
+
• Blue/green deployment methodology for upgrades and testing
|
| 44 |
+
• Use of bare metal for CPU-intensive tasks or stream processing to improve performance
|
| 45 |
+
• Virtualized setups can suffer from "noisy neighbors" issues due to shared resources
|
| 46 |
+
• Cloud providers' interest in maximizing costs and profits leads to resource contention
|
| 47 |
+
• Hybrid architectures with both virtualized and bare metal infrastructure may be necessary
|
| 48 |
+
• Equinix Metal's partnership with cloud services like Fly.io for building a CDN in 5 hours
|
| 49 |
+
• Evaluating the benefits of using bare metal versus managed Kubernetes services for specific workloads
|
| 50 |
+
• Benefits of using bare metal infrastructure compared to virtualized environments
|
| 51 |
+
• Tinkerbell project: an open-source tool for deploying and managing bare metal infrastructure
|
| 52 |
+
• Challenges of operating bare metal, including the need for specialized knowledge and expertise
|
| 53 |
+
• Equinix Metal's API and high-level abstractions (e.g. Crossplane, Kubernetes) for managing bare metal resources
|
| 54 |
+
• Pros and cons of using bare metal, including flexibility, performance, and visibility into system operations
|
| 55 |
+
• Potential use cases and applications for bare metal infrastructure
|
Cloud Native fundamentals_summary.txt
ADDED
|
@@ -0,0 +1,39 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• The hosts Gerhard Lazu and Katie Gamanji discuss how they met at an End User Partner Summit
|
| 2 |
+
• Katie Gamanji shares her experience with cloud-native tools, starting with Kubernetes setup difficulties and progress in documentation improvements
|
| 3 |
+
• Katie introduces the Cloud-Native Fundamentals course, aiming to provide a practical approach to understanding the landscape and using specific tools
|
| 4 |
+
• Gerhard praises the diversity of approaches and choices in the cloud-native landscape, which can be overwhelming for beginners
|
| 5 |
+
• Katie explains her curation process for the course, focusing on breaking down complex topics into fundamental principles and easy-to-follow steps
|
| 6 |
+
• CI/CD pipeline separation
|
| 7 |
+
• Use of GitHub Actions for CI and Argo CD for CD
|
| 8 |
+
• Importance of clear distinction between continuous integration and delivery
|
| 9 |
+
• Interoperability and diversity of tooling in cloud-native environment
|
| 10 |
+
• Separation of CI and CD allows for independent changes and flexibility
|
| 11 |
+
• Unix philosophy applied to cloud-native with small utilities combined in infinite ways
|
| 12 |
+
• Cloud-native approach benefits from being pluggable and interoperable
|
| 13 |
+
• Kubernetes can be replaced with other scheduling platforms like Nomad or serverless options
|
| 14 |
+
• Serverless computing has its advantages, but may not be suitable for every organization
|
| 15 |
+
• Modernization of infrastructure is required to take full advantage of cloud services
|
| 16 |
+
• A PaaS (Platform as a Service) may be a viable alternative to container orchestration tools
|
| 17 |
+
• Monolithic architecture can be an acceptable starting point for development, but should be broken down into microservices once the team grows and becomes more complex.
|
| 18 |
+
• The importance of segregating applications into microservices for fault tolerance and independent management
|
| 19 |
+
• The need to reiterate and adjust the segregation of services as the application evolves
|
| 20 |
+
• Merging microservices to optimize management and improve performance
|
| 21 |
+
• Stale or unused microservices should be retired from the application
|
| 22 |
+
• Understanding the organization's requirements and context is crucial in determining whether microservices are necessary
|
| 23 |
+
• Kubernetes is a suitable option for managing microservices, but not always the best choice, especially for small teams or startups with limited resources
|
| 24 |
+
• Cloud providers can offer free tiers and be a more accessible option for smaller teams or organizations
|
| 25 |
+
• Kubernetes as a tool for managing complex applications, providing automated scaling, declarative representation, and control managers to ensure desired state.
|
| 26 |
+
• Custom resource definitions (CRDs) and Ingress for managing reachability and granular control over HTTP endpoints.
|
| 27 |
+
• Kubernetes' unified API and scalability across various platforms.
|
| 28 |
+
• Pipeline and continuous integration and delivery (CI/CD) processes for automating updates and deployments to production environments.
|
| 29 |
+
• Stages of CI/CD including testing, packaging, storing, and distributing artifacts, and propagating changes through dev, QA, staging, and production environments.
|
| 30 |
+
• GitOps strategy and its importance in cloud-native development
|
| 31 |
+
• Argo CD vs FluxCD, with Argo CD being preferred due to its visual interface and community support
|
| 32 |
+
• Choice of CI tool, with GitHub Actions being recommended for simplicity
|
| 33 |
+
• Importance of monitoring, telemetry, logs, traces, and events in application development, including readiness and liveness probes
|
| 34 |
+
• Observability in cloud-native development, including Grafana and Prometheus for metrics collection and visualization
|
| 35 |
+
• Instrumenting code for monitoring and debugging purposes
|
| 36 |
+
• Cloud-native development requires a DevOps culture
|
| 37 |
+
• DevOps is not just a tool or technology, but a collaboration between application developers and infrastructure engineers to leverage tools for transparency and efficiency
|
| 38 |
+
• A course on cloud-native fundamentals is being developed and will be free, with the first four courses (Cloud-native Fundamentals, Message Passing, Observability, and Security) making up a nano-degree that will be available as a standalone paid option
|
| 39 |
+
• The course aims to make cloud-native ubiquitous and accessible to everyone, with the author hoping to reach the next generation of cloud-native practitioners
|
Cloud-native chaos engineering_summary.txt
ADDED
|
@@ -0,0 +1,37 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Reliability of systems and infrastructure is often assumed, but failures can occur at any time
|
| 2 |
+
• Chaos engineering is a method for testing system resiliency by introducing artificial faults
|
| 3 |
+
• Importance of chaos engineering in preventing costly downtime and improving overall reliability
|
| 4 |
+
• Applying chaos engineering principles to specific systems such as CDNs and complex microservices environments
|
| 5 |
+
• Need for developers, SREs, and site reliability engineers to work together to fix root causes of failures
|
| 6 |
+
• Chaos engineering involves testing at multiple levels, including infrastructure dependencies and service reliability.
|
| 7 |
+
• Definition of chaos engineering
|
| 8 |
+
• Importance of steady-state hypothesis and understanding system behavior
|
| 9 |
+
• Injecting harm (faults) to build immunity (resilience)
|
| 10 |
+
• Scientifically trying to understand user happiness through metrics, logs, and events
|
| 11 |
+
• Willful fault injection to verify system behavior and identify tolerance limits
|
| 12 |
+
• Applying non-best practices in small doses for security and performance testing
|
| 13 |
+
• Chaos engineering as a practice to intentionally break and test systems to improve resilience
|
| 14 |
+
• Importance of learning from failures rather than successes in software development
|
| 15 |
+
• Applying chaos engineering to monolithic applications, not just microservices
|
| 16 |
+
• Tools and platforms for chaos engineering, such as LitmusChaos
|
| 17 |
+
• Best practices for implementing chaos engineering, including playing the role of a person outside the system, using good metrics and monitoring, and starting with small experiments in pre-production environments
|
| 18 |
+
• Litmus is an open-source, CNCF project that provides chaos engineering capabilities for Kubernetes environments.
|
| 19 |
+
• It can be installed as a Helm chart or operator with its own CRDs.
|
| 20 |
+
• The control plane of Litmus sets up the account and user access, while the agent infrastructure is where experiments are executed.
|
| 21 |
+
• Argo workflows are used to construct scenarios, and Argo CD integrates with Litmus for GitOps support.
|
| 22 |
+
• Litmus can be triggered by event tracker functionality via Argo CD updates or other GitOps tools.
|
| 23 |
+
• It supports storing chaos artifacts in Git, allowing changes to reflect on the chaos center.
|
| 24 |
+
• Users without Kubernetes can spin up a small cluster to use Litmus and create chaos scenarios for non-Kubernetes environments.
|
| 25 |
+
• Running databases on Kubernetes is discussed, with Uma expressing that it's becoming more feasible due to active community support.
|
| 26 |
+
• Stateful sites and distributed databases are key elements in Kubernetes
|
| 27 |
+
• Storage systems and containerized storage solutions (e.g. OpenEBS) are evolving for running databases on Kubernetes
|
| 28 |
+
• Networking issues, such as latency and packet loss, can impact database replication and performance
|
| 29 |
+
• Distributed application architecture, such as message brokers, can make it easier to run on Kubernetes
|
| 30 |
+
• Chaos engineering is essential for testing failures in Kubernetes environments and improving resilience
|
| 31 |
+
• Different platforms (e.g. AWS, GCP, Linode) have varying recovery times and require tailored approaches
|
| 32 |
+
• Infrastructure matters and needs to be considered when running databases on Kubernetes
|
| 33 |
+
• The importance of testing reliability in production, rather than just in staging
|
| 34 |
+
• Chaos engineering as a tool for simulating failures and improving system resilience
|
| 35 |
+
• The value of creating random triggers to test systems after changes are made in production
|
| 36 |
+
• The need for a culture of continuous chaos engineering at all levels of an organization
|
| 37 |
+
• The ultimate goal of chaos engineering is to be able to confidently break things in production, thereby ensuring system reliability
|
Connecting your daily work to intent & vision_summary.txt
ADDED
|
@@ -0,0 +1,43 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Disconnect between vision, actions, and reported outcomes
|
| 2 |
+
• Arnaud's Y Combinator demo and its challenges in condensing a message into 60 seconds with one slide
|
| 3 |
+
• Echoes' 60-second pitch to investors
|
| 4 |
+
• Product Hunt launch as part of Y Combinator's advice on being public and launching early
|
| 5 |
+
• The importance of shipping early and getting feedback from customers
|
| 6 |
+
• Changes to Echoes since its launch at Y Combinator, including refining the ideal customer and messaging
|
| 7 |
+
• The universal problem that Echoes aims to solve: connecting daily work as engineers to intent in companies with more than 20 engineers
|
| 8 |
+
• The key value of Docker and Echoes is creating a shared understanding among teams and stakeholders.
|
| 9 |
+
• Measuring the right level of information is crucial for success, but current metrics often fail to provide actionable insights.
|
| 10 |
+
• Lines of code, PRs closed/merged, etc. are examples of metrics that don't accurately reflect quality or progress.
|
| 11 |
+
• The true metric should be whether work is creating value for the business in a sustainable way.
|
| 12 |
+
• Measuring intent (why something is being done) is essential, but difficult to capture with current systems.
|
| 13 |
+
• Echoes aims to provide a central definition of intent and make it easy for engineers to express their reasons behind their work.
|
| 14 |
+
• This will enable a consolidated view on what teams are working towards and how they're progressing towards those goals.
|
| 15 |
+
• Infering code intent and developer habits may not be relevant or accurate
|
| 16 |
+
• Importance of understanding and agreeing on "Why" in organizational goals and objectives
|
| 17 |
+
• Arnaud's passion for developer empowerment and mission to help companies improve context for engineers
|
| 18 |
+
• Differentiating between poor ("making money", "getting followers") and good ("customer satisfaction", "empathy") Why examples
|
| 19 |
+
• Autonomous teams and product team organization model as a solution to complex interactions and information flow issues
|
| 20 |
+
• The importance of clear vertical communication within organizations
|
| 21 |
+
• Challenges in scaling technical organizations and maintaining business-technical alignment
|
| 22 |
+
• The role of intent and money flows in driving decision-making in large companies
|
| 23 |
+
• Structuring information for different layers to promote efficient communication
|
| 24 |
+
• Using OKR (Objectives and Key Results) model to align individual goals with company objectives
|
| 25 |
+
• Measuring and mitigating bias in open source communities
|
| 26 |
+
• Differences between open source and commercial product intentions
|
| 27 |
+
• Challenges of reconciling a company's interests with an open source project's needs
|
| 28 |
+
• Importance of transparency and understanding motivations for using open source
|
| 29 |
+
• Docker's experience with open sourcing its project and its subsequent challenges
|
| 30 |
+
• Discussion on the current state of a company after a hype period has passed
|
| 31 |
+
• Arnaud Porterie's experience and motivations for starting Echoes, a new project
|
| 32 |
+
• Key aspects of Echoes: its focus on being virtuous for everyone involved and improving quality of life for engineers
|
| 33 |
+
• Importance of tools in reflecting an organization's culture
|
| 34 |
+
• The need for feedback and help to make Echoes successful
|
| 35 |
+
• History and meaning behind the name "Echoes"
|
| 36 |
+
• Arnaud Porterie's background as a Pink Floyd fan and his use of band-related names for projects
|
| 37 |
+
• Discussion on finding the right path or sense of direction in work, using intuition and foresight
|
| 38 |
+
• Echoes does not access code or count lines of code contributed/deleted
|
| 39 |
+
• Echoes helps capture interactions between teams and orgs, not performance reviews or grading
|
| 40 |
+
• Value in combining goals (why), daily tasks (what), and progress towards them
|
| 41 |
+
• Potential benefits for small teams with limited resources to focus efforts
|
| 42 |
+
• Future developments: tying outcomes to metrics, integrating with HR systems
|
| 43 |
+
• Gerhard Lazu's interest in using Echoes at Changelog and Arnaud Porterie's willingness
|
Crossing the platform gap_summary.txt
ADDED
|
@@ -0,0 +1,55 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Platforms and platform thinking
|
| 2 |
+
• Colin Humphreys' experience with Cloud Foundry and building platforms
|
| 3 |
+
• Shift from project to product mindset in the industry
|
| 4 |
+
• Platform-as-a-product approach and taking product methodology to the platform layer
|
| 5 |
+
• Gerhard Lazu's unfulfilled promise from 7 years ago
|
| 6 |
+
• Crossing the platform gap and its challenges
|
| 7 |
+
• The concept of the "platform gap" as described by Paula Kennedy
|
| 8 |
+
• Two approaches to addressing the platform gap: organization change (team topologies) and treating platforms as products
|
| 9 |
+
• Pre-recording talks for conferences and the benefits and drawbacks of this approach
|
| 10 |
+
• Chris Hedley's background in application development and his experience with Cloud Foundry
|
| 11 |
+
• The potential for platforms to reduce organizational friction and enable teams to focus on delivering value
|
| 12 |
+
• The limitations of trying to create a single platform that fits all organizations
|
| 13 |
+
• The importance of tailoring platforms to specific business needs and industry requirements
|
| 14 |
+
• The need for platform developers to take ownership of building and operating their own platforms
|
| 15 |
+
• The current state of cloud-native ecosystems being too complex for many users
|
| 16 |
+
• The desire for a simplified PaaS experience, but with the ability to customize and compose it to fit individual needs
|
| 17 |
+
• Syntasso's framework, Kratix, which helps organizations build tailored platforms for their business needs
|
| 18 |
+
• Difficulty in managing complex cloud-native landscapes with multiple Kubernetes clusters
|
| 19 |
+
• Limitations of traditional operators technology for building and distributing software across multiple clusters
|
| 20 |
+
• Introduction of Kratix framework to address the problem of providing a platform API across multiple Kubernetes clusters
|
| 21 |
+
• Concept of "promises" to deliver services as needed by application teams, prioritized through collaboration between platform and application teams
|
| 22 |
+
• Defining "promises" as abstractions above operators to offer things as a service from the platform team
|
| 23 |
+
• Collaborating with application teams to understand their needs and defining custom resource definitions
|
| 24 |
+
• Creating promises that encapsulate complexity and provide sane defaults for developers
|
| 25 |
+
• Using Kratix's promise framework to deliver services such as Java stacks or Jenkins
|
| 26 |
+
• Tying concepts together through platform-as-a-product thinking, collaboration, and ongoing lightweight interaction between teams
|
| 27 |
+
• Maintaining the product lifecycle of promises, including testing and upgrading operators and resources
|
| 28 |
+
• Templating system discussion
|
| 29 |
+
• Introduction to Kratix framework and its capabilities
|
| 30 |
+
• Comparison with Helm and other templating languages
|
| 31 |
+
• Day 1 vs day N experiences with Kratix
|
| 32 |
+
• Role of operators in maintaining and upgrading systems
|
| 33 |
+
• Importance of versioning in Kubernetes API
|
| 34 |
+
• Benefits and drawbacks of combining multiple schedulers and technologies
|
| 35 |
+
• Introduction to Flux and its role within GitOps toolkit
|
| 36 |
+
• Argo CD vs Flux and the role of the GitOps toolkit in Kubernetes
|
| 37 |
+
• Custom resource definitions (CRDs) and controllers/operators in K8s
|
| 38 |
+
• Testing Kratix, including use of Ginkgo-based test suite and property-based testing
|
| 39 |
+
• Value of K8s native technologies, such as Flux, over non-K8s-native technologies like Concourse
|
| 40 |
+
• Syntasso's experience with Kratix development, including limited CI/CD capabilities
|
| 41 |
+
• Complexity of integration tests for CRDs and Kubernetes
|
| 42 |
+
• Use of KinD and Kubebuilder v3 to simplify testing and development
|
| 43 |
+
• Challenges of balancing speed and investment in testing as the company grows
|
| 44 |
+
• The small team size and structure of the company (CEO, CTO, and a small engineering team)
|
| 45 |
+
• Future plans and constraints, including potential scaling of the engineering team and consultancy side
|
| 46 |
+
• Kratix is a software solution that enables organizational change through the implementation of Team Topologies and platform development
|
| 47 |
+
• Customers are using Kratix to perform a Reverse Conway Maneuver, creating platform teams with great interactions with application teams
|
| 48 |
+
• Syntasso is investing in scaling up to meet demand for Kratix, hiring people, and growing as a company
|
| 49 |
+
• The key takeaway from the conversation is that people need platforms to help them go faster, and Syntasso wants to help build differentiated and valuable platforms through Kratix
|
| 50 |
+
• The goal of Kratix is to provide a framework for building platform development, making it easier for teams to create customized platforms on Kubernetes
|
| 51 |
+
• Discussion of Chris Hedley being the one who provides honest opinions
|
| 52 |
+
• Colin Humphreys confirming Chris's reputation for honesty
|
| 53 |
+
• Gerhard Lazu mentioning Team Topologies and wanting to read it
|
| 54 |
+
• Paula Kennedy recommending Team Topologies as good and practical
|
| 55 |
+
• Gerhard Lazu expressing interest in trying out Kratix (described as a system)
|
Docs are not optional_summary.txt
ADDED
|
@@ -0,0 +1,40 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Importance of documentation in coding
|
| 2 |
+
• Personal experiences with documentation as a developer
|
| 3 |
+
• Role of documentation in enabling user experience
|
| 4 |
+
• Connection between documentation and code
|
| 5 |
+
• Documentation as an API to the product
|
| 6 |
+
• Impact of good documentation on user retention and success
|
| 7 |
+
• Challenges of context-switching for developers and potential solutions through documentation
|
| 8 |
+
• Rethinking documentation approaches for better developer experience
|
| 9 |
+
• Importance of documenting code alongside development process
|
| 10 |
+
• Why documentation should not be optional for a product
|
| 11 |
+
• Value of having writers involved in the development process
|
| 12 |
+
• Strategies for smaller teams or teams without dedicated writers (hiring technical writers, product team writing docs, having a champion)
|
| 13 |
+
• Best practices for developers to write documentation during the development process
|
| 14 |
+
• Undervalued technical writers are often overstretched and expected to know everything about complex systems.
|
| 15 |
+
• Documentation can be treated as part of the development process, allowing for ongoing documentation and improved learning experiences.
|
| 16 |
+
• There are three stages of documentation: ignoring documentation, writing basic documents as a developer, and having a dedicated team with technical writers.
|
| 17 |
+
• Effective documentation should consider different learning styles, including visual, interactive, and text-based content.
|
| 18 |
+
• Documentation is not just text, but rather a learning experience that can include videos, interactive elements, and other multimedia content.
|
| 19 |
+
• The goal of documentation is to provide context and clarity for users, rather than simply presenting information.
|
| 20 |
+
• Reevaluating documentation approaches for GitHub Actions
|
| 21 |
+
• Introducing storytelling and visuals to make documentation more engaging
|
| 22 |
+
• Competitive research and incorporating community contributions
|
| 23 |
+
• Prioritizing user needs, including new users and those familiar with the product
|
| 24 |
+
• Revamping the GitHub Actions page with improved discoverability and search functionality
|
| 25 |
+
• The evolution of GitHub Actions' UI and documentation over time
|
| 26 |
+
• Kathy Korevec's efforts to improve GitHub Actions' documentation as part of her broader mandate to enhance documentation at GitHub
|
| 27 |
+
• The importance of community feedback and iteration in improving products like GitHub Actions
|
| 28 |
+
• The concept of earned trust by developers when using GitHub Actions, particularly considering its initial beta release and potential flaws
|
| 29 |
+
• The significance of focusing on details and iterating rapidly to win back user trust and loyalty
|
| 30 |
+
• Documenting code and repository structure
|
| 31 |
+
• Pros and cons of having documentation in a single repository vs. separate from code
|
| 32 |
+
• Benefits of tying documentation to GitHub Actions and workflows
|
| 33 |
+
• Potential for automating documentation flow with templates and synchronization
|
| 34 |
+
• Considerations for small teams vs. larger organizations
|
| 35 |
+
• Use cases for private and public documentation repositories
|
| 36 |
+
• Discussion of potential follow-up interview with Kathy Korevec now at Vercel
|
| 37 |
+
• Importance of embracing failure in the industry and learning from it
|
| 38 |
+
• Bias towards loss and negative emotions associated with failure vs. success
|
| 39 |
+
• Value of admitting mistakes and using them as opportunities for growth
|
| 40 |
+
• Significance of documentation for developers and its role in unlocking understanding and productivity
|
Elixir observability using PromEx_summary.txt
ADDED
|
@@ -0,0 +1,33 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Alex Koutmos discusses his work on Elixir projects, including Changelog app optimizations
|
| 2 |
+
• PromEx library for Prometheus metrics and Grafana dashboards is introduced
|
| 3 |
+
• Features of PromEx include automatic configuration, plugin support, and annotations for deploys
|
| 4 |
+
• Discussion on the challenges of manual Prometheus and Grafana setup and how PromEx addresses them
|
| 5 |
+
• Alex Koutmos shares his experience with Erlang 24's just-in-time compiler and its potential benefits for Elixir and Phoenix applications
|
| 6 |
+
• Elixir OTP 24 performance improvements (30-50% increase)
|
| 7 |
+
• PromEx and its integration with Prometheus metrics and Grafana Agent
|
| 8 |
+
• Observability pillars: metrics, logs, and traces, and their benefits and trade-offs
|
| 9 |
+
• Potential advantages of using events as a single observability data store
|
| 10 |
+
• Differences between metrics and logs
|
| 11 |
+
• Current limitations of monitoring tools (metrics/logs/traces)
|
| 12 |
+
• Potential for unified observability tool or approach
|
| 13 |
+
• Benefits of explicit tools for specific purposes vs. one unifying tool
|
| 14 |
+
• The role of exemplars in bridging the gap between metrics, traces, and logs
|
| 15 |
+
• Challenges of using logs as a source of metrics and performance data
|
| 16 |
+
• Log support in PromEx is limited to shipping mechanism
|
| 17 |
+
• PromEx uses Grafana Agent for exporting logs to Loki
|
| 18 |
+
• Discussion of events and how they are used in Elixir/Erlang ecosystem
|
| 19 |
+
• OpenTelemetry implementation for tracing in Elixir/Erlang
|
| 20 |
+
• Telemetry library for surfacing internal library events
|
| 21 |
+
• PromEx converts telemetry events into Prometheus metrics
|
| 22 |
+
• Users can create their own plugins and Grafana dashboards for specific needs
|
| 23 |
+
• Integration with Honeycomb for exposing raw events considered but not currently implemented
|
| 24 |
+
• Discussion of available plugins for PromEx, including Phoenix, Oban, Ecto, and Broadway
|
| 25 |
+
• Plans for updating Changelog.com to Erlang 24, with a live upgrade from Erlang 23
|
| 26 |
+
• Expected benefits of upgrading to Erlang 24, including reduced memory usage, improved serialization speed, and lower latency
|
| 27 |
+
• Discussion of metrics and monitoring for the upgrade, including Grafana Cloud probes
|
| 28 |
+
• Plans for documenting the upgrade process through blog posts and livestreams
|
| 29 |
+
• Plans for the weekend: gardening and DIY projects
|
| 30 |
+
• Balancing work (PromEx/Erlang) with personal interests/hobbies
|
| 31 |
+
• Discussion of DIY skills/experience
|
| 32 |
+
• Weather conditions affecting plans (barbecue)
|
| 33 |
+
• Importance of documenting work with photos/videos
|
Find the infrastructure advantage_summary.txt
ADDED
|
@@ -0,0 +1,52 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Zac Smith discusses his absence from KubeCon 2022 in North America
|
| 2 |
+
• He mentions his role as a busy executive at a Fortune 500 company and how it limits his attendance at conferences
|
| 3 |
+
• Zac talks about the benefits of attending conferences, specifically the "hallway track" where he can meet people and get a sense of what's going on
|
| 4 |
+
• He reminisces about his favorite conferences, including ARM Tech Conference and KubeCon
|
| 5 |
+
• The conversation turns to Zac's transition from Packet to Equinix Metal, including his emotional attachment to Packet and the challenges of adapting to a larger company culture
|
| 6 |
+
• Founding a company and dealing with the emotions involved
|
| 7 |
+
• Rebranding Packet as Equinix Metal and the challenges that came with it
|
| 8 |
+
• Why the speaker does what he does (being an entrepreneur)
|
| 9 |
+
• Importance of diversity in technology innovation
|
| 10 |
+
• Need for sustainable technology solutions to address climate change and reduce waste
|
| 11 |
+
• Changing the business model around distribution of technology to a more circular economy
|
| 12 |
+
• Introduction of a new operating model and sustainable business model
|
| 13 |
+
• How Equinix Metal changed Zac Smith's "Why" compared to Packet
|
| 14 |
+
• The advantages of being part of Equinix, including scale and interconnectivity
|
| 15 |
+
• Comparison of Packet's IaaS approach with Equinix Metal's capabilities
|
| 16 |
+
• Collaboration and innovation within the Equinix ecosystem
|
| 17 |
+
• Equinix's focus on sustainability and environmental initiatives (ESG)
|
| 18 |
+
• Zac Smith's passion for the industry and his vision for automating hardware interaction
|
| 19 |
+
• Creating a comprehensive hardware compatibility list for the internet
|
| 20 |
+
• Focus on providing fundamental primitives and enabling an ecosystem, rather than becoming an all-purpose platform
|
| 21 |
+
• The importance of staying focused on core competencies and avoiding getting bogged down in secondary features or services
|
| 22 |
+
• The challenge of cooling high-performance chips with dense transistors and increasing power consumption
|
| 23 |
+
• The need for innovative solutions to address the "electricity problem" in data centers, including exposing reliable metrics to software developers
|
| 24 |
+
• Challenges in mixed data centers with diverse technologies and limited ability to purpose-build infrastructure
|
| 25 |
+
• Need for efficient cooling methods, such as liquid cooling, to reduce energy consumption and environmental impact
|
| 26 |
+
• Opportunities to capture waste heat as energy or sell it back to the grid
|
| 27 |
+
• Unsustainability of current evaporative cooling methods, which require millions of gallons of water per day
|
| 28 |
+
• Importance of standardization in data center design, including mechanical form factors and rack configurations
|
| 29 |
+
• Potential for Open 19, an open standard for mechanical form factor, to enable standardized data centers and reduce waste
|
| 30 |
+
• Open 19 project with blind mate connector design for easy server installation
|
| 31 |
+
• Reusable packaging to reduce waste and improve logistics
|
| 32 |
+
• Standardization of physical infrastructure like containers for software
|
| 33 |
+
• Multi-architecture support in data centers (Intel, AMD, ARM)
|
| 34 |
+
• Equinix Metal's approach to supporting multiple architectures (ARM servers)
|
| 35 |
+
• History of Cavium ThunderX and early adoption of ARM ecosystem
|
| 36 |
+
• Importance of being agnostic on architecture and promoting competition in the market
|
| 37 |
+
• The potential of ARM architecture in laptops and its impact on software development
|
| 38 |
+
• The emergence of RISC-V as an open-source instruction set architecture (ISA) and its possibilities for custom chips
|
| 39 |
+
• The importance of sustainability in hardware and the need to create a circular economy
|
| 40 |
+
• The role of regulatory impacts, customers, and business drivers in pushing sustainability forward
|
| 41 |
+
• The potential for technology distribution to be solved through APIs and automated deployment
|
| 42 |
+
• Hardware security and supply chain vulnerability
|
| 43 |
+
• Zero-trust approach to hardware
|
| 44 |
+
• Sustainable hardware and reduction of e-waste
|
| 45 |
+
• Equinix Metal's expansion and focus on distribution capabilities
|
| 46 |
+
• Business model shifts in the tech industry towards as-a-service models
|
| 47 |
+
• Partnership between software companies, OEMs, and cloud providers
|
| 48 |
+
• The importance of making a positive impact with technology in a sustainable way
|
| 49 |
+
• Collaborative approach to solving global challenges through software and hardware combinations
|
| 50 |
+
• Ecosystem-driven development where value is created by solving problems together
|
| 51 |
+
• Examples of successful projects such as Tinkerbell OSS, otel-cli, and Equinix labs
|
| 52 |
+
• Emphasis on "doing well by doing good" and creating a bigger opportunity tent
|
Gerhard at KubeCon NA 2021 Part 1_summary.txt
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Overview of Linkerd 2.10 and new features in 2.11
|
| 2 |
+
• Introduction of policy control in Linkerd 2.11 for micro-segmentation and security
|
| 3 |
+
• Declaration of policy through annotations or CRDs (Custom Resource Definitions)
|
| 4 |
+
• Read-only UI in Linkerd, focusing on understanding system state rather than configuration
|
| 5 |
+
• Security theme in Linkerd development, including encryption and regulatory compliance
|
| 6 |
+
• Future plans for securing traffic in Kubernetes clusters
|
| 7 |
+
• Linkerd's ease of use for beginners
|
| 8 |
+
• Recommended production deployment practices (Helm, Terraform, etc.)
|
| 9 |
+
• Potential operator for automated upgrades and installations
|
| 10 |
+
• Linkerd's upgrade process from 2.10 to 2.11
|
| 11 |
+
• Supported Kubernetes versions and dependencies (cert manager)
|
| 12 |
+
• Importance of certificate rotation and clock skew considerations in production environments
|
| 13 |
+
• Linkerd community's transactional relationship with users
|
| 14 |
+
• Benefits of in-person interaction vs virtual conferences
|
| 15 |
+
• Importance of user gratitude and sharing success stories
|
| 16 |
+
• KubeCon event and talks featuring Linkerd users' experiences
|
| 17 |
+
• William Morgan's personal preferences and interests at KubeCon
|
| 18 |
+
• Upcoming releases and events for the Linkerd project
|
| 19 |
+
• Linkerd and Buoyant Cloud discussed as complementary technologies
|
| 20 |
+
• Expansion of mesh capabilities to non-Kubernetes environments
|
| 21 |
+
• Focus on policy and data plane improvements in Linkerd
|
| 22 |
+
• Introduction of Polar Signals, a company offering continuous profiling solution
|
| 23 |
+
• Discussion of continuous profiling, its history, and how it can be done cost-effectively in production using eBPF and Kubernetes
|
| 24 |
+
• Parca (a continuous profiling tool) is being opened up to the world at KubeCon
|
| 25 |
+
• The goal of Parca is to provide a way for developers to optimize their systems and reduce costs by identifying performance bottlenecks
|
| 26 |
+
• Continuous profiling is still a relatively new concept, and Parca aims to democratize it and educate the community about its benefits
|
| 27 |
+
• The tool uses eBPF (extended Berkeley Packet Filter) to collect data on system performance metrics such as CPU, memory, disk operations, and network operations
|
| 28 |
+
• Parca's UI has undergone significant improvements over a short period of time due in part to extensive dogfooding (using the software internally)
|
| 29 |
+
• The developers use Parca themselves to optimize their own tool, creating a self-reinforcing cycle of performance improvement
|
| 30 |
+
• Plans to productionize eBPF-related projects
|
| 31 |
+
• Advice for those who couldn't attend KubeCon in person or virtually
|
| 32 |
+
• Updates on Parca's development process and community involvement
|
| 33 |
+
• COSI (Cozy Operating System Initiative) progress and implementation in Talos
|
| 34 |
+
• Discussion of the future of operating systems, specifically with regards to API-driven interfaces and reduced reliance on SSH
|
| 35 |
+
• Talos installation methods and ease of use
|
| 36 |
+
• Creating a Kubernetes cluster with minimal setup and networking complexity
|
| 37 |
+
• Using COSI or PXE booting for bare metal installation
|
| 38 |
+
• Cloud deployment options and image upload requirements
|
| 39 |
+
• Consistency across environments, including laptops, cloud, and bare metal
|
| 40 |
+
• Minimalism and lack of unnecessary packages in Talos compared to other operating systems
|
| 41 |
+
• Security features, such as reproducible supply chain, read-only file system, and ephemeral storage
|
| 42 |
+
• Signing and tracing code commits from development to deployment for security and audit purposes
|
| 43 |
+
• Concerns about minimalist systems and security
|
| 44 |
+
• Use of musl instead of glibc and its performance implications
|
| 45 |
+
• Talos' use of musl and Go programming language
|
| 46 |
+
• Kubernetes and containerization with glibc
|
| 47 |
+
• Host and container configuration for musl and glibc
|
| 48 |
+
• Linux kernel version and LTS strategy
|
| 49 |
+
• KubeSpan announcement and on-demand cluster scaling
|
| 50 |
+
• Discussion of Andrew Rynhard joining an AWS Graviton instance to his laptop
|
| 51 |
+
• Andrew Rynhard's excitement about attending KubeCon in person and meeting his company colleagues
|
| 52 |
+
• Advice from Andrew Rynhard on how people who can't attend KubeCon in person should participate, including joining the CNCF Slack and watching catch-up videos
|
| 53 |
+
• David Flanagan's personal updates, including the arrival of his new baby boy Caleb and his job change to be a developer advocate for Pulumi
|
| 54 |
+
• Remote participation in KubeCon and managing multiple sessions
|
| 55 |
+
• Comparison of David Flanagan's and Gerhard Lazu's methods for participating in remote KubeCons
|
| 56 |
+
• Interacting with other attendees during virtual events
|
| 57 |
+
• Chairing the operations track at KubeCon, selecting talks, and being familiar with upcoming sessions
|
| 58 |
+
• GitOps tools Argo and Flux, their use cases, and benefits
|
| 59 |
+
• The failed attempt to consolidate both tools into a single "GitOps Toolkit" in 2019
|
| 60 |
+
• Interest in understanding the strengths and weaknesses of each tool and attending an upcoming GitOps summit
|
| 61 |
+
• Comparison between Flux and Argo for GitOps
|
| 62 |
+
• David Flanagan's new role at Pulumi and his interest in infrastructure as code and continuous integration/delivery
|
| 63 |
+
• Benefits of using Pulumi over TerraForm and HCL, including support for high-level programming languages
|
| 64 |
+
• Comparison with other tools such as Dagger (using CUE), Crossplane, and CUE Blocks
|
| 65 |
+
• Discussion of CUE language and its use cases, particularly in comparison to HCL and Pulumi
|
| 66 |
+
• Discussion of limitations and constraints in infrastructure as code tools
|
| 67 |
+
• Comparison of Dagger and Boundary for providing a single interface to infrastructure management
|
| 68 |
+
• Advantages of Crossplane for continuous reconciliation and control over execution
|
| 69 |
+
• Similarities between Pulumi, CDK from Amazon, and other tools for infrastructure as code
|
| 70 |
+
• Preference for TypeScript as a language for infrastructure as code due to its strict typing and flexibility
|
| 71 |
+
• Comparison of Go and TypeScript for use with Pulumi
|
| 72 |
+
• Discussion of challenges in managing dependencies in Go
|
| 73 |
+
• Changing format of Rawkode Live from high-level introductions to use case-specific content
|
| 74 |
+
• Focusing on real-world applications and solutions with specific tools
|
| 75 |
+
• Reducing decision fatigue by providing more practical examples and inspiration
|
| 76 |
+
• Exploring the cloud-native ecosystem and its many projects
|
| 77 |
+
• Importance of balance between breadth of knowledge and in-depth expertise
|
Gerhard at KubeCon NA 2021 Part 2_summary.txt
ADDED
|
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• eBPF (extended Berkeley Packet Filter) as a kernel technology allowing custom programs to run in the kernel and interact with events
|
| 2 |
+
• eBPF's potential for observability, security, and networking applications
|
| 3 |
+
• Comparison of eBPF to JavaScript in terms of making the kernel programmable
|
| 4 |
+
• Cilium's use of eBPF for network plumbing and observability
|
| 5 |
+
• Cilium components, including:
|
| 6 |
+
+ CNI (Container Networking Interface)
|
| 7 |
+
+ Hubble (network information collection and visualization)
|
| 8 |
+
+ Hubble UI (human-readable flow visualization)
|
| 9 |
+
• Integration with other tools for alerting and monitoring, such as Prometheus and Grafana
|
| 10 |
+
• Getting started with Cilium using Helm chart, command-line tool, or operator
|
| 11 |
+
• Upcoming install fests for Cilium on the Cilium.io website
|
| 12 |
+
• Live coding sessions at KubeCon to demonstrate eBPF programming
|
| 13 |
+
• Liz Rice's plans for her live coding session content and format
|
| 14 |
+
• Duffie Cooley joining Isovalent and working with Liz Rice
|
| 15 |
+
• Announcements about new projects joining the CNCF, including Cilium becoming a CNCF incubation-level project
|
| 16 |
+
• Discussing ways for attendees who can't attend KubeCon in person to feel part of the event
|
| 17 |
+
• Benefits of virtual elements in events, including increased accessibility and connectivity
|
| 18 |
+
• Features and updates on Cilium and eBPF, including kernel service mesh and weekly install fests
|
| 19 |
+
• Comparison of in-person vs. virtual KubeCon experiences
|
| 20 |
+
• Importance of community interaction and networking at KubeCon
|
| 21 |
+
• Discussion on hybrid event success, including virtual office hours and participant engagement
|
| 22 |
+
• Handling sensitive data in Crossplane, with proposals for external API credentials and secret stores
|
| 23 |
+
• Addressing a question about the need for Crossplane when cloud providers' consoles are accessible, and potential improvements to educational content and messaging
|
| 24 |
+
• Humorous exchange about Dan Mangum being the "Chief ClickOps Officer" (CCOO) of Crossplane
|
| 25 |
+
• Jared Watts' experience using Crossplane to manage GKE clusters and concerns about secrets handling in Kubernetes
|
| 26 |
+
• Discussion about KubeCon locations, including San Diego, Los Angeles, and Detroit
|
| 27 |
+
• Conversation about exercise habits, with Dan Mangum running in LA and Jared Watts participating in surfing and ice hockey
|
| 28 |
+
• Announcements about upcoming KubeCon EU and North America events in Valencia and Detroit respectively
|
| 29 |
+
• Maturity process and incubation status
|
| 30 |
+
• Increased adoption and community growth after announcement
|
| 31 |
+
• Governance and project release processes
|
| 32 |
+
• Benefits of being an incubating project, including increased visibility and advanced conversations with users
|
| 33 |
+
• Community building and user trajectory (getting started, intermediate, and advanced use)
|
| 34 |
+
• Challenges with GCP provider upgrades and future plans to make the process smoother for users
|
| 35 |
+
• Migrating to a stable GCP API and the process involved
|
| 36 |
+
• Levels of maturity and guarantees within Crossplane ecosystem
|
| 37 |
+
• Future plans for provider deployment model and customization
|
| 38 |
+
• Plans for improved provider coverage through code generation
|
| 39 |
+
• Custom compositions and extending the composition engine with custom logic
|
| 40 |
+
• KubeCon format, including virtual participation and hybrid experience
|
| 41 |
+
• MeetingPlay platform used for live Q&A during talks
|
| 42 |
+
• Zoom sessions were available but not utilized by David Ansari
|
| 43 |
+
• Virtual office hours participated in by Gerhard Lazu
|
| 44 |
+
• David Ansari's first KubeCon as a speaker, with pre-recorded talk submission process
|
| 45 |
+
• Discussion on the benefits of pre-recorded talks and live Q&A
|
| 46 |
+
• Feedback on David's talk, including suggestions for shorter length to allow more time for discussion
|
| 47 |
+
• Discussion of the format and effectiveness of pre-recorded talks at conferences
|
| 48 |
+
• Value of pre-recording for speakers to manage stage fright and prepare questions
|
| 49 |
+
• Importance of meeting people and having in-person interactions at conferences
|
| 50 |
+
• Variety and diversity of conference topics and tracks, as well as on-demand talk availability
|
| 51 |
+
• Observations on memorable communication techniques and anxiety management during public speaking
|
| 52 |
+
• Favorite talks and content, including eBPF ecosystem discussions
|
| 53 |
+
• eBPF foundation and its applications
|
| 54 |
+
• eBPF's focus on kernel events and observability
|
| 55 |
+
• Gerhard Lazu's plans to use eBPF in upcoming projects (Parca.dev and Cilium)
|
| 56 |
+
• KubeCon conference organization and support
|
| 57 |
+
• Sigstore project: open-source code for signing and verifying open source software
|
| 58 |
+
• Sigstore's differences from PGP, including transparency logs and centralization
|
| 59 |
+
• Signing and verifying digital content with Sigstore
|
| 60 |
+
• Software supply chain security and the role of signing commits
|
| 61 |
+
• Sigstore and its adoption in signing release artifacts and container images
|
| 62 |
+
• Use cases for Cosign in signing container images and verifying their provenance
|
| 63 |
+
• Distrosless base image suite and its properties, including reproducibility and transparency
|
| 64 |
+
• Chainguard company and its About page with Easter eggs and interactive elements
|
| 65 |
+
• The hosts discuss Dan Lorenc's uncut hair as a result of the pandemic
|
| 66 |
+
• Discussion of Easter eggs in software, including one hidden face on the Chainguard website
|
| 67 |
+
• The importance and growing recognition of software supply chain security
|
| 68 |
+
• The impact of the SolarWinds attack on the industry and government regulations
|
| 69 |
+
• Dan Lorenc's experience at KubeCon and Supply Chain Security Con
|
| 70 |
+
• Chainguard's goals and plans for future development, including continued focus on Sigstore adoption
|
Gerhard at KubeCon NA 2021: Part 1_summary.txt
ADDED
|
@@ -0,0 +1,151 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Linkerd details from KubeCon North America 2021
|
| 2 |
+
• PARCA: a new continuous system profiling tool using eBPF
|
| 3 |
+
• TalosOS and KubeSpan perspective with Andrew Reinhardt
|
| 4 |
+
• New beginnings with RawCode (David Flanagan) after a busy two months
|
| 5 |
+
• Partners mentioned: Fastly, LaunchDarkly, Linode, Fly
|
| 6 |
+
• Linkerd 2.11 release and new features, including policy control for microsegmentation
|
| 7 |
+
• Introduction of two new CRDs in Linkerd 2.11
|
| 8 |
+
• Expressing policy using annotations and CRDs for traffic control
|
| 9 |
+
• Flexibility in cluster configuration from open to locked-down settings
|
| 10 |
+
• Limited customization via UI, focusing on read-only functionality
|
| 11 |
+
• Security concerns driving development of policy features and microsegmentation
|
| 12 |
+
• Securing traffic within a Kubernetes cluster as a major theme in Linkerd's evolution
|
| 13 |
+
• Development of a new theme in Linkerd
|
| 14 |
+
• Importance of user value and adoption
|
| 15 |
+
• Challenges in tackling complex problems
|
| 16 |
+
• MTLS and Kubernetes blog post by the speaker
|
| 17 |
+
• Linkerd 2.11 installation methods
|
| 18 |
+
• Maintaining legacy installation methods for simplicity
|
| 19 |
+
• Importance of repeatable deployments in production environments
|
| 20 |
+
• Recommended practices for installing Linkerd in production
|
| 21 |
+
• Operator concept for automating installations and upgrades
|
| 22 |
+
• Upgrade process from Linkerd version 2.10 to 2.11
|
| 23 |
+
• Breaking changes in multi-cluster mechanics
|
| 24 |
+
• Additive features in Linkerd 2.11
|
| 25 |
+
• Policy and MTLS implementation
|
| 26 |
+
• Certificate rotation for cluster-level issuer certificate
|
| 27 |
+
• Dependencies on Kubernetes versions and cert manager
|
| 28 |
+
• Production runbook for Linkerd available on buoyant.io
|
| 29 |
+
• TLS certificates and clock skew issues
|
| 30 |
+
• Importance of human interaction in open-source communities
|
| 31 |
+
• Linkerd project and its impact on users
|
| 32 |
+
• Benefits of sharing experiences and use cases with the community
|
| 33 |
+
• Advice for virtual conference attendees to make the most out of it
|
| 34 |
+
• The contrast between in-person and virtual conference experiences
|
| 35 |
+
• The speaker's virtual booth at KubeCon is set up with fun and interesting content, including a run book and other Linkerd-related materials.
|
| 36 |
+
• There will be a raffle for Linkerd swag, including hats and shirts.
|
| 37 |
+
• The speaker is excited about two talks: one from Elkjof, the largest retailer in the Nordics, on how they use Linkerd and Kubernetes to replatform their company, and another from Intain Australia on how they 10x'd their throughput using Linkerd.
|
| 38 |
+
• The speaker will be meeting with people who have worked on Linkerd for a long time but has never met in person before.
|
| 39 |
+
• There are no specific plans or announcements mentioned for the next six months.
|
| 40 |
+
• Planning for releases 2.12 and 2.13
|
| 41 |
+
• Boynt Cloud: a SaaS complement to Linkerd with free tier and features like metrics hosting, topology maps, and traffic breakdowns
|
| 42 |
+
• Linkerd future plans: policy focus and mesh expansion to run proxies outside of Kubernetes
|
| 43 |
+
• Polar Signals: founded by the speaker after leaving CoreOS/Red Hat, focusing on continuous profiling in observability
|
| 44 |
+
• The speaker wants to explore the concept of continuous profiling before discussing it with others.
|
| 45 |
+
• Continuous profiling has been around since the 1960s and was initially expensive and hard to do in production.
|
| 46 |
+
• Sampling profiling allows for continuous monitoring without high overhead, making it accessible to hyperscalers.
|
| 47 |
+
• eBPF (extended Berkeley Packet Filter) technology enables low-overhead data capture and exportation to user space.
|
| 48 |
+
• Kubernetes has unified the observability space by standardizing terms like "pod" and "container".
|
| 49 |
+
• The combination of eBPF with Kubernetes allows for automatic discovery and analysis of CPU time consumption across containers and infrastructure.
|
| 50 |
+
• eBPF and its role in presenting system information
|
| 51 |
+
• Continuous profiling and the need for education in this space
|
| 52 |
+
• Parka's open-source goals, including democratizing continuous profiling and reducing infrastructure costs
|
| 53 |
+
• The backstory behind Parka's development, including a proof of concept with Conprof and Google's paper on cost optimization
|
| 54 |
+
• The ease of use and UI improvements in Parka
|
| 55 |
+
• Dogfooding as a key factor in the development and improvement of Parka
|
| 56 |
+
• Parka is performance-sensitive software with a specifically designed storage and query engine for continuous profiling.
|
| 57 |
+
• The team uses Parka to optimize itself, creating a vicious cycle of improvement.
|
| 58 |
+
• eBPF (Extended BPF) is evolving into a production-ready state, with many people exploring its applications.
|
| 59 |
+
• The speaker is excited about the potential of eBPF and mentions specific talks at KubeCon related to it.
|
| 60 |
+
• Travel restrictions prevent some attendees from attending in person, but they can still participate virtually or catch up on recordings later.
|
| 61 |
+
• Advice for those who couldn't attend includes finding local virtual meetups, watching recordings, and trying to be part of the community as much as possible.
|
| 62 |
+
• The next KubeCon EU is expected to have improved circumstances for attendance due to COVID cases decreasing.
|
| 63 |
+
• In the next six months, Parka will likely release more features based on community feedback, rather than a set plan.
|
| 64 |
+
• Discussion of the benefits of community involvement in open source projects
|
| 65 |
+
• The role of the CNCF and its successful approach due to community thinking
|
| 66 |
+
• Congratulations on a well-designed hiring page that serves as an example for others
|
| 67 |
+
• Update on Cozy, including rewriting the networking stack of Talos using Cozy concepts
|
| 68 |
+
• Launch of Koops Band, an automated wire guard product
|
| 69 |
+
• Options for running Talos: laptop, bare metal, cloud
|
| 70 |
+
• Easy way to start with Talos is to spin up a Kubernetes cluster on your laptop using the CLI command "Talos CTL cluster create"
|
| 71 |
+
• Bare metal setup can be done by using an ISO or Cozy, but requires networking configuration
|
| 72 |
+
• Pixie booting and Sedaro product can streamline the process, but may not be necessary for beginners
|
| 73 |
+
• Cloud setup involves uploading an image and turning it on with correct user data
|
| 74 |
+
• Talos aims to provide a consistent experience across different environments, allowing users to describe their application and how it should run using declarative YAML.
|
| 75 |
+
• Discussion of Talos and its benefits
|
| 76 |
+
• Comparison to Debian and Ubuntu
|
| 77 |
+
• Minimalism of Talos (50 megabytes, no package manager)
|
| 78 |
+
• Removal of unnecessary features (SSH, Bash) for Kubernetes focus
|
| 79 |
+
• Security emphasis in Talos (reproducible supply chain, read-only file system)
|
| 80 |
+
• Ephemeral nature of Talos
|
| 81 |
+
• Importance of hardening the experience and eliminating node-level management
|
| 82 |
+
• The speaker discusses Talos's use of Musil instead of GLibC for C libraries
|
| 83 |
+
• Performance issues are reported when running Musil outside of GLibC
|
| 84 |
+
• The speaker attributes this to the limited scope of Musil in their environment
|
| 85 |
+
• They mention using Go and a new init system, contributing to Musil's performance
|
| 86 |
+
• Kubernetes containers use GLibC, reducing the role of Musil in the ecosystem
|
| 87 |
+
• The speaker recalls issues with Alpine-based container images and Ubuntu ones
|
| 88 |
+
• They discuss running the latest LTS kernel version (5.10.62)
|
| 89 |
+
• The team considers releasing LTS-style versions of Talos with pinned Linux kernel versions
|
| 90 |
+
• A new product called KubeSpan is announced, which bridges bare metal clusters with cloud instances using Talos's API-driven stack
|
| 91 |
+
• The discussion centers around KubeSpan, a technology that allows users to securely scale Kubernetes clusters across different networks and locations.
|
| 92 |
+
• WireGuard is used as the underlying networking protocol to establish secure connections between nodes.
|
| 93 |
+
• The technology enables users to maintain a consistent network experience regardless of location, including remote or edge computing scenarios.
|
| 94 |
+
• KubeSpan makes it seamless to expand or contract clusters as needed, without disrupting the cluster's operation.
|
| 95 |
+
• There are some limitations and considerations to be aware of, such as needing at least one direction of communication between nodes.
|
| 96 |
+
• The technology has potential applications in various use cases, including on-premises data centers, cloud environments, and edge computing scenarios.
|
| 97 |
+
• Meeting in person at KubeCon
|
| 98 |
+
• Virtual attendance options (booths, Slack, catch-up videos)
|
| 99 |
+
• Prioritizing sessions and topics of interest
|
| 100 |
+
• Balancing technical and management roles
|
| 101 |
+
• Exploring new technologies and tools (Talos OS, Sdero, Cubespan)
|
| 102 |
+
• Raygun will provide daily performance summaries for websites
|
| 103 |
+
• KubeCon is being discussed, specifically the speaker's experience attending remotely due to travel ban
|
| 104 |
+
• The speaker has had a significant change in personal life, having a new baby and changing jobs from Equinix Metal to Pulumi
|
| 105 |
+
• Remote participation methods are being discussed, including joining sessions on Slack, Discord, Twitter, and watching recorded talks later
|
| 106 |
+
• Discussing a KubeCon experience with multiple sessions running at the same time
|
| 107 |
+
• Comparing in-person vs virtual attendance and consumption of talks
|
| 108 |
+
• Mentioning community member Noel Georgie's ability to watch four or five talks simultaneously
|
| 109 |
+
• Sharing personal preference for single-tasking during events
|
| 110 |
+
• Revealing involvement as chair of the operations track and selecting talks for KubeCon
|
| 111 |
+
• Discussing popular sessions on GitOps, infrastructure as code, and specific tools like Argo, Terraform, Crossplane, and Pulumi
|
| 112 |
+
• GitOps tools comparison: Flux vs Argo
|
| 113 |
+
• GitOps tool consolidation attempt by original creators of Argo and Flux
|
| 114 |
+
• Challenges with custom resources in Argo
|
| 115 |
+
• Ease of use and simplicity of Flux
|
| 116 |
+
• Benefits of using Flux for agnostic YAML generation
|
| 117 |
+
• Announced GitHub Summit and KubeCon events
|
| 118 |
+
• Continuous integration and delivery
|
| 119 |
+
• Infrastructure as code
|
| 120 |
+
• Pulumi's platform for deploying applications
|
| 121 |
+
• Comparison between Terraform, HCL, and Pulumi
|
| 122 |
+
• Dagger and its use of Q language
|
| 123 |
+
• Programming languages for defining resource graphs (Go, TypeScript, etc.)
|
| 124 |
+
• Encapsulation of knowledge through programming languages
|
| 125 |
+
• Pulumi vs Crossplane: comparison of their approaches
|
| 126 |
+
• XRDs (compositions) in Crossplane for combining resources
|
| 127 |
+
• Providers in Crossplane interacting with IASs
|
| 128 |
+
• Dagger and Q: data language, block-based, and query APIs
|
| 129 |
+
• Dagger's ability to move beyond infrastructure provisioning
|
| 130 |
+
• Boundary as a continuous delivery component for applications
|
| 131 |
+
• Constraints of Crossplane still being defined by YAML
|
| 132 |
+
• Continuous reconciliation in Crossplane vs Pulumi
|
| 133 |
+
• Control over actual reconciliation in Crossplane vs client-side in Pulumi
|
| 134 |
+
• Dagger making infrastructure provisioning easy with minimal boilerplate
|
| 135 |
+
• Comparison to Pulumi and CDK from Amazon for similar approaches
|
| 136 |
+
• CDK having advantages over YAML alternatives
|
| 137 |
+
• Similarities between Pulumi and CDK for TypeScript support
|
| 138 |
+
• Benefits of using TypeScript for infrastructure as code due to its strict typing and ecosystem
|
| 139 |
+
• Differences in experience between using Go versus TypeScript with Pulumi
|
| 140 |
+
• Convenience factors of the TypeScript ecosystem compared to Go
|
| 141 |
+
• Inventing tools that were half-working and often caused more pain than they solved
|
| 142 |
+
• Switching from vendor-managed repositories to GoMod
|
| 143 |
+
• Difficulty in choosing between multiple GitOps tools and CNI options
|
| 144 |
+
• Raw Code Live's transition to use-case specific content instead of just introductory material
|
| 145 |
+
• Importance of having breadth of knowledge about available tools, but also needing to apply them in real-world scenarios
|
| 146 |
+
• Onboarding process and its importance for a smooth job transition
|
| 147 |
+
• Acceleration and lack of time to appreciate the present
|
| 148 |
+
• Future plans for Clustered, Raw Code Live, and Pulumi
|
| 149 |
+
• Alignment of personal interests with new role at Pulumi
|
| 150 |
+
• Wrap-up and thank yous from host and guests
|
| 151 |
+
• Promotion of changelog.com podcasts and community
|
Gerhard at KubeCon NA 2021: Part 2_summary.txt
ADDED
|
@@ -0,0 +1,133 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• KubeCon North America 2021 interviews
|
| 2 |
+
• EBPF (eBPF) discussed as a powerful tool for observing and managing system behavior
|
| 3 |
+
• Comparison of EBPF to JavaScript's impact on HTML pages
|
| 4 |
+
• Liz Rice's perspective on EBPF's benefits, including improved visibility and understanding of system issues
|
| 5 |
+
• Discussion of networking challenges in Kubernetes environments and how EBPF can help address them
|
| 6 |
+
• EBPF programs and their potential applications
|
| 7 |
+
• Tools that build on EBPF primitives and offer useful abstractions
|
| 8 |
+
• History of observability in particular using EBPF
|
| 9 |
+
• Cilium and its use of EBPF for networking and observability
|
| 10 |
+
• Cilium components, including the CNI, Hubble, and Hubble UI
|
| 11 |
+
• Integration with other tools for alerting and monitoring
|
| 12 |
+
• User expresses interest in using Cilium in a production environment
|
| 13 |
+
• Discusses getting started with Cilium, including Helm chart and CLI options
|
| 14 |
+
• Announces upcoming "install fests" for interactive guidance with experienced Cilium users
|
| 15 |
+
• Plans to watch live coding session on eBPF programming at KubeCon
|
| 16 |
+
• Discussion of using BCC framework and Go for ease of demonstrating eBPF capabilities
|
| 17 |
+
• Overview of steps in a typical live coding session, including Hello World example and exploring kernel-user space data transfer
|
| 18 |
+
• Discussion about upcoming live coding sessions
|
| 19 |
+
• Plans for KubeCon, including attending remotely and virtually
|
| 20 |
+
• Introduction of new team member Duffy Cooley and his experience in networking
|
| 21 |
+
• Upcoming project updates and announcements at KubeCon
|
| 22 |
+
• Cilium becoming a CNCF incubation level project
|
| 23 |
+
• General discussion about collaboration and working with team members
|
| 24 |
+
• Excitement about an upcoming Cilium community event
|
| 25 |
+
• Discussing how to participate in KubeCon despite not being physically present
|
| 26 |
+
• Benefits of virtual participation, including interacting with others and asking questions
|
| 27 |
+
• Using Slack for connection and conversation during events
|
| 28 |
+
• Virtual office hours as a way to connect with others
|
| 29 |
+
• The value of maintaining a virtual element in future events for accessibility and inclusion
|
| 30 |
+
• eBPF and Cilium projects are mentioned as having interesting developments in the next six months
|
| 31 |
+
• Service Mesh space is evolving with different products emerging
|
| 32 |
+
• Cilium's role in the Service Mesh story will be significant
|
| 33 |
+
• KubeCon event was discussed, including its safe environment due to health protocols
|
| 34 |
+
• Attendance at KubeCon was lower than previous years, but had a unique atmosphere allowing for community collaboration
|
| 35 |
+
• Discussion of previous KubeCon event and virtual participation
|
| 36 |
+
• Review of successful virtual office hours and inclusive event organization
|
| 37 |
+
• Handling of sensitive data in CrossPlan, including credentials for cloud providers and infrastructure
|
| 38 |
+
• Addressing questions about security and credentials
|
| 39 |
+
• Importance of messaging and education around the value of CrossPlan
|
| 40 |
+
• Creation of a "Chief ClickOps Officer" role as a tongue-in-cheek solution to addressing direct access to cloud provider consoles.
|
| 41 |
+
• Discussion on Crossplane's benefits
|
| 42 |
+
• Handling secrets in Kubernetes
|
| 43 |
+
• Comparison of running experiences in San Diego and LA
|
| 44 |
+
• Upcoming KubeCon locations (Detroit, Valencia)
|
| 45 |
+
• Announcements from KubeCon EU
|
| 46 |
+
• Crossplane entering incubation status
|
| 47 |
+
• Effects of incubation on the project's growth and maturity
|
| 48 |
+
• Inroads made into the community and more people to reach
|
| 49 |
+
• CNCF declaring project as mature and making noise about it
|
| 50 |
+
• Project governance and release processes remain unchanged
|
| 51 |
+
• Growth of the community due to increased visibility and maturity
|
| 52 |
+
• Benefits of being an incubating project, including baseline knowledge from new users
|
| 53 |
+
• Journey of cross-plane from sandbox to incubation in the CNCF
|
| 54 |
+
• Process and timeline for applying for incubation status
|
| 55 |
+
• Level of activity and busyness resulting from the incubation process
|
| 56 |
+
• Getting started guide and introducing advanced concepts early on
|
| 57 |
+
• The process of creating RDS instances on AWS or Cloud SQL instances on GCP from a Kubernetes cluster
|
| 58 |
+
• Building community around Crossplane, including YouTube content and Slack discussions
|
| 59 |
+
• Importance of end-users helping each other with use cases and feature requests
|
| 60 |
+
• Challenges with the GCP provider upgrade (0.18/0.19) and potential future improvements
|
| 61 |
+
• Migration guide for upgrading to newer versions of Crossplane
|
| 62 |
+
• Maturity levels within the Crossplane ecosystem and need for clear guarantees around breaking changes
|
| 63 |
+
• Stability of Crossplane platforms and APIs
|
| 64 |
+
• Breaking changes in provider packages
|
| 65 |
+
• Provider deployment models (current limitations and future possibilities)
|
| 66 |
+
• Granular provider installs and API extension mechanisms
|
| 67 |
+
• Future plans for Crossplane roadmap (hosted control plane model, partitioning)
|
| 68 |
+
• Discussion about upcoming plans for the next six months
|
| 69 |
+
• Dan's proposals for community-driven projects being well-received
|
| 70 |
+
• Exciting developments in provider coverage and custom compositions
|
| 71 |
+
• Provider coverage: generating cross-plane providers for cloud providers' APIs
|
| 72 |
+
• Custom compositions: enabling users to extend the composition engine with custom logic
|
| 73 |
+
• KubeCon experience, including virtual participation and interaction with attendees
|
| 74 |
+
• The speaker's experience at KubeCon as a pre-recorded talk presenter
|
| 75 |
+
• Benefits of pre-recorded talks for speakers and attendees, including flexibility and live Q&A
|
| 76 |
+
• Challenges of presenting a pre-recorded talk, such as managing time and editing the video
|
| 77 |
+
• The value of live Q&A in a pre-recorded talk, allowing for immediate responses to questions
|
| 78 |
+
• Suggestions for future talks, including shortening the presentation to leave more time for Q&A.
|
| 79 |
+
• Discussion and feedback from users is valuable in talks
|
| 80 |
+
• Understanding audience level of knowledge and experience
|
| 81 |
+
• Keeping talks concise and not giving away all information at once
|
| 82 |
+
• Encouraging discussion and questions to gauge audience interest
|
| 83 |
+
• The importance of knowing one's audience and adapting the talk accordingly
|
| 84 |
+
• Using a pre-recorded talk can be beneficial for first-time speakers
|
| 85 |
+
• The role of Slack in facilitating conversations and Q&A after talks
|
| 86 |
+
• Discussion of attending KubeCon in person versus virtually
|
| 87 |
+
• Preferences for giving talks in person vs pre-recording
|
| 88 |
+
• Recommendations for improving public speaking skills, specifically referencing Matt Abrahams' book and talks on memorable communication
|
| 89 |
+
• Review of KubeCon's diverse range of tracks and topics
|
| 90 |
+
• Discussion of favorite talks or memorable moments from the conference
|
| 91 |
+
• The benefits of virtual conferences, including being able to consume content quickly and connect with others in a different way.
|
| 92 |
+
• eBPF (Extended Berkeley Packet Filter) ecosystem, including Liz Rice's talk on cloud native superpowers with eBPF, and the speaker's enthusiasm for kernel events and eventing.
|
| 93 |
+
• Plans to implement eBPF in upcoming projects, specifically parka.dev and Cilium.
|
| 94 |
+
• Observability from a kernel perspective, which the speaker finds unique and impressive.
|
| 95 |
+
• Speaker support at KubeCon, including a dedicated Slack channel with rapid response times.
|
| 96 |
+
• The combination of in-person and virtual attendance at KubeCon, which worked well but was challenging to organize.
|
| 97 |
+
• Plans to attend in-person at next year's KubeCon.
|
| 98 |
+
• Designing language models requires a coherent approach, not just combining features from other languages
|
| 99 |
+
• The SIGStore project aims to make signing and verifying open source software easy and free
|
| 100 |
+
• SIGStore is inspired by the Let's Encrypt model, which made web traffic encryption free and automated
|
| 101 |
+
• SIGStore uses transparency logs, which are more modern than some of PGP's methods
|
| 102 |
+
• Transparency logs provide benefits such as being slightly centralized but not requiring trust in a central operator
|
| 103 |
+
• SIGStore takes a different approach from PGP, using newer encryption standards and focusing on simplicity
|
| 104 |
+
• Signing Git commits with PGP keys
|
| 105 |
+
• SIGStore ecosystem for signing various artifacts
|
| 106 |
+
• Centralized infrastructure security concerns
|
| 107 |
+
• Refactoring Git to use multiple techniques for signing, including non-PGP methods
|
| 108 |
+
• Software supply chain security importance
|
| 109 |
+
• Signing release tags, artifacts (e.g. zip files, tarballs, container images), and packages
|
| 110 |
+
• Cosign project for signing container images
|
| 111 |
+
• Container image standards and metadata propagation in the Open Containers Initiative
|
| 112 |
+
• The OCI specification has added a new field to track the Ubuntu base image used in builds
|
| 113 |
+
• This allows for easier tracking and verification of build processes
|
| 114 |
+
• Jason Hall at Red Hat contributed to this change
|
| 115 |
+
• A "distro-less" concept was mentioned, which comes from Google and is related to container builds
|
| 116 |
+
• The Kubernetes team moved their images to a distro-less approach without notifying the original creators
|
| 117 |
+
• Chainguard's About page has an Easter egg that reveals humorous information when clicked on
|
| 118 |
+
• Discussion of a social media post about hair
|
| 119 |
+
• Easter eggs on a website
|
| 120 |
+
• Software supply chain security and its growing importance
|
| 121 |
+
• The speaker's work on software supply chain security at Google
|
| 122 |
+
• Government regulations and standards being developed to address the issue
|
| 123 |
+
• The need for companies to prioritize software security
|
| 124 |
+
• The speaker returns from KubeCon and shares their experience
|
| 125 |
+
• Supply Chain Security Con (SCSC) is discussed as a day-zero event before KubeCon
|
| 126 |
+
• SCSC is mentioned to be a negative one event, highlighting the importance of addressing security concerns
|
| 127 |
+
• A talk at KubeCon about using OCI registries for chat applications is highlighted as a favorite moment
|
| 128 |
+
• The speaker's future plans for ChainGuard, including focusing on SIG Store adoption and company development
|
| 129 |
+
• Partnership acknowledgments
|
| 130 |
+
• Music credits
|
| 131 |
+
• End of the episode
|
| 132 |
+
• Upcoming return to the broadcast
|
| 133 |
+
• Game segment initiation
|
Grafana’s "Big Tent" idea_summary.txt
ADDED
|
@@ -0,0 +1,88 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Discussion on Tom's past appearance on the podcast (Changelog episode 375) and how much has changed since then
|
| 2 |
+
• Introduction to new tools and features: Loki, Tempo, and Grafana Agent with Prometheus and Grafana Cloud
|
| 3 |
+
• Explanation of Cortex architecture and its role in offering a generous free tier for Grafana Cloud
|
| 4 |
+
• Discussion on Tom's previous appearance at KubeCon 2019 North America and how the industry has evolved since then
|
| 5 |
+
• Overview of new features and updates: Tempo, Loki 2.0 with improved query language, and linking metrics and logs with traces
|
| 6 |
+
• Discussion of the impact of the global pandemic on Grafana Labs
|
| 7 |
+
• Mention of the scalability and remote-first nature of Grafana Labs
|
| 8 |
+
• Reference to a keynote speech on observability and its vision for the future
|
| 9 |
+
• Description of the development and benefits of Loki, a Grafana project
|
| 10 |
+
• Discussion of Grafana Cloud and its hosted managed service features
|
| 11 |
+
• Explanation of unified alerting in Grafana and its combination of Prometheus system features
|
| 12 |
+
• Mention of the importance of cloud architecture and multi-tenancy in offering a free tier
|
| 13 |
+
• Description of the horizontally scalable, multi-tenant version of Cortex
|
| 14 |
+
• Discussion about the cost-saving statistical multiplexing techniques used in Loki and Tempo
|
| 15 |
+
• Consistency across offerings due to shared architecture and techniques
|
| 16 |
+
• Background of VP of product explaining their coding expertise
|
| 17 |
+
• Experience with open-source codebases, including Zen hypervisor project and Prometheus/Cortex development
|
| 18 |
+
• Mention of Grafana Cloud features, including Metric Tank and future plans for Graphite V5
|
| 19 |
+
• Connection between Acuna Analytics (former company) and GoSquared (previous startup)
|
| 20 |
+
• Discussion about past experiences with analytics and monitoring systems (GoSquared, MongoDB, Cassandra, Graphite)
|
| 21 |
+
• Comparison of scalability and limitations of various systems (Graphite, Prometheus, Cortex)
|
| 22 |
+
• Mention of Acuna's contribution to the Cassandra project (virtual nodes technique)
|
| 23 |
+
• Connection between Cassandra/Graphite and modern systems (Cortex, Loki, Tempo)
|
| 24 |
+
• Reflection on the evolution of analytics and monitoring technology
|
| 25 |
+
• Debate about the definition of observability and its relationship to metrics, logs, and traces
|
| 26 |
+
• Discussion of the importance of curiosity and understanding system behavior for observability
|
| 27 |
+
• Grafana Labs avoids one-size-fits-all solutions and instead supports multiple tools and combinations to help users get the best results
|
| 28 |
+
• The goal is to bring together different teams' tools into a single place with a unified experience
|
| 29 |
+
• The ideal tool helps users access data and test hypotheses, rather than providing automation or root cause analysis
|
| 30 |
+
• Situationally-appropriate tool selection depends on the problem and available tools
|
| 31 |
+
• The speaker mentions a colleague named Manu who was previously involved with the Phoenix app and is now at a cryptocurrency company.
|
| 32 |
+
• The speaker explains that the Phoenix app is monolithic, meaning it's not broken down into microservices, and has a specific architecture involving a CDN, load balancer, Ingress Nginx, and a database.
|
| 33 |
+
• The speaker discusses the importance of instrumenting the system to collect metrics and troubleshoot slow requests.
|
| 34 |
+
• The speaker mentions using Prometheus and exporters to collect metrics from various components of the system.
|
| 35 |
+
• The speaker explores integrating Fastly logs with Grafana Cloud but notes that there is no native integration and that a proxy would be required to forward logs.
|
| 36 |
+
• The speaker discusses how Loki in Grafana Cloud can process log data into usable metrics, such as request rates, error rates, and latencies.
|
| 37 |
+
• Deploying Promptail as a daemon set and sending logs to Loki
|
| 38 |
+
• Instrumenting application code with Prometheus client library
|
| 39 |
+
• Collecting metrics from database (e.g. MySQL) using exporter
|
| 40 |
+
• Organizing dashboards in a consistent format (e.g. request rates, error rates, latency)
|
| 41 |
+
• Using mixin packaging format for distributing dashboards and alerts
|
| 42 |
+
• Referencing Cortex or Kubernetes mixins as examples
|
| 43 |
+
• Challenges in using JSON for changelogs due to version differences between languages (e.g. Go, Python, JavaScript)
|
| 44 |
+
• Introduction of mixins as an advanced feature for packaging and redistributing software components
|
| 45 |
+
• Advantages of JSON it bundler tools (MixTool, Grizzly, Tanker) for managing complex configurations
|
| 46 |
+
• Use of a single repository for config management in Grafana Cloud with Kubernetes clusters
|
| 47 |
+
• Managing Kubernetes jobs using JSON it
|
| 48 |
+
• Discussion of the vision for delivering dashboards, alerts, and applications as a single package
|
| 49 |
+
• Criticism that this approach is too hard to use and may not be suitable for most people
|
| 50 |
+
• Introduction of a more opinionated and integrated version of JSON it in Grafana Cloud
|
| 51 |
+
• Simplification of configuration through the Grafana agent and its integration with various exporters.
|
| 52 |
+
• JSON it bundler
|
| 53 |
+
• Grafana agent vs Prometheus operator
|
| 54 |
+
• Challenges with dashboard integration in Grafana
|
| 55 |
+
• Best practices for building dashboards:
|
| 56 |
+
• Templating data sources and job/instance labels
|
| 57 |
+
• Using templates to dynamically discover jobs/metrics
|
| 58 |
+
• Adding info metrics to software
|
| 59 |
+
• Building dashboards as code using libraries (Grafana, Grafana Builder, Grafana Lib)
|
| 60 |
+
• Version controlling dashboards from the start
|
| 61 |
+
• Implementing GitOps style approach with tools like Grizzly
|
| 62 |
+
• Discussing the use of Grafana with a JSON definition of a dashboard
|
| 63 |
+
• Implementing dev deploy cycle on a laptop for developing dashboards and uploading them to Grafana
|
| 64 |
+
• Version controlling source code instead of JSON files for reviewability and collaboration
|
| 65 |
+
• The 80/20 rule for Grafana usage, where 80% is easy-to-use editing and 20% is advanced SRE/DevOps approach
|
| 66 |
+
• Pair programming an hour-long YouTube stream to capture the advanced approach
|
| 67 |
+
• Discussing VS Code Sharing and Rufana Cloud/Rufana Agent integration
|
| 68 |
+
• Importance of capturing and sharing the advanced approach for others to learn from it
|
| 69 |
+
• Barriers to entry for tracing vs logs
|
| 70 |
+
• Challenges in the tracing space due to high investment and instrumentation requirements
|
| 71 |
+
• Benefits of tracing, particularly in performance challenges
|
| 72 |
+
• Open Telemetry and its tracing stack
|
| 73 |
+
• Auto-instrumentation in various languages (e.g. Java, Python)
|
| 74 |
+
• Distributed tracing and blind spots in instrumented stacks
|
| 75 |
+
• Tracing in load balancers and CDNs (e.g. AWS ELBs, Fastly)
|
| 76 |
+
• Distributed tracing and spans in software applications
|
| 77 |
+
• Instrumenting Elixir server and client for better understanding of request flow
|
| 78 |
+
• Challenges in getting complete traces from all services and the effort-reward trade-off
|
| 79 |
+
• Focusing on key hops in the application stack (e.g. Ingress Nginx, Kubernetes service, application)
|
| 80 |
+
• Potential limitations of adding spans to certain layers (e.g. load balancer, TCP level)
|
| 81 |
+
• Using OpenTelemetry for vendor-neutral tracing standards and potential for adding spans to open-source projects
|
| 82 |
+
• Creating Grafana dashboards for visualization of request flow and exploring different tools and version control systems
|
| 83 |
+
• Iterating on solving specific observability problems
|
| 84 |
+
• Long-term value of integrating tempo and other tools
|
| 85 |
+
• Ecosystem maturity and changing tooling landscape
|
| 86 |
+
• Big tent philosophy in observability and data sources
|
| 87 |
+
• Grafana Labs' mission to support multiple tooling choices
|
| 88 |
+
• Origin of the term "big tent" and its application in Grafana
|
Grafana’s Big Tent idea_summary.txt
ADDED
|
@@ -0,0 +1,62 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Launch of Tempo, a tracing system from Grafana Labs
|
| 2 |
+
• Loki 2.0 with improved query language and pipeline operator for filtering logs
|
| 3 |
+
• Collaboration between Grafana Labs and Prometheus team on LogQL design
|
| 4 |
+
• Development of exemplars in Prometheus and Grafana to link metrics and traces
|
| 5 |
+
• Prediction of observability future in KubeCon 2019 keynote and subsequent development
|
| 6 |
+
• Launch of GEM (Grafana Enterprise Metrics) and growth of Grafana Labs to over 400 employees
|
| 7 |
+
• Impact of global pandemic on Grafana Labs, which was set up as remote-first organization
|
| 8 |
+
• Unified alerting system in Grafana, combining features from Prometheus and Grafana alerting systems
|
| 9 |
+
• Launch of generous free tier for Grafana Cloud
|
| 10 |
+
• The speaker discusses how Cortex is a horizontally-scalable, multi-tenant version of Prometheus that allows for free provisioning and reduced costs.
|
| 11 |
+
• Cortex's architecture has been replicated in Loki and Tempo, providing consistency across offerings and reducing operational burden.
|
| 12 |
+
• The speaker's background as a software engineer and his involvement in the creation of Cortex are discussed.
|
| 13 |
+
• Grafana Cloud is mentioned as having a time-series database called Metrictank, which was later replaced with Cortex-style architecture.
|
| 14 |
+
• Acunu Analytics' contribution to Cassandra through virtual nodes is highlighted as an example of innovation in distributed systems.
|
| 15 |
+
• The connection between Graphite and Prometheus/Cortex is noted, with similarities between the scaling challenges faced by these projects.
|
| 16 |
+
• Definition of observability discussed
|
| 17 |
+
• Critique of traditional "three pillars" definition of observability (metrics, logs, traces)
|
| 18 |
+
• Importance of curiosity and interest in understanding system behavior for observability
|
| 19 |
+
• Discussion of Grafana Labs' approach to observability as a big tent philosophy that supports multiple solutions and techniques
|
| 20 |
+
• Tom Wilkie's preference for defining observability as helping engineers understand their applications and infrastructure through various tools and data sources
|
| 21 |
+
• Example of using Grafana to solve a specific problem (slow requests) in a monolithic application
|
| 22 |
+
• Discussion on Phoenix app architecture, including its monolithic structure and request flow
|
| 23 |
+
• Troubleshooting slow requests using Grafana ecosystem tools, specifically CloudWatch exporter and Prometheus
|
| 24 |
+
• Integrating Fastly logs with Grafana Cloud/Loki, including validation issues and proxy requirements
|
| 25 |
+
• Instrumenting the system for metrics and logs, including CDN, load balancer, Ingress NGINX, and application code
|
| 26 |
+
• Using Loki to extract metrics from logs and create dashboards
|
| 27 |
+
• Applying Tom's "RED" method (request rate, error rate, request duration) to instrument applications
|
| 28 |
+
• Creating a top-to-bottom dashboard layout for system performance analysis
|
| 29 |
+
• Mixins as a packaging format for Grafana dashboards and Prometheus alerts
|
| 30 |
+
• Overview of popular mixins, including Cortex, Kubernetes, and Etcd
|
| 31 |
+
• Use of mixins to simplify dashboard management and reduce cognitive load
|
| 32 |
+
• Jsonnet language used to express alerts and dashboards in mixin format
|
| 33 |
+
• Mixin tooling and ecosystem (e.g. mix tool, Grizzly, Tanker)
|
| 34 |
+
• Monorepo approach with single repo for config management across multiple Kubernetes clusters
|
| 35 |
+
• Use of Jsonnet for managing all aspects of deployment, including Kubernetes jobs and configuration
|
| 36 |
+
• Vision of end-to-end integration through a single language and tooling (Jsonnet)
|
| 37 |
+
• Kubernetes integration with Docker monitoring
|
| 38 |
+
• Using Grafana Agent for metric and log collection
|
| 39 |
+
• Difficulty in integrating dashboards with PromEx library
|
| 40 |
+
• Template-based dashboard approach with data source templating
|
| 41 |
+
• Building dashboards as code using Jsonnet or Grafonnet
|
| 42 |
+
• GitOps-style approach to managing dashboards with tools like Grizzly
|
| 43 |
+
• Collaboration on a YouTube stream to explore building dashboards as code
|
| 44 |
+
• Discussion of using Grafana Cloud and Grafana Agent for metrics and logs
|
| 45 |
+
• Overview of Tempo as a tracing component and its integration with Grafana Cloud
|
| 46 |
+
• Challenges of implementing tracing, including high barrier to entry and lack of incremental rewards
|
| 47 |
+
• Importance of traces in understanding performance issues and identifying slow requests
|
| 48 |
+
• Explanation of OpenTelemetry as a cross-functional project simplifying telemetry data collection
|
| 49 |
+
• Discussion of auto-instrumentation for languages such as Java, Python, and Go
|
| 50 |
+
• Problems with distributed tracing, including holes in instrumentation and black blind spots
|
| 51 |
+
• Need for entire stack to be instrumented to get full value from tracing
|
| 52 |
+
• Future possibilities for improved tracing capabilities through OpenTelemetry and W3C Trace Context
|
| 53 |
+
• Instrumenting spans for distributed tracing
|
| 54 |
+
• Determining the optimal places to instrument spans in a complex system (e.g. Ingress NGINX, Kubernetes)
|
| 55 |
+
• Effort vs reward trade-off in getting complete traces from every service
|
| 56 |
+
• Using OpenTelemetry to get vendor-neutral and open-source support for span instrumentation
|
| 57 |
+
• Integrating with Grafana dashboards and tools for version control and iteration
|
| 58 |
+
• Big tent philosophy approach to observability tooling (supporting multiple systems and vendors)
|
| 59 |
+
• Integration of systems in new ways
|
| 60 |
+
• Supporting multiple query languages within a single database (e.g. Tempo)
|
| 61 |
+
• OpenTelemetry's vendor-neutral approach
|
| 62 |
+
• Conversation discussion and exchange of interest between Tom and Gerhard
|
Honeycomb's secret to high-performing teams_summary.txt
ADDED
|
@@ -0,0 +1,39 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Definition of observability and its origins in mechanical engineering
|
| 2 |
+
• Observability as a way to understand internal system state without prior knowledge
|
| 3 |
+
• Instrumenting code to gather context and information about system behavior
|
| 4 |
+
• Importance of gathering high cardinality dimensions such as user IDs and request data
|
| 5 |
+
• Distinguishing between metrics-based monitoring tools for infrastructure and observability for understanding code behavior
|
| 6 |
+
• Shift from monolithic architecture to microservices and serverless, requiring more robust observability methods
|
| 7 |
+
• Applying observability principles to monolithic systems and focusing on end-user experience and journey through the app
|
| 8 |
+
• Development teams spend more time with code than end users
|
| 9 |
+
• CI/CD pipelines are essential for observability and reducing bug fixes
|
| 10 |
+
• Observability helps engineers have a tight feedback loop by quickly seeing changes in production
|
| 11 |
+
• Time is key: shipping to production as soon as possible (ideally < 15 minutes) reduces bugs and pathologies
|
| 12 |
+
• Shipping into production is crucial, and testing in production is inevitable; the goal is to do it well with guardrails
|
| 13 |
+
• "Dead code" isn't valuable unless it's in production
|
| 14 |
+
• The number of engineers required to maintain codebase scales with time spent on maintenance, with 2x as many engineers needed for each doubling of time
|
| 15 |
+
• Importance of minimizing wait times in engineering, especially when trying to solve new problems or ship changes quickly
|
| 16 |
+
• Goal of achieving a 15-minute deployment cycle for most companies, with some variation depending on stack and complexity
|
| 17 |
+
• Relationship between testing and shipping speed, with tests ideally running within the same short timeframe
|
| 18 |
+
• Concept of "shipping" as not just deploying code, but also learning from it and getting answers to questions quickly
|
| 19 |
+
• Example of Changelog.com's monolithic application and how to make it more observable using Honeycomb OpenTelemetry instrumentation
|
| 20 |
+
• Visualization of data in Honeycomb, including features like BubbleUp for diagnosing problems and identifying differences
|
| 21 |
+
• Overview of the backend infrastructure for storing events, including Kafka, retriever nodes, S3, Lambda jobs, and API interactions
|
| 22 |
+
• Use of Kafka as a storage engine
|
| 23 |
+
• Comparison with Kinesis and outsourcing vs running in-house
|
| 24 |
+
• Managing and updating Kafka clusters
|
| 25 |
+
• Performance characteristics of storing data on SSDs and S3
|
| 26 |
+
• Monitoring and testing Honeycomb using internal "dogfood" cluster
|
| 27 |
+
• Automated deployment process to kibble, dogfood, and production environments
|
| 28 |
+
• Importance of acknowledging human fallibility and optimizing for learning
|
| 29 |
+
• Importance of building systems that make it easy for engineers to write code quickly
|
| 30 |
+
• Characteristics of a high-performing team, including ability to ship often and focus on new problems
|
| 31 |
+
• Benefits of joining a high-performing team vs trying to improve an existing one
|
| 32 |
+
• Role of engineering managers in creating healthy teams and pushing back against short-sighted approaches
|
| 33 |
+
• Unhealthy power dynamics between product people and engineers, and importance of triad-based relationships
|
| 34 |
+
• Healthy relationship between money flow and priorities, including considering long-term investment and employee well-being
|
| 35 |
+
• Importance of uninterrupted focus for engineers
|
| 36 |
+
• Measuring happiness and health of engineering teams through surveys and open communication
|
| 37 |
+
• Human element in software development, treating engineers as people not machines
|
| 38 |
+
• Observability and CI/CD pipelines for improving team performance
|
| 39 |
+
• Book "Observability Engineering" and its free early release
|
Introducing Ship It!_summary.txt
ADDED
|
@@ -0,0 +1,37 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Introduction and meeting of hosts Jerod Santo, Adam Stacoviak, and Gerhard Lazu
|
| 2 |
+
• Discussion of the show's concept and title "Ship It"
|
| 3 |
+
• Explanation of what "shipping" means in the context of software development
|
| 4 |
+
• Background story on how Gerhard Lazu started helping Changelog.com with infrastructure issues and evolved into an annual infrastructure show
|
| 5 |
+
• Story about the process of shipping improvements to infrastructure, including testing, feedback, and partner relationships
|
| 6 |
+
• Discussion of the idea for a podcast where teams can share their experiences and learn from each other's "shipping" processes
|
| 7 |
+
• Invitation for listeners to join the conversation and participate in the show
|
| 8 |
+
• Discussion of podcast format and potential topics
|
| 9 |
+
• Gerhard's goal for 10,000 episodes and joking about system breakdown
|
| 10 |
+
• Importance of community and people element in software development
|
| 11 |
+
• Potential topics for discussion, including observability, Kubernetes, continuous delivery, and agile methodology
|
| 12 |
+
• Upcoming episodes with guest experts, such as Ben Ford from Commando Development
|
| 13 |
+
• Aspirations for the podcast to be a place where developers can discuss all aspects of delivering quality software, not just technical details
|
| 14 |
+
• Discussion of software infrastructure and reliability
|
| 15 |
+
• Introducing Gerhard Lazu, a world-class SRE, and his expertise on shipping
|
| 16 |
+
• Gerhard's background in broadcasting and early interest in tech
|
| 17 |
+
• His journey from frontend developer to web hosting provider and interest in infrastructure tools like Ruby on Rails and NGINX
|
| 18 |
+
• Development of Deliver, a tool for deploying websites, and its connection to Ship It podcast
|
| 19 |
+
• Jerod Santo's recollection of interacting with Gerhard through Changelog Media years ago and his decision to email him about the podcast
|
| 20 |
+
• Gerhard Lazu discusses his personal history and how it relates to Changelog
|
| 21 |
+
• Gerhard's background and skills are mentioned, including his experience with various programming languages and technologies
|
| 22 |
+
• The origins of Changelog are discussed, including its beginnings as a side project and its growth over the years
|
| 23 |
+
• Jerod Santo and Adam Stacoviak share their own experiences working with Gerhard and the evolution of Changelog
|
| 24 |
+
• The importance of commitment to one's work is emphasized by Adam and Gerhard
|
| 25 |
+
• Plans for future episodes of Ship It are mentioned, including guests and topics that will be explored
|
| 26 |
+
• The hosts mention a special guest who has been involved in conversations about the podcast.
|
| 27 |
+
• They discuss the goal of creating meaningful and impactful topics for listeners.
|
| 28 |
+
• The hosts explain their process for selecting episodes, including taking suggestions from listeners through changelog.com/request.
|
| 29 |
+
• They highlight various ways listeners can get in touch with them, such as Slack, Twitter, or email.
|
| 30 |
+
• Gerhard mentions that he welcomes passionate topics and conversations, even those that may be contentious.
|
| 31 |
+
• Adam suggests a potential episode topic based on a discussion in the Slack channel about Kubernetes vs PaaS vs IaaS.
|
| 32 |
+
• The hosts discuss the importance of context and nuance in discussions about technology, and how there is no one-size-fits-all solution.
|
| 33 |
+
• They highlight the unique aspect of their podcast being that it is production-focused, with actual code going into the application they are discussing.
|
| 34 |
+
• PromEx and live updating of Changelog.com in production
|
| 35 |
+
• Latest version of Erlang and its impact on Changelog.com performance
|
| 36 |
+
• Livestreaming the process on YouTube for Friday, 28th
|
| 37 |
+
• Unique approach to testing infrastructure and showcasing technology
|
Is Kubernetes a platform_summary.txt
ADDED
|
@@ -0,0 +1,44 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Table tennis games between Gerhard Lazu and Tammer Saleh in 2016-2017
|
| 2 |
+
• Missed office culture due to remote work, including camaraderie and social interactions
|
| 3 |
+
• Benefits of fully remote companies, such as attracting talent and promoting equality
|
| 4 |
+
• Concerns about cultural divide between cities and countryside, and the potential for remote work to "flatten" this divide
|
| 5 |
+
• Advantages and trade-offs of leaving a big city, including loss of good dinners and table tennis
|
| 6 |
+
• Kubernetes, including its complexity, adoption rates, and original intentions for use by application developers
|
| 7 |
+
• Common problems companies face when starting with Kubernetes, such as navigating YAML and understanding complex concepts like affinity rules
|
| 8 |
+
• Companies need help with complex Kubernetes problems, not maintenance or on-call tasks
|
| 9 |
+
• Harder Kubernetes problems include on-premise installations, custom code development for health checks, and integrating secure technologies like AWS Nitro Enclaves
|
| 10 |
+
• Kubernetes has no single tool for managing clusters on bare metal like BOSH for Cloud Foundry
|
| 11 |
+
• Kubernetes is a "kumbaya DevOps model" where everyone needs to know everything, with blurred lines between operator and application developer responsibilities
|
| 12 |
+
• YAML is a common format for modeling complex software in Kubernetes
|
| 13 |
+
• Kubernetes can be too complex for small teams or startups
|
| 14 |
+
• The speaker suggests that fully managed platforms like Heroku or Fly.io are often a better choice than Kubernetes
|
| 15 |
+
• The litmus test is to "stay on fully managed platforms as long as you can"
|
| 16 |
+
• Docker played a crucial role in Kubernetes' success by standardizing the concept of containers
|
| 17 |
+
• Kubernetes would not have gained traction without Docker's influence and the subsequent hype surrounding it
|
| 18 |
+
• Relationship between Docker and Kubernetes, and whether knowledge of Docker is necessary for understanding Kubernetes
|
| 19 |
+
• Centralizing knowledge of crafting efficient Docker files as a team effort, rather than individual application developers learning it
|
| 20 |
+
• Importance of understanding Linux networking concepts when getting started with Kubernetes
|
| 21 |
+
• Using managed Kubernetes services (e.g. EKS, AKS, GKE) to simplify adoption and reduce complexity
|
| 22 |
+
• Avoiding unnecessary tooling and focusing on core functionality in order to minimize maintenance and upgrade issues
|
| 23 |
+
• The complexity and challenges of using Kubernetes for automation
|
| 24 |
+
• Importance of investing in education and training for engineers to understand the complexity of Kubernetes
|
| 25 |
+
• Need for internal platforms or tools to manage and automate resources within the cluster
|
| 26 |
+
• Role of automation in unlocking the value proposition of Kubernetes
|
| 27 |
+
• Benefits of hiring experts or finding partners with subject matter expertise in Kubernetes
|
| 28 |
+
• Discussion of the importance of debugging and understanding what is happening in the runtime environment, including the use of various tools such as Grafana Cloud, Honeycomb, and eBPF
|
| 29 |
+
• The concept of "Heroku-like" interfaces for developers to interact with Kubernetes without needing to understand its intricacies.
|
| 30 |
+
• Importance of observability and metrics in containerized environments
|
| 31 |
+
• Benefits and challenges of using Kubernetes, including cluster size and complexity
|
| 32 |
+
• Best practices for running stateless workloads in Kubernetes (many small clusters or homogenous workloads)
|
| 33 |
+
• Limitations and considerations for running stateful workloads in Kubernetes (smaller clusters, RDS)
|
| 34 |
+
• Running PostgreSQL as a stateful set in Kubernetes
|
| 35 |
+
• Avoiding managed services like RDS or CockroachDB for simplicity
|
| 36 |
+
• Single instance of Postgres without replication for low downtime
|
| 37 |
+
• Hourly full backups with restore within 2-3 minutes
|
| 38 |
+
• Trade-off between potential data loss and operational ease
|
| 39 |
+
• Managing large numbers of databases as stateful sets in Kubernetes can be problematic
|
| 40 |
+
• Never shipping products can make a startup faster
|
| 41 |
+
• Launching early increases complexity and slows down operations
|
| 42 |
+
• Delay Kubernetes adoption unless necessary, use managed platforms instead
|
| 43 |
+
• Using Kubernetes requires significant automation and education efforts
|
| 44 |
+
• Focusing on simplicity when using Kubernetes is essential to manage "innovation debt"
|
Is Kubernetes a platform?_summary.txt
ADDED
|
@@ -0,0 +1,91 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Tamer Saleh and Gerhard Lassil discuss their shared experience working in the same London office on Cloud Foundry
|
| 2 |
+
• They transition to discussing Kubernetes, its challenges, and their experience helping companies like Bloomberg and Shopify with DevOps problems
|
| 3 |
+
• Gerhard asks why companies need Kubernetes and what are the right reasons for choosing it
|
| 4 |
+
• Tamer's company, Super Orbital, offers engineering and training services to tackle hard Kubernetes and DevOps problems
|
| 5 |
+
• The conversation includes a humorous anecdote about table tennis culture at Pivotal and its decline with remote work
|
| 6 |
+
• Company has been fully remote since before the apocalypse, finding it easier to adapt
|
| 7 |
+
• Benefits of remote work include access to global talent and equal footing for all employees
|
| 8 |
+
• Remote work can also lead to cultural benefits by bringing people from different backgrounds together
|
| 9 |
+
• Cities are a strain on infrastructure and can create cultural divides; remote work can help flatten this divide
|
| 10 |
+
• Companies now see Kubernetes as necessary, rather than just interesting, with many seeking to implement it
|
| 11 |
+
• Challenges of implementing Kubernetes include its complexity, with many resource types and attributes to understand
|
| 12 |
+
• Kubernetes release cycle has slowed down to every three months
|
| 13 |
+
• Original authors of Kubernetes did not envision application developers directly using it
|
| 14 |
+
• Complexity of YAML in Kubernetes is significant and requires engineer knowledge
|
| 15 |
+
• Training for Kubernetes is a popular workshop topic due to complexity
|
| 16 |
+
• Customers struggle with on-premise installations, targeting 80% market share through Kubernetes
|
| 17 |
+
• Going on-premise is challenging, even with Kubernetes substrate, due to lack of telemetry and control
|
| 18 |
+
• Highly regulated customers require custom code development for health checks and security
|
| 19 |
+
• Integrating EKS with Nitro was challenging but successful
|
| 20 |
+
• Comparison of Cloud Foundry to Kubernetes in terms of management complexity
|
| 21 |
+
• Discussion of Bosch, a tool used for managing Cloud Foundry, and its similarities to Terraform and Ansible
|
| 22 |
+
• Explanation of the "great wall DevOps model" vs. the "kumbaya DevOps model"
|
| 23 |
+
• Observations on the use of YAML in Kubernetes and potential future changes
|
| 24 |
+
• General discussion of Kubernetes' ubiquity and ability to handle complexity
|
| 25 |
+
• Complex software modeling with Kubernetes
|
| 26 |
+
• Maturity level needed for data services
|
| 27 |
+
• Ubiquity of Kubernetes and its expected use
|
| 28 |
+
• Finding the right combination of objects or products in Kubernetes ecosystem
|
| 29 |
+
• Complexity and beauty of building blocks in Kubernetes community
|
| 30 |
+
• Trade-offs between using Kubernetes and other platforms for small teams
|
| 31 |
+
• Analogy between Linux on laptop experience and Kubernetes adoption
|
| 32 |
+
• Recommendation to stay on fully managed platforms for as long as possible
|
| 33 |
+
• Discussion of provisioning raw instances vs Kubernetes
|
| 34 |
+
• Importance of standardization in container technology
|
| 35 |
+
• Docker's role in popularizing containers and enabling Kubernetes' success
|
| 36 |
+
• History of container technology, including early versions like Solaris Zones and FreeBSD Jails
|
| 37 |
+
• Kubernetes' adoption and growth due to community excitement around Docker
|
| 38 |
+
• The speaker discusses how Kubernetes and Docker are often confused as being the same thing
|
| 39 |
+
• Docker is no longer a dependency for Kubernetes, but its standard is still used
|
| 40 |
+
• Understanding Docker concepts, such as container runtimes, is necessary to grasp Kubernetes
|
| 41 |
+
• Application developers don't need to be experts in crafting Dockerfiles, but rather understand the basics of Docker Compose and command-line tools
|
| 42 |
+
• Centralizing expertise in Dockerfile creation can help teams use Kubernetes effectively
|
| 43 |
+
• It's possible to use Kubernetes without a deep understanding of Docker
|
| 44 |
+
• The speaker shares their personal experience with starting with Docker before learning Kubernetes
|
| 45 |
+
• Importance of understanding Linux networking and general networking concepts for Kubernetes
|
| 46 |
+
• Use of managed Kubernetes services (EKS, AKS, GKE) over self-managed clusters due to cost and ease of use
|
| 47 |
+
• Risks and complexities associated with additional tooling such as Istio
|
| 48 |
+
• Need for restraint when adding new components or tools to a cluster
|
| 49 |
+
• Importance of understanding networking before diving into advanced features like Istio
|
| 50 |
+
• Examples of essential components (cert manager) versus nice-to-have components (Helm)
|
| 51 |
+
• Potential pitfalls in cluster management, including upgrade complexities and resource splitting
|
| 52 |
+
• Using Helm charts for internal applications is tedious and can be handled by simpler tools
|
| 53 |
+
• Automation is key when using Kubernetes, not just for cluster management but also for resource management within the cluster
|
| 54 |
+
• Investing in automation will save time and money in the long run
|
| 55 |
+
• Teams should focus on building an internal automation system, including CI/CD pipelines and GitOps
|
| 56 |
+
• Hiring experts or partnering with companies that specialize in Kubernetes can be beneficial to avoid wasted time and resources
|
| 57 |
+
• The importance of education for engineers when working with Kubernetes and cloud native technologies.
|
| 58 |
+
• The need for automation in the world of Kubernetes and cloud native.
|
| 59 |
+
• The spectrum of internal platforms, from simple Docker file management to full Heroku-style interfaces.
|
| 60 |
+
• The challenges of debugging and understanding complex systems like Kubernetes.
|
| 61 |
+
• The benefits of having multiple tools and services for monitoring and logging, such as Grafana Cloud and Honeycomb.
|
| 62 |
+
• Importance of observability in understanding application behavior
|
| 63 |
+
• EBPF and Pixie for deep insights into system performance
|
| 64 |
+
• Redundancies and failovers to minimize downtime
|
| 65 |
+
• Debugging challenges and the need for visibility into complex systems
|
| 66 |
+
• Observability and metrics as crucial investments, especially with Kubernetes
|
| 67 |
+
• The difficulty of building observability infrastructure without automation tools
|
| 68 |
+
• Feeding observability data back into automation for automated rollouts and error detection
|
| 69 |
+
• Simplifying Kubernetes setup through public sharing of configuration and components
|
| 70 |
+
• Inefficiencies in IT teams lead to wasted resources (20% CPU and memory usage)
|
| 71 |
+
• CIOs seek to reduce infrastructure costs by consolidating VMs into one massive cluster
|
| 72 |
+
• Kubernetes adoption was initially driven by cost savings, but operators saw benefits in its API and extensibility
|
| 73 |
+
• Operators found that large clusters can be difficult to manage and upgrade, leading to the concept of "fleets" (small, homogeneous clusters)
|
| 74 |
+
• Running small clusters per availability zone or workload type improves manageability and reduces costs
|
| 75 |
+
• Stateful workloads pose challenges for Kubernetes and should be handled with caution, either by externalizing databases or using teams to manage them
|
| 76 |
+
• Issues with PostgreSQL replication and networking
|
| 77 |
+
• Use of Crunchy data and Zalanda operators
|
| 78 |
+
• Comparison of managed vs self-managed PostgreSQL services
|
| 79 |
+
• Data backup and restore procedures
|
| 80 |
+
• Downtime and availability considerations for single instance PostgreSQL
|
| 81 |
+
• Trade-offs between feature complexity and simplicity in system design
|
| 82 |
+
• Serving stale content when origin is down
|
| 83 |
+
• Managed services for databases vs running own infrastructure
|
| 84 |
+
• Pitfalls of running multiple stateful sets in Kubernetes
|
| 85 |
+
• Technical debt and complexity associated with scaling database operations
|
| 86 |
+
• Importance of launching when necessary, rather than prematurely adopting complex solutions
|
| 87 |
+
• Delay Kubernetes adoption as long as possible
|
| 88 |
+
• Use existing managed platforms instead of managing Kubernetes installations
|
| 89 |
+
• Focus on automation and education when adopting Kubernetes
|
| 90 |
+
• Be prepared to spend "innovation points" on learning and implementing Kubernetes
|
| 91 |
+
• Kubernetes is more complicated than expected, with many configuration options and best practices.
|
It's crazy and impossible_summary.txt
ADDED
|
@@ -0,0 +1,42 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Apple's goal is not to overtake PC market share, but to make the best personal computers at affordable prices
|
| 2 |
+
• Steve Jobs' decision to drop out of college was one of the best decisions he ever made
|
| 3 |
+
• He dropped in on a calligraphy class at Reed College, which influenced the design of the Macintosh computer
|
| 4 |
+
• Jobs believed that you can't connect the dots looking forward, but only in hindsight; trusting your heart and destiny is key
|
| 5 |
+
• The first iMac G3 had a lasting impact on Gerhard Lazu's life, introducing him to Apple products
|
| 6 |
+
• Steve Jobs discussed his adoption story and how it influenced his decision to attend college
|
| 7 |
+
• He shared the importance of design and typography, specifically the font rendering on Mac devices
|
| 8 |
+
• Evolution of computing from large mainframe computers to personal computers
|
| 9 |
+
• Invention of the fractional horsepower electric motor as a precursor to personal computers
|
| 10 |
+
• Comparison of human efficiency with other animals, highlighting humans' ability to create tools that amplify their abilities
|
| 11 |
+
• Importance of starting with customer needs and working backwards to technology development
|
| 12 |
+
• Role of vision and passion in driving innovation, but also the need for focus and prioritization
|
| 13 |
+
• Characteristics of good engineering management, including clear decision-making processes and a focus on empowerment rather than direction.
|
| 14 |
+
• Managing complexity and knowing when to stop adding features or personnel
|
| 15 |
+
• Importance of good leadership and having a clear vision
|
| 16 |
+
• Eliminating unnecessary code and focusing on quality over quantity
|
| 17 |
+
• Measuring productivity through outcomes rather than metrics such as lines of code written
|
| 18 |
+
• Self-managing teams and promoting a culture of learning from mistakes
|
| 19 |
+
• Importance of recruiting great people and giving them the autonomy to do their job
|
| 20 |
+
• The value of asking for help and being willing to fail in order to learn and grow
|
| 21 |
+
• Apple's organizational structure is like a startup, with a flat hierarchy and weekly meetings among top executives to discuss everything.
|
| 22 |
+
• Teamwork and trust are key at Apple, allowing employees to work together effectively and bring new ideas to the table.
|
| 23 |
+
• Steve Jobs emphasizes the importance of letting employees make decisions and own their projects to foster innovation and learning.
|
| 24 |
+
• Apple's strategy is to be both a hardware and software company, with the direct sales force being essential for innovative products that require education and demonstration.
|
| 25 |
+
• Apple's greatest strength is its vertical integration, allowing it to control product design from end-to-end and tackle complex problems faster than competitors.
|
| 26 |
+
• Software is seen as Apple's competitive advantage, while hardware churns too quickly to provide a sustainable edge.
|
| 27 |
+
• Remote work and remote hosts
|
| 28 |
+
• Concept of technology windows opening and closing
|
| 29 |
+
• Importance of having a well-oiled shipping machine (supply chain) for fast production and market adoption
|
| 30 |
+
• Collaboration between engineering and manufacturing teams, with shared databases and processes
|
| 31 |
+
• Eliminating waste in the production process by reusing technologies and not changing them mid-production
|
| 32 |
+
• The importance of having real-time quality feedback to address manufacturing defects
|
| 33 |
+
• The drawbacks of traditional inventory management and warehouses, and the benefits of Just-In-Time (JIT) manufacturing
|
| 34 |
+
• The concept of viewing companies from a manufacturing perspective on a scale from Stage 1 (manufacturing as a necessary evil) to Stage 5 (manufacturing as an opportunity for competitive advantage)
|
| 35 |
+
• Apple's approach to manufacturing, including hiring software engineers to view factory operations as a software problem and designing custom robots and automation systems
|
| 36 |
+
• The importance of passion, talent scouting, and building a strong team in achieving success
|
| 37 |
+
• The value of treating creativity with reverence and allowing ideas to be fragile and barely-formed, rather than being compromised or dismissed.
|
| 38 |
+
• The impact of Steve Jobs' vision on the company
|
| 39 |
+
• The importance of caring and civic responsibility in work
|
| 40 |
+
• Overcoming challenges and persevering through failures
|
| 41 |
+
• Celebrating the victory of beauty, purity, and giving a damn
|
| 42 |
+
• Personal anecdotes about working with Steve Jobs for nearly 15 years
|
Kaizen! Are we holding it wrong_summary.txt
ADDED
|
@@ -0,0 +1,66 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Celebrating 30 episodes of Ship It podcast
|
| 2 |
+
• Discussing the impact and journey of creating a podcast
|
| 3 |
+
• Reflecting on future plans for upcoming episodes (40+)
|
| 4 |
+
• Explaining GitOps approach to infrastructure management
|
| 5 |
+
• Analyzing an incident where "latest" tag caused problems with app container image
|
| 6 |
+
• Identifying need for revisiting GitOps approach
|
| 7 |
+
• Unsolved cases and mysterious events
|
| 8 |
+
• GitOps adoption and deployment strategies
|
| 9 |
+
• Using Argo CD for automating infrastructure reconciliations
|
| 10 |
+
• Importance of versioning manifests in repositories
|
| 11 |
+
• Push-based vs pull-based deployments
|
| 12 |
+
• Preventing issues with "latest" tags in Docker images
|
| 13 |
+
• Implementing continuous integration and delivery (CI/CD)
|
| 14 |
+
• Integration with Honeycomb for monitoring CDN behavior
|
| 15 |
+
• Implementing Honeycomb for observability and visibility into CDN behavior
|
| 16 |
+
• Leveraging Fastly's caching capabilities to improve performance
|
| 17 |
+
• Analyzing slow requests and identifying areas for optimization
|
| 18 |
+
• Discussing the impact of cache misses on user experience
|
| 19 |
+
• Examining the benefits and limitations of relying on a third-party CDN
|
| 20 |
+
• Discussion about CDN caching limitations
|
| 21 |
+
• Estimating storage needs in terabytes vs gigs
|
| 22 |
+
• Visibility into 99th percentile tail latency
|
| 23 |
+
• Law of diminishing returns in optimization efforts
|
| 24 |
+
• Apple Watches consuming MP3 files causing slow requests
|
| 25 |
+
• Suggesting static content be served from a CDN for faster access
|
| 26 |
+
• Implementing Fastly as a CDN for serving cache pages and files
|
| 27 |
+
• Troubleshooting issues with Fastly's performance and functionality
|
| 28 |
+
• Exploring ways to optimize Fastly usage and reduce "misses" on MP3 files
|
| 29 |
+
• Discussing the benefits of having more visibility into how Fastly works, including using Honeycomb for data analysis
|
| 30 |
+
• Setting up a dev environment on M1 Macs, specifically with changelog.com and Docker
|
| 31 |
+
• GitHub Codespaces discussed as an alternative to local development environments
|
| 32 |
+
• Equinix Metal and other cloud providers mentioned as potential alternatives to Azure-backed infrastructure
|
| 33 |
+
• GitPod and Tilde.dev mentioned as examples of alternative development platforms
|
| 34 |
+
• Discussion of potential collaboration with GitHub on Codespaces development
|
| 35 |
+
• Adam Stacoviak's preference for using Codespaces over setting up his own local dev environment
|
| 36 |
+
• Gerhard Lazu's idea of exploring a more configurable version of Codespaces in the future
|
| 37 |
+
• Planning for buffer time in scheduling
|
| 38 |
+
• Managing last-minute changes to podcast episodes
|
| 39 |
+
• Solutions for technical issues with GitHub Codespaces and Elixir/Postgres installation
|
| 40 |
+
• Using a temporary solution with an old machine until a new MacBook is available
|
| 41 |
+
• Update on moving uploads to cloud storage (S3) and deprioritizing tasks due to other commitments
|
| 42 |
+
• Investigating a mysterious bug in an Elixir/Phoenix application involving character encoding and URLs
|
| 43 |
+
• Discussing how to handle bugs in dependencies and the importance of staying up-to-date with the latest versions
|
| 44 |
+
• Describing the process of upgrading Phoenix from 1.5 to 1.6, including encountering API changes and breaking tests
|
| 45 |
+
• Refactoring a meta module after discovering that the upgrade broke metadata on all pages
|
| 46 |
+
• The concept of "yak shaving" and how it relates to solving problems and taking shortcuts
|
| 47 |
+
• The concept of a "yak shave" is discussed, referring to the phenomenon where upgrading or improving one aspect of a system leads to additional work and complexity
|
| 48 |
+
• The idea that sometimes it's necessary to "bite off more than you can chew" in order to make progress
|
| 49 |
+
• A discussion about being in a state of flow and how it can lead to significant productivity gains, even if the initial goal is not achieved
|
| 50 |
+
• Mention of several upcoming gifts or topics for future episodes, including:
|
| 51 |
+
• Using Crossplane to manage Kubernetes infrastructure
|
| 52 |
+
• Integrating with Honeycomb
|
| 53 |
+
• Exploring Dagger
|
| 54 |
+
• Parka
|
| 55 |
+
• Reflection on the evolution of the podcast's infrastructure and network over time
|
| 56 |
+
• The hosts discuss the importance of trying out various tools and sharing their experiences on the show
|
| 57 |
+
• Feedback from the podcast is shared with vendors, including Honeycomb and Crossplane
|
| 58 |
+
• The hosts emphasize the value of collaboration and giving feedback to improve tools and services
|
| 59 |
+
• The Ship It initiative is mentioned as a way for end-users to provide feedback to vendors
|
| 60 |
+
• Partnerships are discussed, with many companies being thanked for their support
|
| 61 |
+
• The hosts reflect on the show's journey and thank listeners for their participation
|
| 62 |
+
• Gerhard shares an extreme example of a yak shave, where he spent three weeks troubleshooting internet connection issues with multiple routers and internet connections.
|
| 63 |
+
• The group's initial attempts to discuss the issue are interrupted by laughter, but eventually they manage to compose themselves and explore the logistics and humor in Gerhard's situation.
|
| 64 |
+
• The conversation devolves into jokes about over-engineering and redundancy, with the group suggesting that Gerhard's experience is an extreme example of a principle often referenced in sci-fi (e.g. "why build one when you can build two?").
|
| 65 |
+
• The episode ends with a lighthearted tone, poking fun at Gerhard's dedication to solving his internet issues.
|
| 66 |
+
• The idea of redundancy and over-engineering becomes a recurring theme, with the group joking about Gerhard's need for multiple ISPs and routers.
|
Kaizen! Are we holding it wrong?_summary.txt
ADDED
|
@@ -0,0 +1,127 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Kaizen discussion and changelog compilation
|
| 2 |
+
• GitOps implementation challenges
|
| 3 |
+
• Using Honeycomb for question asking
|
| 4 |
+
• Jared's work on moving static files to S3-like object store
|
| 5 |
+
• Christmas gifts and upcoming episode themes
|
| 6 |
+
• Importance of GitHub Codespaces integration
|
| 7 |
+
• Backstage 20 release and Changelog 459 relation
|
| 8 |
+
• Partnership announcements (Fastly, LaunchDarkly, Linode)
|
| 9 |
+
• Fly platform promotion for global app deployment
|
| 10 |
+
• The conversation revolves around an incident that occurred and how it has been addressed
|
| 11 |
+
• The incident is related to a GitOps approach where unhealthy pods were put back into service using the "latest" tag
|
| 12 |
+
• The speaker explains that the latest tag refers to the most recent version, which can be problematic if the latest version is broken or outdated
|
| 13 |
+
• A tradeoff was made in the past by allowing corners to be cut for efficiency, but it failed once and now needs to be revisited
|
| 14 |
+
• The conversation turns to a need to revisit the GitOps approach and consider using fixed versions instead of "latest" to avoid similar incidents
|
| 15 |
+
• The speaker reflects on how they learned about the incident through investigation and analysis of the manifest
|
| 16 |
+
• They discuss the importance of capturing specific version numbers for apps and containers to avoid infinite loops or failures.
|
| 17 |
+
• Difficulty in handling unfinished TV shows and similar content
|
| 18 |
+
• Discussion of GitOps and its implementation
|
| 19 |
+
• Current lack of proper GitOps configuration in the system
|
| 20 |
+
• Need to use GitOps properly with tools like Argo CD
|
| 21 |
+
• Reviewing resources for learning about GitOps, including GitOps.org and WeWorks' website
|
| 22 |
+
• Understanding of push-based and pull-based deployment models
|
| 23 |
+
• Importance of following a standardized flow for deployments to prevent issues like using "latest" when it's broken
|
| 24 |
+
• Capturing production for recovery from disaster
|
| 25 |
+
• Importance of specific SHA (version) tagging in container images
|
| 26 |
+
• Incident where a "disaster" occurred due to a broken "latest" tag and continuity not being in place
|
| 27 |
+
• The role of caching and CDN in minimizing the impact of the incident
|
| 28 |
+
• Integration with Honeycomb for enhanced visibility into app behavior and interactions
|
| 29 |
+
• Resolving an issue related to slow MP3 requests using pull request/issue 383.
|
| 30 |
+
• Integration with Honeycomb provides detailed insights into CDN performance
|
| 31 |
+
• Observability features allow for slicing and dicing of data by various criteria, including top URLs, browser, user agent, country, and city
|
| 32 |
+
• Cache status and hit/miss rates can be viewed in detail, as well as audio request breakdowns
|
| 33 |
+
• Derived queries enable exploration of specific issues and root causes
|
| 34 |
+
• Slow requests and their impact on website performance are identified, with an example of a GIF taking 1.4 minutes to load due to its large size and need for travel to the data center
|
| 35 |
+
• Discussion of a large GIF file being served from Newark to Hong Kong and taking a long time to load
|
| 36 |
+
• Use of lazy loading to improve user experience by allowing content to be accessed while the image is still loading
|
| 37 |
+
• Issues with cache misses on Fastly CDN, including expired content not being cached indefinitely
|
| 38 |
+
• Limitations of current caching setup, including headers asking for content to be kept in CDN for a few weeks but it may expire when requested again
|
| 39 |
+
• Discussion of paying for caching service to keep all content cached globally
|
| 40 |
+
• Assessment of total assets and weight of content to determine feasibility of caching everything
|
| 41 |
+
• Discussion of latency and tail latency issues
|
| 42 |
+
• Idea to serve static content from CDN instead of own infrastructure
|
| 43 |
+
• Law of diminishing returns and slow clients consuming resources
|
| 44 |
+
• Need for optimization in serving non-cached content from CDN
|
| 45 |
+
• Requesting Fastly to cache content indefinitely
|
| 46 |
+
• Imposter syndrome due to feeling like not using CDN correctly
|
| 47 |
+
• The speaker is frustrated with the performance of their CDN, specifically Fastly
|
| 48 |
+
• They discuss how long-term content is not being cached as expected
|
| 49 |
+
• They mention that they are a media company with static content that doesn't change often
|
| 50 |
+
• They express confusion about why the CDN is not working as intended despite following best practices
|
| 51 |
+
• They suggest that there may be issues within the CDN itself or its configuration that need to be addressed
|
| 52 |
+
• They propose reaching out to Fastly for further assistance and collaboration.
|
| 53 |
+
• Discussion of a high number of misses in MP3 file delivery
|
| 54 |
+
• Importance of data visibility and the impact of having "hard facts" with Honeycomb integration
|
| 55 |
+
• Conversation about Fastly's functionality and how it handles misses
|
| 56 |
+
• Reference to LaGuardia and Hong Kong locations, possibly related to edge caching or CDN configuration
|
| 57 |
+
• Explanation of Incident.io and its role in incident management within Slack
|
| 58 |
+
• Promotion of Raygun for performance monitoring and user insights
|
| 59 |
+
• Personal anecdote about setting up new M1 Macs
|
| 60 |
+
• Discussing challenges with setting up M1 Mac for changel.com development environment
|
| 61 |
+
• Considering alternatives to Docker and GitHub Code Spaces
|
| 62 |
+
• Wanting to run own infrastructure on Equinix Metal or Linode
|
| 63 |
+
• Concerns about cost and simplicity of GitHub Code Spaces
|
| 64 |
+
• Understanding GitHub's infrastructure and lack of agnosticism in dev environments
|
| 65 |
+
• Suggesting alternative cloud spaces options, such as Gitpod
|
| 66 |
+
• The speaker wants to discuss using GitHub Code Spaces for development environments.
|
| 67 |
+
• They mention wanting to partner with GitHub and have them sponsor Changelog's use of Code Spaces.
|
| 68 |
+
• The speaker prefers using a pre-built, automated dev environment over setting up their own local machine.
|
| 69 |
+
• They express frustration with managing upgrades on their local machine and the potential for conflicts between personal projects and work-related development environments.
|
| 70 |
+
• The speaker considers an electric vehicle analogy to describe their desire for a "prescribed dev space" that is easy to use and doesn't require them to manage upgrades or configurations.
|
| 71 |
+
• They discuss the importance of identity and access control in such a dev environment.
|
| 72 |
+
• A short-term solution suggested is using Code Spaces as it currently exists, with the hope of future improvements.
|
| 73 |
+
• Discussion of using GitHub Code Spaces as a solution for the Changelog app
|
| 74 |
+
• Comparison with Gitpod and Equinix Metal
|
| 75 |
+
• Planning for a future episode on GitHub Code Spaces in December
|
| 76 |
+
• Short-term solution: brew install Elixir, brew install Postgres, clone the repo (rejected)
|
| 77 |
+
• Alternative short-term solution: use Code Spaces wrapped in a bow (GitHub-provided infrastructure)
|
| 78 |
+
• Shipping delays for new MacBooks
|
| 79 |
+
• Using old machines as a temporary solution
|
| 80 |
+
• Uploading to cloud storage (specifically S3)
|
| 81 |
+
• Prioritizing tasks due to limited time and GitHub issues
|
| 82 |
+
• Bug fix: newsletter links proxy encodes special URLs with HTML instead of percent based
|
| 83 |
+
• Apostrophe in URL causing encoding issue
|
| 84 |
+
• The speaker is investigating an issue with a web framework, specifically Elixir Phoenix, where an apostrophe in a URL is causing HTML encoding instead of URL encoding.
|
| 85 |
+
• They consider it a dependency issue and seek advice on how to proceed from Gerhard.
|
| 86 |
+
• Gerhard suggests checking for issues in the repository, looking at code changes around the problem area, and opening an issue if necessary.
|
| 87 |
+
• The speaker questions whether this is actually a bug or just expected behavior.
|
| 88 |
+
• They decide to upgrade all dependencies, including Phoenix, rather than addressing the specific issue directly.
|
| 89 |
+
• The upgrade process reveals breaking changes in the new version of Phoenix that were not anticipated by the speaker.
|
| 90 |
+
• Upgrading from Phoenix 1.5 to 1.6 caused issues with API changes
|
| 91 |
+
• Two specific keys in the "assigns" data bag were removed: view module and view template
|
| 92 |
+
• The removal caused metadata issues on the entire site, including Twitter embeds and third-party integrations
|
| 93 |
+
• The developer had to refactor the meta module and fix several hours of work
|
| 94 |
+
• A yak was shaved (in a humorous analogy)
|
| 95 |
+
• Upgrading or replacing Ingress Nginx with Traffic
|
| 96 |
+
• External DNS management
|
| 97 |
+
• Honeycomb Agent and other agents' setup
|
| 98 |
+
• The yak shaving problem: getting stuck in a cycle of small tasks leading to more work
|
| 99 |
+
• State of flow and perseverance in completing tasks
|
| 100 |
+
• Overconsumption of time on non-priority tasks during a state of flow
|
| 101 |
+
• Mention of multiple gifts and projects
|
| 102 |
+
• Discussion of using cross-plane to manage infrastructure
|
| 103 |
+
• Benefits of integrating various tools, including Dagger and Honeycomb
|
| 104 |
+
• Importance of giving feedback to improve products
|
| 105 |
+
• Storytelling approach in the podcast and its benefits
|
| 106 |
+
• Connection between the creators and users of certain projects (e.g. Solomon Hikes)
|
| 107 |
+
• Reflection on the "circle of life" and serendipity in collaborations
|
| 108 |
+
• Discussing feedback and suggestions for various tools, including Honeycomb, Dagger, Crossplane, and Grafana Cloud
|
| 109 |
+
• Importance of observability in the CDN and its benefits
|
| 110 |
+
• Concept of "an and proposition" rather than "either or" when choosing tools with different strengths and weaknesses
|
| 111 |
+
• Understanding trade-offs between different tools and not looking for a single "perfect" tool
|
| 112 |
+
• Upcoming episodes and topics, including contributions from Echoes initiative
|
| 113 |
+
• Discussion of user experience and the importance of a patient and knowledgeable approach
|
| 114 |
+
• Introduction to Kaizen and its application in improving processes
|
| 115 |
+
• Expression of gratitude to team members, listeners, and partners
|
| 116 |
+
• Announcement of future plans for the podcast and community
|
| 117 |
+
• Promotion of the changelog.com website and community
|
| 118 |
+
• Closing remarks and preview of upcoming episodes
|
| 119 |
+
• The show's previous recording was cut due to a humorous and uncontrollable break caused by Gerhard's reaction to Jared's yak shave story.
|
| 120 |
+
�� Gerhard spent three weeks resolving his home network setup issues with multiple routers, internet connections, and physical installations.
|
| 121 |
+
• He now has two fiber connections, two ISPs, and additional holes in his walls.
|
| 122 |
+
• The conversation focuses on the absurdity and dedication required for such an extreme case of yak shaving.
|
| 123 |
+
• Discussion of WAN connections and network setup
|
| 124 |
+
• Mention of budgeting and new equipment purchases
|
| 125 |
+
• Use of specific software tools, including Gitpod and Codefaces
|
| 126 |
+
• Reference to movie "Contact" and the phrase "you can never have too many"
|
| 127 |
+
• Humorous exchange about wanting multiple copies of a person (Gerhard's wife)
|
Kaizen! Five incidents later_summary.txt
ADDED
|
@@ -0,0 +1,48 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Discussing the second Kaizen series, 2.5 months after episode 10
|
| 2 |
+
• Reviewing an incident involving DNSimple tokens and Cert Manager
|
| 3 |
+
• Using Incident.io for incident management and tracking
|
| 4 |
+
• Integrating Incident.io with Slack for easier access to past incidents
|
| 5 |
+
• Sharing knowledge and distributing incident information between team members
|
| 6 |
+
• Discussion of incident management and how the team uses an incident platform
|
| 7 |
+
• Explanation of how /inc command creates an incident in Slack
|
| 8 |
+
• Story about Oban, a background job processing library for Elixir, and its integration with the codebase
|
| 9 |
+
• Review of PR#378, which improved the use of Oban and reduced dependencies
|
| 10 |
+
• Discussion of the importance of testing system reliability and documentation of incidents
|
| 11 |
+
• Deployment process insufficiency led to a pod being put into service even though it was unhealthy
|
| 12 |
+
• The unhealthy pod caused the origin server to return 503 responses, resulting in a degraded experience for some users
|
| 13 |
+
• The incident affected only logged-in users who tried to access certain endpoints or pages
|
| 14 |
+
• The company took steps to improve redirects at the edge and reduce health check frequency after the incident
|
| 15 |
+
• The team implemented HTTPS everywhere and removed www redirects in favor of apex domain redirects
|
| 16 |
+
• Technical difficulties with www redirects
|
| 17 |
+
• Fastly configuration issues causing Safari redirect problems
|
| 18 |
+
• Testing in production and scripting requests to hit endpoints
|
| 19 |
+
• DNSimple findings and experimentation gone wrong
|
| 20 |
+
• Debugging as a detective who is also the murderer ( referencing a quote by Filipe Fortes)
|
| 21 |
+
• Discussion of extra domains used for testing
|
| 22 |
+
• Ping Pong domain reference to Erlang and infrastructure management
|
| 23 |
+
• Gerhard Lazu discusses his connection to Switzerland and the domain "lazu.ch"
|
| 24 |
+
• The discussion shifts to ClickOps and the importance of version control and GitOps for Fastly configuration
|
| 25 |
+
• Gerhard shares his experience with experimenting with Fastly and finding it difficult due to its ClickOps nature
|
| 26 |
+
• The conversation turns to recent incidents on Upbound Cloud, including Linode networking issues and LKE unavailability
|
| 27 |
+
• Gerhard discusses the reliability of backups and restores during networking issues, particularly with CockroachDB and Fly PostgreSQL
|
| 28 |
+
• Discussing network downtime and reliability
|
| 29 |
+
• Using Fly to run multiple instances of an app in different regions
|
| 30 |
+
• Limitations of local storage (block storage) vs S3-compatible APIs
|
| 31 |
+
• Planning for multi-region deployments
|
| 32 |
+
• Switching from Arc to Waffle for file uploads
|
| 33 |
+
• Errors in Sentry related to Erlang 24 upgrade
|
| 34 |
+
• Discussion of Erlang version upgrades and potential improvements
|
| 35 |
+
• Twitter Auth issues and consideration to remove or fix feature
|
| 36 |
+
• Ecto.Query.CastError errors, specifically related to podcast unsubscription route
|
| 37 |
+
• Analysis of error data in Getsentry and discussion of its features
|
| 38 |
+
• Proposal for handling robot-generated unsubscribe requests
|
| 39 |
+
• The team is having trouble receiving emails for new issues with Sentry
|
| 40 |
+
• Ownership rules in Sentry may be a solution to automatically assign new issues to the right people
|
| 41 |
+
• Weekday vs weekend error patterns are being discussed, with an interesting anomaly of high errors on weekends instead of weekdays
|
| 42 |
+
• Plans for episode 30, including exploring alternatives to their current infrastructure setup (Fly.io and Elixir)
|
| 43 |
+
• Integrating Honeycomb is mentioned as a priority, with Jerod Santo suggesting testing its integration and reporting back
|
| 44 |
+
• NGINX performance metrics discussed, including 90th and 95th percentile times
|
| 45 |
+
• Long tail requests taking over a minute to service
|
| 46 |
+
• Importance of reliability and robustness in software, particularly for Changelog app
|
| 47 |
+
• Goal of continuous improvement (Kaizen) for infrastructure and business progress
|
| 48 |
+
• Upcoming T-shirt design featuring Japanese characters representing Kaizen
|
Kaizen! The day half the internet went down_summary.txt
ADDED
|
@@ -0,0 +1,59 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Kaizen: a concept of continuous self-improvement
|
| 2 |
+
• Reflecting on improvements for the show's application and setup every 10 episodes
|
| 3 |
+
• Importance of retroactive feedback loops in improving infrastructure
|
| 4 |
+
• Past improvement process: sharing changes once per year, but now aiming to improve more frequently
|
| 5 |
+
• Recent issues with Fastly CDN, including a global outage affecting multiple services (BBC, emojis, etc.)
|
| 6 |
+
• Reviewing the impact of the outage on Changelog's performance and plans for future improvements
|
| 7 |
+
• Discussion about Grafana and internet downtime
|
| 8 |
+
• Incident where Fastly had an outage during the release of a popular episode of The Changelog
|
| 9 |
+
• Importance of redundancy and double-monitoring systems (e.g. using Pingdom as backup)
|
| 10 |
+
• Debate on whether to rely on Fastly for stats or have a redundant system
|
| 11 |
+
• Exploring options for multi-cloud and service-level solutions
|
| 12 |
+
• Gerhard's idea to use Cloudflare AND Fastly, decouple assets from local storage, and run multiple instances of Changelog across different services (e.g. Linode, Render, Fly)
|
| 13 |
+
• Discussion on the costs and benefits of implementing redundancy
|
| 14 |
+
• Discussion of using MaxMind or GeoIP database for geolocation data
|
| 15 |
+
• Review of Cloudflare's analytics capabilities and potential benefits of multi-CDN setup
|
| 16 |
+
• Long-term direction for the platform, potentially including multi-CDN and improved analytics
|
| 17 |
+
• Immediate tasks to be done on the platform, including managing incidents and creating a plan for incident response
|
| 18 |
+
• Current incident: deleted DNS token causing certificate issues, requiring immediate attention
|
| 19 |
+
• Discussion of activity logs and importance for services with multiple users, with a need for more than 30 days of history
|
| 20 |
+
• Incidents: Token deletion on June 19th was suspected to be an anomaly due to unusual time.
|
| 21 |
+
• Investigation: Discussion on how to investigate and identify who deleted the token.
|
| 22 |
+
• Incident Management: Exploring ways to improve incident management, including consensus-based deletion of access tokens.
|
| 23 |
+
• DNSimple Configuration: Reviewing DNSimple configuration and considering using Kubernetes to manage tokens.
|
| 24 |
+
• Monitoring and Alerts: Discussing the need for proactive monitoring and alerts to catch issues before they cause problems.
|
| 25 |
+
• Incident management and its elements
|
| 26 |
+
• Runbooks as a way to codify incident response steps
|
| 27 |
+
• Importance of automation vs ROI for small teams
|
| 28 |
+
• Use of incident management platforms such as FireHydrant and Incident.io
|
| 29 |
+
• Creating runbooks retrospectively after incidents occur
|
| 30 |
+
• Benefits of using incident management platforms to store and retrieve runbooks
|
| 31 |
+
• Creating backup plans in case of catastrophic failures
|
| 32 |
+
• The hosts discuss their testing process for backups and restoration
|
| 33 |
+
• Importance of pursuing knowledge and sharing content over ensuring uptime at all costs
|
| 34 |
+
• Exploring different platforms (Incident.io, FireHydrant, Render, Fly) for running Changelog and potential benefits/disadvantages
|
| 35 |
+
• Discussing the importance of trying new things and innovating, even if some ideas may fail
|
| 36 |
+
• Mention of setting up incident management and Fastly logging integration for improved visibility and monitoring
|
| 37 |
+
• Difficulty in setting up Fastly logging due to lack of direct integration with Grafana Cloud
|
| 38 |
+
• Discussion of integrating Honeycomb with Fastly and Grafana Cloud
|
| 39 |
+
• Goal to visualize and reduce deployment time from git push to production
|
| 40 |
+
• Analysis of current pipeline inefficiencies and potential for smartening it up
|
| 41 |
+
• Cache invalidation problems associated with optimizing deployment processes
|
| 42 |
+
• Mention of Charity Majors' "15 minutes or bust" goal for code deployment time
|
| 43 |
+
• Reducing complexity in software development
|
| 44 |
+
• Optimizing performance for slow tasks (15-minute delays)
|
| 45 |
+
• Visualizing and understanding the steps involved in these tasks using Honeycomb
|
| 46 |
+
• Migrating from local disk storage to a managed PostgreSQL database or alternative solutions like CockroachDB
|
| 47 |
+
• Moving media assets to an S3 object store to improve restore times and scalability
|
| 48 |
+
• Simplifying the app by making it stateless and leveraging cloud capabilities
|
| 49 |
+
• Potential for unlocking new features with S3 and unmanaged database
|
| 50 |
+
• Chaptering functionality in podcast episodes, including ID3v2 support and FFmpeg integration
|
| 51 |
+
• Motivation to "bite off" chaptering feature as a win, along with stateless capability
|
| 52 |
+
• Pre-processing chapters locally vs. relying on FFmpeg
|
| 53 |
+
• Comparison of YouTube video segments and desired Changelog audio features
|
| 54 |
+
• Client-side compatibility and benefits for indie podcast app developers
|
| 55 |
+
• Automatic file upload and drag-and-drop functionality for blog posts
|
| 56 |
+
• Discussion of pushing podcast boundaries
|
| 57 |
+
• Importance of collaboration on improvement ideas
|
| 58 |
+
• Proposing to implement improvements and revisit in 10 episodes
|
| 59 |
+
• Reference to the concept of "kaizen" (continuous improvement)
|
Learning from incidents_summary.txt
ADDED
|
@@ -0,0 +1,47 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Incident.io: a platform for whole organizations to get involved in incident response
|
| 2 |
+
• Importance of incident response due to increased customer expectations and choice
|
| 3 |
+
• Current tooling has not kept pace with how people operate, leading to poor incident response solutions
|
| 4 |
+
• Incident.io's goal is to provide a structured, automated way to manage incidents, allowing teams to focus on the problem rather than the process
|
| 5 |
+
• Ideal incident workflow involves core defaults with customizable features for each company's specific needs
|
| 6 |
+
• Key principles of good incident response include:
|
| 7 |
+
+ Keeping context all in one place
|
| 8 |
+
+ Clear roles and responsibilities
|
| 9 |
+
+ Structured coordination and communication
|
| 10 |
+
+ Good internal and external communication
|
| 11 |
+
• Incident.io's goal is to provide an opinionated tool for incident response, building on core principles rather than being highly customizable.
|
| 12 |
+
• The company aims to create a scalable solution by focusing on essential features while allowing for extensions and integrations.
|
| 13 |
+
• The product has its roots in the experiences of Chris Evans, who worked on a basic solution at Monzo to simplify on-call processes.
|
| 14 |
+
• Incident.io was inspired by the limitations of existing tools, which often have "rough edges" due to no one owning or maintaining them.
|
| 15 |
+
• The company's founders drew from their experience working with complex systems and incidents in finance and e-commerce.
|
| 16 |
+
• The simplicity of Incident.io is intentional and reflects the company's focus on ease of use.
|
| 17 |
+
• The product's core feature allows users to create incidents with minimal onboarding, using one slash command or message shortcut in Slack.
|
| 18 |
+
• Incident.io uses an "osmosis" approach, where users are encouraged to learn by doing, and are given pointers and nudges as they progress.
|
| 19 |
+
• The company has a unique advantage in building the product because its founders knew what features they wanted from experience with similar problems at Monzo.
|
| 20 |
+
• Incident.io is used within the company for various use cases, including service outages, complicated bugs, and low-severity incidents to leave a trail of thought process and understanding.
|
| 21 |
+
• Using Incident.io for these types of incidents has benefits such as leaving a good trail for others to follow and acting as a structured way to hand over work.
|
| 22 |
+
• Discussion of using Incident.io for incident management and response
|
| 23 |
+
• Importance of having a low-cost entry point for reporting incidents
|
| 24 |
+
• Benefits of using a structured approach to handling incidents, including ease of escalation and communication with customers
|
| 25 |
+
• Statistics on the number of incidents reported and severity levels (91 total incidents, 8 major severity incidents over a year)
|
| 26 |
+
• Explanation of incident severity levels (critical, major, minor) and how they are used in Incident.io
|
| 27 |
+
• Discussion of organizational change and acceptance of incidents as opportunities for team assembly and problem-solving
|
| 28 |
+
• Overview of Incident.io's production setup, including use of Go app on Heroku and cloud providers for infrastructure management
|
| 29 |
+
• Monolithic Go binary architecture
|
| 30 |
+
• Service-based internal structure
|
| 31 |
+
• Asset handling through Go binary and Netlify
|
| 32 |
+
• Image serving complexity with Slack
|
| 33 |
+
• Feature flag management for testing new features
|
| 34 |
+
• Public product roadmap and community engagement for customer feedback
|
| 35 |
+
• Prioritization of feature development based on customer input
|
| 36 |
+
• Consideration of runbooks as a future feature
|
| 37 |
+
• Clarifying the concept of runbooks and their relationship to incident management
|
| 38 |
+
• Discussing the idea of capturing steps taken during incidents as knowledge to be reused
|
| 39 |
+
• Exploring how Incident.io's structure for storing information can help with incident analysis and recommendations
|
| 40 |
+
• Considering the integration of monitoring tools and data into Incident.io's system
|
| 41 |
+
• Emphasizing the importance of simplicity in product development and focusing on the 80% use case
|
| 42 |
+
• Sharing favorite blog posts, including one about learning from incidents in Formula 1 and another called "Incidents are for everyone"
|
| 43 |
+
• Current tooling is focused on engineers, not other teams such as customer support or executives
|
| 44 |
+
• Incidents involve multiple teams beyond engineering and require a more comprehensive approach
|
| 45 |
+
• Incident.io aims to build a tool that caters to the needs of non-engineering teams
|
| 46 |
+
• Simplifying and condensing complex information to facilitate communication between teams
|
| 47 |
+
• Learning from failure is key, and embracing incidents as opportunities for growth and improvement
|
Let's Ship It!_summary.txt
ADDED
|
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• The show Ship It aims to get ideas into the world through experimentation
|
| 2 |
+
• Great teams make great engineers, not the other way around
|
| 3 |
+
• Dave Farley's approach of assuming one is wrong and testing ideas is effective
|
| 4 |
+
• Experimentation is demonstrated on the show's open source podcasting platform
|
| 5 |
+
• A hammer analogy illustrates the value of learning from failure
|
Money flows rule everything_summary.txt
ADDED
|
@@ -0,0 +1,50 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Gerhard Lazu recalls being fascinated by Docker when it first came out in 2014
|
| 2 |
+
• Ian Miell remembers giving a talk about Docker at OpenBet and realizing its transformative potential for engineers
|
| 3 |
+
• Ian used Docker to containerize a 15-year-old monolith, saving time and making it easier for engineers to work on different applications
|
| 4 |
+
• The two met at a meetup or conference related to DevOps and containers in London
|
| 5 |
+
• They exchanged emails after the meetup but lost touch until years later when they met again and discovered new common interests and projects
|
| 6 |
+
• The speaker shares their experience of using Docker in a previous company, resulting in significant time savings for developers.
|
| 7 |
+
• Ian Miell discusses the importance of feeling uncomfortable or challenged at work (about 30% of the time) as a sign of growth and learning.
|
| 8 |
+
• He elaborates on his transition from a narrow domain to working in infrastructure at Barclays, where he faced new challenges and opportunities for development.
|
| 9 |
+
• The speaker reflects on writing the Docker in Practice book and subsequent editions, as well as creating self-published books like Git the Hard Way.
|
| 10 |
+
• The speaker's experience with Git repositories and explaining complex concepts to others led to the creation of a course and book on Git.
|
| 11 |
+
• The speaker has self-published several books using the "Hard Way" method inspired by Zed Shaw's writing style.
|
| 12 |
+
• The benefits of self-publishing include greater control and higher royalty rates, but also require discipline and organization.
|
| 13 |
+
• The speaker's career goals are shifting towards management and consulting, and they see book writing as a way to increase their credibility.
|
| 14 |
+
• The topic for the episode "Follow the money" refers not to personal wealth, but rather the flow of money within organizations and how it relates to technology and organizational structure.
|
| 15 |
+
• The importance of team organization and agility in software development
|
| 16 |
+
• Marxist ideas on the material base determining the superstructure (culture)
|
| 17 |
+
• Different ways organizations think about investment and maintenance
|
| 18 |
+
• Connection between accounting practices and organizational structure
|
| 19 |
+
• "Follow the money" approach to understanding organizational issues
|
| 20 |
+
• Agile accounting as an alternative to traditional yearly cycle
|
| 21 |
+
• Conway's Law and its implications for organization structure
|
| 22 |
+
• Importance of communication between engineers, accountants, and management in understanding financial flows.
|
| 23 |
+
• Opaqueness in business: lack of transparency about financial metrics
|
| 24 |
+
• Measuring value generated by teams and justifying revenue
|
| 25 |
+
• Agile methodology vs. actual change: companies think adopting Agile solves problems without addressing underlying issues
|
| 26 |
+
• Importance of practical thinking and hands-on approach to address company's money flows and value creation
|
| 27 |
+
• Need for a holistic approach in business, considering multiple factors beyond individual areas of expertise
|
| 28 |
+
• Holistic thinking is crucial for software development success
|
| 29 |
+
• Traditional "front-loaded" platforms require significant upfront investment
|
| 30 |
+
• Non-financial metrics, such as reduced bugs and improved rollback processes, are essential to consider alongside financial metrics
|
| 31 |
+
• Sales teams need to think in terms of delivering value to customers, not just completing transactions
|
| 32 |
+
• Focusing solely on technology and process can lead to missed business considerations and failure to adapt to changing needs
|
| 33 |
+
• Engineers must learn to think more widely and consider the broader business implications of their work.
|
| 34 |
+
• Importance of awareness and connection in business
|
| 35 |
+
• Concept of Container Solutions as a consultancy for cloud-native adoption
|
| 36 |
+
• Approach to problem-solving: analysis over blueprint or quick fixes
|
| 37 |
+
• Value of honesty and telling the truth in business, even if it's not in one's own interest
|
| 38 |
+
• Benefits of flexible thinking and learning from diverse perspectives
|
| 39 |
+
• Transitioning conferences and events to online format due to pandemic
|
| 40 |
+
• Launch of WTF (What's The Fork) series for explaining complex tech concepts in simple terms
|
| 41 |
+
• Importance of humanizing tech discussions and avoiding jargon
|
| 42 |
+
• Value of humility and assuming one is wrong, double-checking and learning from others
|
| 43 |
+
• Managing biases and preconceptions in professional settings
|
| 44 |
+
• Need for teamwork and improving as a group to achieve success
|
| 45 |
+
• Importance of ongoing conversation between Ian and Gerhard
|
| 46 |
+
• High-level analysis work and presenting information effectively
|
| 47 |
+
• Balancing honesty and transparency in helping others change or move forward
|
| 48 |
+
• Evolution of relationships and conversations in the industry (from one-off meetings to building blocks and journeys)
|
| 49 |
+
• The importance of learning from past experiences and refining concepts over time
|
| 50 |
+
• Changes brought about by 2020 and looking towards the future
|
OODA for operational excellence_summary.txt
ADDED
|
@@ -0,0 +1,38 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Complexity in development and operations
|
| 2 |
+
• Agile and its limitations in handling rapid change
|
| 3 |
+
• The concept of the OODA loop (Observe, Orient, Decide, Act) and its application to complexity and decision-making
|
| 4 |
+
• Ben Ford's background and how he came to understand the importance of the OODA loop in both military and business contexts
|
| 5 |
+
• The idea that the OODA loop is a fundamental abstraction that can be applied universally, like functional programming concepts
|
| 6 |
+
• The concept of nested OODA loops (OODA loops within OODA loops) as a way to handle complex systems and decision-making.
|
| 7 |
+
• The OODA loop (Observe-Orient-Decision-Act) as a unifying concept for operational excellence and agility
|
| 8 |
+
• Digital transformation as a top-down approach that often fails due to lack of bottom-up implementation
|
| 9 |
+
• Importance of adaptation over transformation in organizations
|
| 10 |
+
• Need for external perspective and detachment from within the system to address complex problems
|
| 11 |
+
• Operational excellence as an emergent property resulting from combining principles and making them relevant to the organization
|
| 12 |
+
• Entropy and chaos in systems, highlighting the need for interaction and communication between top and bottom levels
|
| 13 |
+
• Discussion of martial arts analogy for learning and applying principles
|
| 14 |
+
• Explanation of OODA loop (Observation, Orientation, Decision, Action) and its relevance to martial arts and other fields
|
| 15 |
+
• Breakdown of business and management hierarchy into strategic, operational, and tactical levels
|
| 16 |
+
• Relationship between OODA loop components and different levels of business decision-making
|
| 17 |
+
• Explanation of how OODA loops operate at various levels within an organization
|
| 18 |
+
• Discussion of importance of taking action in the OODA loop process
|
| 19 |
+
• Analysis of why it's beneficial to "start with the action" rather than observation
|
| 20 |
+
• The OODA loop requires interaction with the environment through action to initiate cognition
|
| 21 |
+
• John Boyd's original diagram of the OODA loop was limited by its static nature and medium at the time
|
| 22 |
+
• Modern tools allow for more nuanced and dynamic visualizations of the OODA loop
|
| 23 |
+
• Event-driven architectures and data visualization can enable a real-time, 3D picture of an organization's internal workings
|
| 24 |
+
• The OODA loop is an abstraction that combines observations, orientation, decision-making, and action
|
| 25 |
+
• Pipelines, event sourcing, and functional programming concepts can be used to visualize and understand the relationships between different parts of an organization's processes.
|
| 26 |
+
• The importance of considering the organization's impact on the environment as a cohesive system
|
| 27 |
+
• The OODA loop (Observe, Orient, Decide, Act) concept and its application to understanding an organization's interactions with its environment
|
| 28 |
+
• The need for developers to think beyond shipping code and consider the broader implications of their work
|
| 29 |
+
• The value of experimentation and exploring different perspectives in understanding complex systems
|
| 30 |
+
• The limitations of book learning compared to real-world conversations and experiences
|
| 31 |
+
• Recommendations for books, such as "Team of Teams" by Gen. Stanley McChrystal and "Extreme Ownership" by Jocko Willink, that can help deepen one's understanding of OODA Loop concepts
|
| 32 |
+
• Ben Ford's proposed book on the subject, "The OODA Loop according to Ben Ford"
|
| 33 |
+
• The creation of a YouTube playlist featuring conversations about OODA Loop concepts with various experts and perspectives
|
| 34 |
+
• The importance of hands-on experience and building mental models to understand complex systems.
|
| 35 |
+
• Starting the implementation process with becoming aware of principles and trying them out through iteration and refinement.
|
| 36 |
+
• The need for contextual expertise that adapts to changing environments, rather than blindly applying established methods.
|
| 37 |
+
• The OODA loop (Observe-Orient-Decide-Act) as a constant cycle of optimization in complex systems.
|
| 38 |
+
• The limitations of transplanting ideas or teams from one context to another, and the importance of building internal fluency through continuous learning.
|
OpenTelemetry in your CICD_summary.txt
ADDED
|
@@ -0,0 +1,45 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Presentation on Jenkins CI agents and monitoring with OpenTelemetry
|
| 2 |
+
• Importance of observability in distributed systems like Jenkins
|
| 3 |
+
• Akihiro Kiuchi's project on OpenTelemetry for Jenkins agents as part of Google Summer of Code
|
| 4 |
+
• Use of OpenTelemetry to provide visibility into job execution, agent allocation, and communication
|
| 5 |
+
• CI/CD system architecture and the blurring of lines between CI and CD
|
| 6 |
+
• Importance of using open standards like OpenTelemetry for monitoring and observability in cloud-native deployment
|
| 7 |
+
• Benefits of using OpenTelemetry for distributed tracing, audit, supply chain security, and cost accounting
|
| 8 |
+
• Discussion on the importance of a unified view of CI/CD processes and systems
|
| 9 |
+
• Dimensions in pipeline data collection and abstraction for unified vision
|
| 10 |
+
• Ideal pipeline flow with OpenTelemetry integration
|
| 11 |
+
• Challenges in instrumenting pipelines, such as capturing correct spans and attributes
|
| 12 |
+
• Role of OpenTelemetry in helping CI/CD administrators troubleshoot complex issues
|
| 13 |
+
• Importance of observability in identifying problems impacting multiple teams or organizations
|
| 14 |
+
• Administrator challenges in understanding and debugging complex CI/CD pipelines
|
| 15 |
+
• Caching issues in CI/CD systems and difficulties in identifying dependencies
|
| 16 |
+
• Flaky tests in distributed systems and need for observability to improve confidence in changes
|
| 17 |
+
• OpenTelemetry's role in providing visibility into CI/CD pipeline events, dependencies, and performance
|
| 18 |
+
• Integrating OpenTelemetry with existing tools such as Jenkins and Concourse CI
|
| 19 |
+
• Using Otel CLI as a wrapper for Maven builds or makefiles to gain more granularity in pipeline execution
|
| 20 |
+
• Deploying Jenkins in production using Kubernetes and Helm charts or Operators
|
| 21 |
+
• Configuring pipelines and agents as code, storing them in the same repository as the project code
|
| 22 |
+
• Importance of testing locally on development cycle and having fragments that can be tested locally
|
| 23 |
+
• Jenkins pipeline can be defined in Groovy DSL or Yaml format
|
| 24 |
+
• Declarative syntax vs scripted pipelines, pros and cons of each
|
| 25 |
+
• Configuring Jenkins using Kubernetes API or targeting the master node directly
|
| 26 |
+
• Separating CI from CD concerns, benefits and implementation details
|
| 27 |
+
• Using separate tools for CI (e.g. GitHub Actions) and CD (e.g. Argo CD)
|
| 28 |
+
• GitOps approach connecting CI and CD processes
|
| 29 |
+
• Decoupling deployment from integration concerns using tooling like Keelsh
|
| 30 |
+
• Developing CI/CD pipelines locally with minimal code and business logic
|
| 31 |
+
• Creating pipeline libraries to reuse common steps and reduce complexity
|
| 32 |
+
• Standardization of CI/CD processes
|
| 33 |
+
• Supply chain security in CI/CD space
|
| 34 |
+
• Importance of capturing right information in bill of materials
|
| 35 |
+
• OpenTelemetry instrumentation for observability and audit trails
|
| 36 |
+
• Captain Obvious project for quality gate management and compliance
|
| 37 |
+
• Oleg Nenashev's move to Switzerland and his work with CloudBees
|
| 38 |
+
• OpenTelemetry helps improve developer velocity, reduce costs, and shorten delivery cycles by providing essential data.
|
| 39 |
+
• The same view can be achieved across different systems as long as they emit OpenTelemetry events.
|
| 40 |
+
• Standardization of events is needed for efficient collaboration between systems.
|
| 41 |
+
• Oleg Nenashev wants to lay foundations for working groups to standardize OpenTelemetry events.
|
| 42 |
+
• Continuous Delivery Foundation is already working on standardizing CD events.
|
| 43 |
+
• Adoption of OpenTelemetry has been massive, and it's likely to become incubating soon in CNCF.
|
| 44 |
+
• Cyrille Le Clerc shares updates on donated OpenTelemetry Maven integration and Ansible integration.
|
| 45 |
+
• Oleg Nenashev announces his job change but promises continued involvement in open source and observability.
|
OpenTelemetry in your CI⧸CD_summary.txt
ADDED
|
@@ -0,0 +1,134 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Introduction to Ship It podcast and its focus on code, ops, infrastructure, and people
|
| 2 |
+
• Guests Cyril Leclerc (Product Manager at Elastic) and Oleg Dinashev (Principal Engineer at Cloudbeast)
|
| 3 |
+
• Akihiro Kiuchi's project on Jenkins Monitoring with OpenTelemetry in the context of Google's Summer of Code
|
| 4 |
+
• Importance of open telemetry in CI environments for visibility, monitoring, and cost-effectiveness
|
| 5 |
+
• Discussion of tracing agents, not just the Jenkins master, to gain visibility into job execution and agent availability
|
| 6 |
+
• Breakdown of job duration and tracking time spent on build allocation
|
| 7 |
+
• Visibility in CI/CD steps and allocation of build agents was limited
|
| 8 |
+
• AkiHero aimed to complement existing traces with detailed visibility on agent allocation and communication
|
| 9 |
+
• Importance of open telemetry in CI/CD systems for unified observability
|
| 10 |
+
• Blurred lines between CI and CD, with other automation use cases needing accessibility
|
| 11 |
+
• Open telemetry helps glue information from multiple tools in CI/CD pipelines
|
| 12 |
+
• Need for data to verify pipeline performance and security in audit and supply chain security
|
| 13 |
+
• Data structure for modeling CI and CD pipelines
|
| 14 |
+
• Exposing data of CD processes as a goldmine for troubleshooting and maintenance
|
| 15 |
+
• Benefits of sizing platforms and shortening build cycles
|
| 16 |
+
• Interest in cost accounting, process optimization, and digital transformation
|
| 17 |
+
• Capturing data on distributed traces using open telemetry
|
| 18 |
+
• Unified view of CI and CD processes
|
| 19 |
+
• Debate over standardizing tools or implementing different ones
|
| 20 |
+
• Distributed trace culture providing overall visibility across phases
|
| 21 |
+
• Dimensions of data collection and culture of abstraction
|
| 22 |
+
• Requirements for a good CI-CD system with open telemetry integration
|
| 23 |
+
• Perfect flow of a system with good open telemetry in the software development pipeline
|
| 24 |
+
• Steps involved in processing code, including invocation of external services and tools like Maven or Gradle
|
| 25 |
+
• Need for observability at each level of the pipeline
|
| 26 |
+
• Distributed tracing and passing context through levels of systems
|
| 27 |
+
• Understanding the beginning of a pipeline and its end result
|
| 28 |
+
• Debate on whether deployment should be the last step in a CI or CD pipeline
|
| 29 |
+
• Importance of reporting, post-processing, and accounting work after deployment
|
| 30 |
+
• Use of external tools for various tasks in the pipeline
|
| 31 |
+
• Discussion of instrumenting pipelines with Jenkins, Maven, and Ansible
|
| 32 |
+
• Need to understand what spans to capture during pipeline execution to measure time taken for specific steps.
|
| 33 |
+
• Understanding the importance of attribute extraction from pipeline execution
|
| 34 |
+
• Capturing relevant attributes for troubleshooting and use cases
|
| 35 |
+
• Associating attributes with teams for cost accounting and performance analysis
|
| 36 |
+
• Using stages (CI build, QA, security) to group pipeline constructs for organizational grouping and data usefulness
|
| 37 |
+
• Attributes for velocity and team performance in software delivery process
|
| 38 |
+
• Inviting entire listener base to move latency sensitive workloads to the edge with compute at edge free for three months and up to $100,000 in credit
|
| 39 |
+
• Overview of Fastly's edge cloud network and modern approach to serverless computing
|
| 40 |
+
• Benefits of deploying complex logic at the edge, including unparalleled security, blazing fast computational speed, and real-time observability
|
| 41 |
+
• Calculation or "spans" being worked out incorrectly when it comes to job allocation in agents, and how open telemetry can help CICD administrators solve this problem
|
| 42 |
+
• Role of open telemetry in helping CICD administrators, who may be a shared role among many people
|
| 43 |
+
• Security scanners and deployment
|
| 44 |
+
• Complicated systems and scalability problems
|
| 45 |
+
• CI/CD pipeline maintenance and troubleshooting difficulties
|
| 46 |
+
• Limited observability of data in distributed systems
|
| 47 |
+
• Need for assistance to quickly understand problem impact and scope
|
| 48 |
+
• Importance of observability for slicing and dicing data in any dimension
|
| 49 |
+
• Docker registry issues and their impact on CI/CD administrators
|
| 50 |
+
• Provision of tools to help notify CI/CD administrators early of problems
|
| 51 |
+
• Observability and its benefits in microservices architecture
|
| 52 |
+
• Automated anomaly detection through machine learning and statistics
|
| 53 |
+
• Benefits of observability for CI/CD administrators
|
| 54 |
+
• Comparison of modern CI/CD systems as a mesh of asynchronous processes
|
| 55 |
+
• Complexity of pipeline dependencies and interactions
|
| 56 |
+
• Agent provisioning and synchronization issues
|
| 57 |
+
• Caching in CI/CD systems and its impact on pipeline performance
|
| 58 |
+
• Difficulty in tracing events and understanding pipeline flow
|
| 59 |
+
• Managing outages and issues across multiple pipelines
|
| 60 |
+
• Difficulty in caching system interaction
|
| 61 |
+
• Complexity of pipeline systems and debugging challenges
|
| 62 |
+
• Importance of caching for reducing costs
|
| 63 |
+
• Simplifying complex systems for better throughput
|
| 64 |
+
• Visibility and monitoring of cicd pipelines
|
| 65 |
+
• Divergence between dev and ops teams' goals (stability vs. new features)
|
| 66 |
+
• Need for observability to build confidence in change
|
| 67 |
+
• Flaky tests in distributed systems
|
| 68 |
+
• Challenges with testing distributed systems, including race conditions
|
| 69 |
+
• Open Telemetry's potential to help with flaky tests
|
| 70 |
+
• Existing solution for Go test using Open Telemetry
|
| 71 |
+
• Opportunity to create a backbone for unit test results through Open Telemetry channels
|
| 72 |
+
• Potential for dev/ops team to implement their own tool to process and share flaky test reports
|
| 73 |
+
• Community-driven open source solution leveraging the flexibility of Open Telemetry
|
| 74 |
+
• Expecting an emerging standard for open telemetry in CI/CD systems
|
| 75 |
+
• Currently, almost no tools have built-in serial open telemetry instrumentation
|
| 76 |
+
• Jenkins and Concourse CI are two platforms that provide native open telemetry instrumentation
|
| 77 |
+
• Integrating open telemetry in Jenkins requires installing the Jenkins Open Telemetry plugin and connecting to an open telemetry endpoint backend (e.g. Elastic or Jaeger)
|
| 78 |
+
• Auto CLI from Equinix Labs can be used to collect open telemetry data for systems without built-in support
|
| 79 |
+
• Capturing health metrics and tracing pipeline execution using open telemetry
|
| 80 |
+
• Two initiatives that came to mind for instrumenting CI/CD pipelines were using Honeycomb's small cli tool and Hotel CLI as a wrapper.
|
| 81 |
+
• Hotel CLI can be used with tools like GitHub Actions, GitLab CI, and Jenkins, even if the platform itself is not instrumented.
|
| 82 |
+
• A hackish method was mentioned of replacing the shell on agents with one that has Hotel CLI enabled by default.
|
| 83 |
+
• An example of using Open Telemetry to create a shell wrapper that sends commands to Open Telemetry was discussed.
|
| 84 |
+
• Running Jenkins in production was touched upon, and it was noted that elastic uses Kubernetes for their modern Jenkins platform.
|
| 85 |
+
• Leverage flexibility of Docker containers to let development teams customize their build environment was recommended.
|
| 86 |
+
• Modern Jenkins management and the elimination of "Jenkins Plugin Hell"
|
| 87 |
+
• Running Jenkins and Kubernetes in production
|
| 88 |
+
• Deploying Jenkins using configurations, code, and infrastructure as code
|
| 89 |
+
• Packaging Jenkins into containers using tools like Helm charts
|
| 90 |
+
• Local development and testing of CI pipelines
|
| 91 |
+
• Deployment options for Jenkins in production, including use of Kubernetes and Helm charts
|
| 92 |
+
• Jenkins configuration as code
|
| 93 |
+
• Pipelines stored in repository with project
|
| 94 |
+
• Agent definitions stored in repository
|
| 95 |
+
• Entire Jenkins combination (server, login, config) as a single deliverable
|
| 96 |
+
• Configuring Jenkins using Kubernetes API or targeting Jenkins master directly
|
| 97 |
+
• Flexibility of deploying Jenkins and retrieving configurations without redeploying system
|
| 98 |
+
• Fire Hydrant platform and its features
|
| 99 |
+
• Incident response automation
|
| 100 |
+
• Separating CI (Continuous Integration) from CD (Continuous Deployment) pipelines
|
| 101 |
+
• Implementation of separate CI and CD tools (e.g. GetHub Actions, ArgoCD)
|
| 102 |
+
• Discussion on automating deployment processes and supply chain security
|
| 103 |
+
• KeylessH is currently used to watch images and automatically update when changes occur
|
| 104 |
+
• A desire to decouple deployment and integration concerns, allowing for multiple copies of production environments
|
| 105 |
+
• The use of CI/CD systems, with a focus on scalability concerns
|
| 106 |
+
• Jenkins is commonly used for pipeline development, along with GitHub Actions
|
| 107 |
+
• Pipeline libraries are created to implement common steps, such as deploying to Docker Hub or building Maven projects
|
| 108 |
+
• Test frameworks can be built for these pipelines to ensure they function correctly
|
| 109 |
+
• Jenkins plugin development and maintenance process
|
| 110 |
+
• Importance of standardizing CI/CD processes, managing them as a "kettle" rather than individual "pets"
|
| 111 |
+
• Security considerations for build systems and production environments
|
| 112 |
+
• Supply chain security within the CICD space and importance of dependency updates and scanning
|
| 113 |
+
• Open telemetry instrumentation for continuous delivery pipelines
|
| 114 |
+
• Audit trails and logs management for release and build processes
|
| 115 |
+
• Importance of capturing accurate information in the bill of material
|
| 116 |
+
• Verification and trust requirements for Jenkins and CI systems
|
| 117 |
+
• Incremental journey of verifying captured data and metadata on builds
|
| 118 |
+
• Integration of Captain Obvious with OpenTelemetry and Jenkins
|
| 119 |
+
• Exposure of quality gate information to enable verification
|
| 120 |
+
• Plans for integrating Captain with other tools and systems
|
| 121 |
+
• Update on the status of Captain Obvious project, including its integration into Cloud Native Computing Foundation
|
| 122 |
+
• Discussion of the vibrant community surrounding Captain Obvious
|
| 123 |
+
• Discussion about living in Switzerland
|
| 124 |
+
• Open source standard "open telemetry" for observing CICD pipelines
|
| 125 |
+
• Importance of exposing data from CICD processes
|
| 126 |
+
• Data analysis for optimizing pipelines and decision-making
|
| 127 |
+
• Standardization of open telemetry events
|
| 128 |
+
• Adoption and growth of the open telemetry ecosystem
|
| 129 |
+
• Future plans for donating code to the open telemetry community
|
| 130 |
+
• Progress on open telemetry Ansible integration
|
| 131 |
+
• Donating Ansible integration to the community
|
| 132 |
+
• Iterating and rolling out inside Elastic
|
| 133 |
+
• Jenkins evolution roadmap to be published soon
|
| 134 |
+
• Future projects in observability and open source
|
Optimize for smoothness not speed_summary.txt
ADDED
|
@@ -0,0 +1,40 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Slinging code vs getting it right: the difference between shipping quickly and doing it correctly
|
| 2 |
+
• The importance of psychological safety, autonomy, and alignment in software development teams
|
| 3 |
+
• Velocity vs fluidity: optimizing for speed or smoothness in delivery processes
|
| 4 |
+
• Consistency over time: maintaining a healthy pace across years rather than just short-term goals
|
| 5 |
+
• Knowing where to point teams: the importance of shared understanding and business value in successful projects
|
| 6 |
+
• Disconnect between developers and product owners leads to a lack of understanding of "why" and ultimately facilitates negative externalities
|
| 7 |
+
• Building software for business value or customer outcomes requires understanding the equivalent "why" and correlating points to business value
|
| 8 |
+
• Complexity in technical solutions makes it difficult to answer the question of "why"
|
| 9 |
+
• Detachment from the "why" can lead to a lack of excitement, creativity, and innovation among developers
|
| 10 |
+
• A sustainable and healthy development pace is one that allows for asynchronous chewing and deliberate pacing, allowing for forward progress and hope despite blockers and complexity.
|
| 11 |
+
• The importance of understanding human productivity and creativity as influenced by brain function and social interaction
|
| 12 |
+
• Justin Searls' Twitter poll on whether DevOps has sped up or slowed down teams' ability to deliver software, with 44.5% voting "Sped up"
|
| 13 |
+
• Critique of the term "DevOps" for becoming a buzzword that overemphasized automation and neglected core desires such as ease of use and minimal complexity
|
| 14 |
+
• Justin's experience with Heroku as a prime example of what he wants in terms of simplicity and ease of deployment, but notes that this is not the market trend
|
| 15 |
+
• Discussion on how DevOps has led to teams hiring "DevOps people" to manage cloud computing, rather than simplifying operations
|
| 16 |
+
• Shared understanding of "DevOps" being a point of contention among respondents, with Justin arguing that typical DevOps activities do not truly automate problems
|
| 17 |
+
• Git push as the foundation for a resilient system
|
| 18 |
+
• Critique of overemphasis on new technologies and ignoring fundamental principles in DevOps
|
| 19 |
+
• Parallels between test-driven development and infrastructure/DevOps
|
| 20 |
+
• Importance of total cost of ownership and return on investment when considering testing and automation
|
| 21 |
+
• Criticism of generic, context-free advice on testing and DevOps tools
|
| 22 |
+
• Need for operational knowledge and understanding of how systems integrate and fail
|
| 23 |
+
• Value of automation in detecting and notifying issues, but not replacing human expertise
|
| 24 |
+
• The burden of knowledge and experience required for complex systems and infrastructure
|
| 25 |
+
• Transitioning from commodity services to self-managed infrastructure and the difficulties involved
|
| 26 |
+
• Recognizing inflection points where teams must adapt and learn new skills, such as testing and DevOps
|
| 27 |
+
• The importance of building in confidence and consistency through testing and automated pipelines
|
| 28 |
+
• Strategies for addressing flaky tests and achieving consistent builds
|
| 29 |
+
• Understanding the nuances of scaling systems and making informed decisions about infrastructure choices
|
| 30 |
+
• The importance of distinguishing between actual system failures and flaky implementation problems in test results
|
| 31 |
+
• Limiting the scope of integration tests due to complexity and resource constraints
|
| 32 |
+
• Relying on different types of testing, such as property-based testing and contract testing, to reduce reliance on integration tests
|
| 33 |
+
• Avoiding over-organization of tests into a single bucket, instead organizing by constraints and using multiple test suites
|
| 34 |
+
• Maximizing isolated units that can be tested in isolation for fast feedback, while also having locally integrated tests and some number of contract tests
|
| 35 |
+
• Olympic event in Tokyo
|
| 36 |
+
• Japanese news and media coverage
|
| 37 |
+
• 13-year-old female gold medal winner in skateboarding
|
| 38 |
+
• Excitement generated by the achievement
|
| 39 |
+
• Show notes with additional content
|
| 40 |
+
• Future episode planning
|
Real-world implications of shipping many times a day_summary.txt
ADDED
|
@@ -0,0 +1,49 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Traefik was created to solve a problem with automating reverse proxy configuration in microservices
|
| 2 |
+
• Emile Vauge started working on Traefik as a side project 6 years ago to automate the rooting and networking aspects of 2,000 microservices
|
| 3 |
+
• The project's success was unexpected, becoming popular after being featured on Hacker News
|
| 4 |
+
• Early versions of Traefik supported Mesos, Docker, Consul, Etcd, and Marathon, with Kubernetes support added later
|
| 5 |
+
• Service discovery in Traefik is designed to handle the complexity of large-scale deployments like the original 2,000 microservices project
|
| 6 |
+
• Building a strong community around Traefik was crucial to its success, but also complex to manage
|
| 7 |
+
• The project's approachable documentation and graphics were well-received by users
|
| 8 |
+
• Traefik has a high volume of alphas and betas due to its use of continuous deployment and automated release generation
|
| 9 |
+
• Discussion of CI/CD pipeline evolution and adoption by Traefik
|
| 10 |
+
• Challenge of sustaining a large community with an internal team moving quickly
|
| 11 |
+
• Gap between 1.x and 2 branch versions of Traefik, including lessons learned from revamping the project architecture
|
| 12 |
+
• Importance of connecting company goals to community needs and values
|
| 13 |
+
• Strategies for reconciling differences between Traefik the company, product, and community, including:
|
| 14 |
+
+ Creating a private group for active contributors (ambassadors)
|
| 15 |
+
+ Developing a process for handling community input and contributions daily
|
| 16 |
+
• Importance of shipping being only the beginning of a long process
|
| 17 |
+
• Use of GitHub as the main source of truth for tracking issues and PRs
|
| 18 |
+
• Implementation of GitHub Actions for automating processes
|
| 19 |
+
• Mymirca ant colony concept used to map tools to tasks
|
| 20 |
+
• Automation of documentation and versioning using custom tools
|
| 21 |
+
• Release cycle with 3-4 minor releases per year, following semver versioning system
|
| 22 |
+
• Fast pipeline for bug fixes and vulnerability patches
|
| 23 |
+
• Priority zero fix has to ship today in two versions
|
| 24 |
+
• Minor releases focus on latest version for backward compatibility
|
| 25 |
+
• No new features added in patch releases, only bug fixes
|
| 26 |
+
• Support for minor releases is until next minor release plus a few months
|
| 27 |
+
• Release calendar not used due to external contributions and potential changes
|
| 28 |
+
• Major version bump requires significant architecture changes or backward-incompatible features
|
| 29 |
+
• Semantic versioning applied to API, config, and plugins with additions allowed but no changes
|
| 30 |
+
• Behavior of internal components can change, but must be intentional or have flag options
|
| 31 |
+
• Plugins integration is new to Traefik and lacks strong versioning mechanism
|
| 32 |
+
• Two ways to use plugins: published on marketplace with hash-based versioning or private plugins without version checks
|
| 33 |
+
• Traefik exposes APIs that plugins can use, which are part of public API subject to backwards-compatibility requirements
|
| 34 |
+
• Long-tail latencies in proxy requests, potentially due to TLS issues or specific ciphers
|
| 35 |
+
• Traefik can help understand request slowness through distributed tracing and real-time metrics export
|
| 36 |
+
• Using Traefik as a reverse proxy and also for services themselves, not just apps
|
| 37 |
+
• CRDs (Custom Resource Definitions) needed to configure Traefik in Kubernetes context, but specifics depend on use case
|
| 38 |
+
• Future pain point: automation of all networking space due to microservices growth, beyond just reverse proxy automation
|
| 39 |
+
• Kubernetes cluster management and scalability challenges
|
| 40 |
+
• Need for orchestration of multiple Kubernetes clusters
|
| 41 |
+
• Traefik Labs' vision for handling distributed systems with complex networking
|
| 42 |
+
• Kubernetes federation as a solution for managing multiple clusters
|
| 43 |
+
• Challenges in implementing high availability, blue/green deployments, and end-to-end security across multiple clusters
|
| 44 |
+
• Traefik's features and capabilities, including LetsEncrypt integration and auto-discovery
|
| 45 |
+
• Comparison of Traefik to other tools like Ingress NGINX and Cert Manager
|
| 46 |
+
• Importance of community engagement and feedback in product development and success
|
| 47 |
+
• Discussion of a past meeting or conversation
|
| 48 |
+
• Plans for a future meeting or discussion
|
| 49 |
+
• Appreciation and gratitude expressed by both parties
|
Shipping KubeCon EU 2021_summary.txt
ADDED
|
@@ -0,0 +1,49 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• KubeCon/CloudNativeCon events
|
| 2 |
+
• Stephen Augustus' experience with recording podcasts from conferences
|
| 3 |
+
• Los Angeles event planning (in-person component)
|
| 4 |
+
• Keynote ideas (game show concept with Bob)
|
| 5 |
+
• Adding a "show" element to keynotes
|
| 6 |
+
• Promotional videos and content impact on the keynote
|
| 7 |
+
• Co-chairs' roles and conference involvement
|
| 8 |
+
• Conference structure and transition of co-chairs
|
| 9 |
+
• The importance of considering the end-user perspective in cloud-native solutions
|
| 10 |
+
• The roles of team members Jasmine, Constance, Stephen, and Gerhard in their respective positions at Twitter and KubeCon EU
|
| 11 |
+
• Constance's role as "the question master" and her approach to observability through questioning
|
| 12 |
+
• Discussion about changes and challenges faced by the team, including personal emergencies and deadlines
|
| 13 |
+
• The creation of a promotional video for KubeCon EU that played on the theme of misinformation in the world
|
| 14 |
+
• Appreciation for the hard work of program chairs and track chairs who review conference talks
|
| 15 |
+
• Challenges of reviewing talks at KubeCon
|
| 16 |
+
• Importance of considering external factors in review process
|
| 17 |
+
• Need for balance when accepting similar talks
|
| 18 |
+
• Observability as a topic example with various takes
|
| 19 |
+
• 101 track focus on beginner content
|
| 20 |
+
• Balance between reviewer feedback and program structure
|
| 21 |
+
• Volume and complexity of the review process
|
| 22 |
+
• Comparison of talk acceptance numbers across different KubeCon events
|
| 23 |
+
• Tips for submitting talks, including differentiation and takeaway identification
|
| 24 |
+
• Importance of reviewing abstracts from multiple perspectives
|
| 25 |
+
• The importance of playing to one's strengths when presenting or sharing information
|
| 26 |
+
• Different learning and communication styles among individuals
|
| 27 |
+
• Benefits of recording oneself and refining presentation skills through internal demos and feedback
|
| 28 |
+
• Various formats for sharing knowledge, such as blog posts, podcasts, and workshops, rather than just talks
|
| 29 |
+
• Recognition and appreciation in the community can come from multiple forms of contribution, not just public speaking
|
| 30 |
+
• Importance of acknowledging and highlighting other types of contributions to a project, beyond public speaking or presentations
|
| 31 |
+
• Hallway track at KubeCon allows attendees to meet others with similar interests and form connections
|
| 32 |
+
• The hallway track is not just about attending talks, but also about networking and having conversations with others
|
| 33 |
+
• Replicating the hallway track experience virtually can be done through Zoom breakout rooms
|
| 34 |
+
• Meeting people in person vs online is a key difference, allowing for more personal connections and deeper discussions
|
| 35 |
+
• The "PacMan rule" suggests expanding social circles to allow new people to join and participate
|
| 36 |
+
• Reiterating community guidelines and rules will be important when transitioning back to in-person events
|
| 37 |
+
• Encouraging community ownership and participation, rather than relying on others to provide updates
|
| 38 |
+
• Responsibility falls on individuals to seek information and updates from communities they participate in.
|
| 39 |
+
• Kubernetes community resources are available on github.com/community for learning about governance, SIGs, and working groups.
|
| 40 |
+
• It's not possible for speakers or organizers to provide all necessary information; attendees should generate their own questions and seek further knowledge.
|
| 41 |
+
• Be kind and respectful when engaging with content, considering the effort and dedication of speakers and organizers.
|
| 42 |
+
• Use official channels for feedback, such as talk surveys, conference surveys, and transparency reports.
|
| 43 |
+
• Constructive criticism is essential for growth and improvement in communities.
|
| 44 |
+
• Assume good intent from others, but also acknowledge historical power imbalances and do your own work to be thoughtful in communication.
|
| 45 |
+
• The importance of community in building and maintaining KubeCon
|
| 46 |
+
• Everyone is responsible for creating a positive and inclusive environment at KubeCon
|
| 47 |
+
• Conducting oneself appropriately according to codes of conduct
|
| 48 |
+
• Recognizing the need to acknowledge and manage negative behaviors within the community
|
| 49 |
+
• Celebrating the unique attitude and inclusivity of the cloud-native landscape and CNCF
|
The foundations of Continuous Delivery_summary.txt
ADDED
|
@@ -0,0 +1,58 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• The evolution of software deployment methods, from manual FTP and rsync to automated Git pushing.
|
| 2 |
+
• The concept of Continuous Delivery and its acceleration around 2012/2013.
|
| 3 |
+
• Dave Farley's personal experience and inspiration for writing the book "Continuous Delivery" with Jez Humble.
|
| 4 |
+
• Formative experiences that shaped Farley's understanding of software development, including working on complex projects and adopting agile methodologies.
|
| 5 |
+
• The importance of experimentation, learning from mistakes, and scientific rational thinking in software development.
|
| 6 |
+
• Continuous delivery as an approach to facilitate efficient progress and engineering practices.
|
| 7 |
+
• The impact of continuous delivery on teams and individuals, with Gerhard Lazu sharing his personal experience and gratitude.
|
| 8 |
+
• The challenge of changing people's habits and adopting new ways of working
|
| 9 |
+
• The importance of data-driven decision making in software development
|
| 10 |
+
• The difficulty of establishing and maintaining a positive culture within an organization
|
| 11 |
+
• The interplay between people and practices in driving the success of software development teams
|
| 12 |
+
• The potential for technology to amplify the talents and skills of developers, rather than being a heroic exercise carried out by geniuses
|
| 13 |
+
• The distinction between "software engineers" and "software developers", and the implications of this distinction
|
| 14 |
+
• Martin's focus on simplicity and separation of concerns is emphasized as an essential aspect of his design approach
|
| 15 |
+
• The importance of test-driven development (TDD) in enhancing the property of focusing on separation of concerns is discussed
|
| 16 |
+
• Dave Farley's background and experience with continuous delivery, agile methods, and extreme programming are highlighted
|
| 17 |
+
• The early 2000s technology stack used for continuous integration and delivery is described, including Java, CruiseControl, Ant files, and homegrown tooling
|
| 18 |
+
• Examples of innovative and sophisticated tooling developed by LMAX team members, such as a test distributor and a dynamically managed compute grid, are mentioned
|
| 19 |
+
• Performance demands and software development in the early 2000s
|
| 20 |
+
• Challenges of building tools and systems without existing frameworks or platforms (e.g. no open source software, no GitHub, etc.)
|
| 21 |
+
• Introduction of Agile principles and continuous delivery at ThoughtWorks
|
| 22 |
+
• Development of BDD, continuous delivery, and mocking concepts
|
| 23 |
+
• Legacy of earlier software development methods and the reaction to them that led to the Agile movement
|
| 24 |
+
• Emergence of cloud-native systems and projects (e.g. Argo CD, Event Sourcing)
|
| 25 |
+
• Evolution of CI/CD tools and systems over time (e.g. Jenkins, CircleCI, GitHub Actions)
|
| 26 |
+
• Cloud computing has changed the focus from storage economics to compute costs
|
| 27 |
+
• Normalizing data is no longer necessary due to cloud-based services and sharding
|
| 28 |
+
• The cloud allows for easy access to spin up resources, but also raises the bar of abstraction
|
| 29 |
+
• Continuous integration and delivery tooling needs improvement, particularly in terms of opinionated software that provides clear guidelines for deployment pipelines
|
| 30 |
+
• Build systems like Gradle are examples of opinionated software that make development easier
|
| 31 |
+
• A standardized pipeline concept is needed for CI/CD, similar to the Kubernetes API
|
| 32 |
+
• There is a need for a next building block or standardization in CI/CD tooling to simplify pipeline declaration and execution
|
| 33 |
+
• Minimum deployment pipeline requirements
|
| 34 |
+
• Importance of fast feedback and confidence in software releasability
|
| 35 |
+
• Key stages in a deployment pipeline (e.g. unit tests, acceptance tests)
|
| 36 |
+
• Template for pipelines with parallelized and scalable architecture
|
| 37 |
+
• Definition of a deployment pipeline as a process from commit to releasable outcome
|
| 38 |
+
• Goal of continuous delivery is to have software always in a releasable state
|
| 39 |
+
• Example of a deployment pipeline for an Erlang-based project
|
| 40 |
+
• Critique of a deployment pipeline that automatically deploys to production within 15 minutes
|
| 41 |
+
• Discussion of pipeline optimization and testing strategies
|
| 42 |
+
• Explanation of the concept of instruction pipelining in computer processors and its relation to deployment pipelines
|
| 43 |
+
• Criticism of conflating different types of tests in a deployment pipeline
|
| 44 |
+
• Importance of evaluating deployability and configuration of systems, especially in high-stakes environments
|
| 45 |
+
• Case study of a company's software engineering practices with Siemens Healthcare as an example
|
| 46 |
+
• Discussion of the impact of delays or errors on end-users and strategies for mitigating downtime
|
| 47 |
+
• Introduction to Dave Farley's YouTube channel "Continuous Delivery" and its purpose.
|
| 48 |
+
• Importance of experimentation and learning in software engineering
|
| 49 |
+
• Value of focusing on skills and techniques over prescriptive methodologies
|
| 50 |
+
• Dave Farley's YouTube channel as a resource for software engineering insights and experiences
|
| 51 |
+
• Benefits of continuous integration (CI) and single-branch development
|
| 52 |
+
• Inspirations from companies like SpaceX and Tesla, particularly their approach to innovation and experimentation
|
| 53 |
+
• Personal preferences and opinions on various software engineering topics
|
| 54 |
+
• Importance of minimizing time between code changes
|
| 55 |
+
• Value of finding simple explanations for complex ideas
|
| 56 |
+
• Inspiration from Martin Thompson on embracing imperfection and continuous improvement
|
| 57 |
+
• Recommendation to check out David's YouTube channel
|
| 58 |
+
• Discussion wrap-up and appreciation for the conversation
|
What does good DevOps look like_summary.txt
ADDED
|
@@ -0,0 +1,38 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Recap of Gerhard Lazu's 2019 talk on making systems observable
|
| 2 |
+
• Discussion about DevOps Days Zurich 2021, including organization and logistics
|
| 3 |
+
• Overview of the event's format, with single-track sessions and a variety of talks
|
| 4 |
+
• Review of a specific talk by Jonathan Smart, "Better. Sooner. Happier", focusing on Agile transformation
|
| 5 |
+
• Upcoming plans for DevOps Days Zurich 2022, including an in-person event and call for papers
|
| 6 |
+
• Discussion about the importance of diversity in topics at the conference, beyond technology and process
|
| 7 |
+
• Romano Roth's background and involvement with DevOps
|
| 8 |
+
• Romano Roth's first CI/CD system was a command line script, later using Team Foundation Server
|
| 9 |
+
• Today, he uses TeamCity and Octopus Deploy, but sees a trend towards platforms like GitHub and GitLab
|
| 10 |
+
• He is the head of DevOps at Zühlke, with 31 team members in Switzerland and others globally
|
| 11 |
+
• His team works on various projects, including Agile and DevOps transformations for clients
|
| 12 |
+
• Common obstacles to successful DevOps transformation include middle management resistance and misalignment between units
|
| 13 |
+
• Key to success is bringing top management on board with clear vision and guidance.
|
| 14 |
+
• Dealing with individuals who resist change
|
| 15 |
+
• Importance of education and convincing in implementing change
|
| 16 |
+
• Agile and DevOps transformation as a process of transforming ideas into value for customers
|
| 17 |
+
• Hypothesis-driven approach to identifying minimal viable products and reducing batch sizes
|
| 18 |
+
• Need to optimize shipping cycles while maintaining a comfortable pace
|
| 19 |
+
• Emphasis on iterative learning and making small course adjustments
|
| 20 |
+
• Importance of recognizing when it's enough and not chasing unnecessary perfection
|
| 21 |
+
• Culture shift needed to allow for failures and learn from them
|
| 22 |
+
• Example of making mistakes as an opportunity to learn, rather than avoid
|
| 23 |
+
• Challenges with implementing new technologies
|
| 24 |
+
• Importance of learning from mistakes and sunk costs
|
| 25 |
+
• Role of technology in decision-making processes for teams
|
| 26 |
+
• How to deal with team members getting excited about specific technologies
|
| 27 |
+
• Decision-making process within a team regarding which technology to use
|
| 28 |
+
• DevOps trends for 2021 (automation, security, AIOps)
|
| 29 |
+
• Definition and implementation of AIOps (AIOps tools such as Dynatrace and Datadog)
|
| 30 |
+
• AIOps and automation trends
|
| 31 |
+
• Tools used in DevOps such as Octopus Deploy, Jenkins, TeamCity, ASH Devops, GitHub, and GitLab
|
| 32 |
+
• DevSecOps and supply chain security tools like SonarQube, Checkmarx, WhiteSource, and Splunk
|
| 33 |
+
• Hyper-automation trend and its relation to AIOps and observability
|
| 34 |
+
• Cyber-resilience topic, including dev sec ops and infrastructure security
|
| 35 |
+
• Participatory budgeting as a method for allocating budget effectively
|
| 36 |
+
• Importance of making decisions
|
| 37 |
+
• Learning from mistakes
|
| 38 |
+
• Constantly adapting to changing circumstances
|
What does good DevOps look like?_summary.txt
ADDED
|
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Interview with Romano Roth, head of DevOps at Zülke
|
| 2 |
+
• Overview of Zülke's business and services, including factory robots, AI assistants, and medical devices
|
| 3 |
+
• Romano's background as a .NET developer and his current role in leading 30 software engineers
|
| 4 |
+
• Discussion of recent DevOps challenges and wins across various companies
|
| 5 |
+
• Review of the DevOps Meetup group and events, including DevOps Days Zurich
|
| 6 |
+
• Details on organizing an in-person event during COVID-19 pandemic, including safety measures
|
| 7 |
+
• The speaker liked a particular talk that emphasized the importance of people over processes in IT transformation.
|
| 8 |
+
• The talk was about focusing on what really matters in an HL transformation, rather than just following frameworks such as scaled HL.
|
| 9 |
+
• The speaker compared this idea to the Agile Manifesto's principle of "people over processes".
|
| 10 |
+
• The upcoming DevOps Days conference will be held in person again next year, likely in May or June.
|
| 11 |
+
• The call for papers for the next conference is expected to open in December or January.
|
| 12 |
+
• There was discussion about diversity in topics and speakers at the conference, with a desire to include more talks on culture and UX in DevOps.
|
| 13 |
+
• People's tendency to chase shiny new things and the comfort of familiar tools
|
| 14 |
+
• Origins of DevOps and its connection to continuous integration and delivery pipelines
|
| 15 |
+
• First experiences with CI-CD systems (command line scripts, batch files)
|
| 16 |
+
• Current use of various CI-CD systems (TeamCity, Octopus Deploy, GitHub, GitLab)
|
| 17 |
+
• Shift towards platform-based solutions like GitHub and GitLab
|
| 18 |
+
• Role as head of DevOps at Zylke, leading a team of engineers and consultants
|
| 19 |
+
• Training and educating clients on DevOps practices
|
| 20 |
+
• Consulting on IT, HR, and DevOps transformations in client projects
|
| 21 |
+
• Team size: 31 DevOps engineers at Zylke in Switzerland
|
| 22 |
+
• Global presence: other people around the world doing DevOps
|
| 23 |
+
• Multiple customers and projects, with team members working on different responsibilities
|
| 24 |
+
• Successes and failures in projects, including a notable agile transformation project with a customer
|
| 25 |
+
• Key takeaway from the successful project: deliver directly to the customer, let them show how they use it
|
| 26 |
+
• Promotion for Fastly's Edge Cloud Network and serverless computing
|
| 27 |
+
• Biggest obstacles to driving DevOps transformations or successful DevOps projects: middle management and company structure
|
| 28 |
+
• Misalignment between business units and silos
|
| 29 |
+
• Challenges of HR transformation and DevOps in getting buy-in from leaders who lose power and control
|
| 30 |
+
• Importance of educating leaders on new roles and responsibilities in a transformed organization
|
| 31 |
+
• Need for top management to provide clear vision and guidance for transformation efforts
|
| 32 |
+
• Addressing resistance to change, including educating or replacing individuals who are resistant
|
| 33 |
+
• Agile and DevOps transformations focusing on connecting value stream to customer needs and iterating on product development
|
| 34 |
+
• Importance of identifying hypotheses behind ideas and testing them with minimal viable products and leading indicators.
|
| 35 |
+
• The importance of a comfortable pace when working on projects
|
| 36 |
+
• The scientific method and iterating quickly to validate assumptions
|
| 37 |
+
• Recognizing when it's enough and not chasing perfection
|
| 38 |
+
• Shipping code and features as soon as possible, even if they're not complete
|
| 39 |
+
• Failing and learning from mistakes as an essential part of the development process
|
| 40 |
+
• Allowing teams to make failures and learn from them, rather than trying to avoid failure altogether
|
| 41 |
+
• Old technology used in the beginning led to learning about customer needs.
|
| 42 |
+
• Addition of user experience was necessary but showed limitations with old tech.
|
| 43 |
+
• Switching to new technology required a willingness to change and adapt.
|
| 44 |
+
• The importance of server-side rendering, such as LiveView, was discussed for its efficiency and simplicity.
|
| 45 |
+
• Not being afraid to say "I was wrong" and course correct is crucial in decision-making.
|
| 46 |
+
• Sunk cost fallacy should not be ignored, and throwing more money at a bad idea is not beneficial.
|
| 47 |
+
• Focus on learning, not time spent, is essential when evaluating new technologies.
|
| 48 |
+
• Understanding the underlying problem being solved by technology is key to making informed decisions.
|
| 49 |
+
• Analysis of technology possibilities and their advantages/disadvantages
|
| 50 |
+
• Decision-making process for adopting technologies: team involvement vs external decisions
|
| 51 |
+
• Importance of prototypes in evaluating technology effectiveness
|
| 52 |
+
• Use cases for FireHydrant's reliability platform in incident response and automation
|
| 53 |
+
• DevOps trends mentioned: automation, security (DevSecOps), AIOps
|
| 54 |
+
• AIOps (Artificial Intelligence for IT Operations) discussed as a trend and its potential to solve complex problems
|
| 55 |
+
• AIOps tools mentioned: Dynatrace, Datadog, pattern matching capabilities
|
| 56 |
+
• Automation tools mentioned: Octopus Deploy, Jenkins, TeamCity, Azure DevOps, GitHub, GitLab
|
| 57 |
+
• DevSecOps (Supply Chain Security) discussed with a focus on application security and static code analysis
|
| 58 |
+
• Tools for static code analysis mentioned: SonarCube, Checkmarks, OWASP tool (name not specified)
|
| 59 |
+
• Importance of analyzing libraries and dependencies in addition to code itself
|
| 60 |
+
• Tool for vulnerability identification and licensing management mentioned: WhiteSource
|
| 61 |
+
• Trends in DevOps for 2021
|
| 62 |
+
• Hyperautomation as a major trend for 2022
|
| 63 |
+
• Importance of monitoring and maintaining systems with hyperautomation
|
| 64 |
+
• Need for observability with automated processes
|
| 65 |
+
• Cyber resilience topic, including DevSecOps and infrastructure protection
|
| 66 |
+
• Allocating budget through participatory budgeting
|
| 67 |
+
• Participatory budgeting as a more effective method than dividing budgets equally among stakeholders
|
| 68 |
+
• The benefits of participatory budgeting include entrepreneurial thinking, emotional attachment to decision-making, and better outcomes
|
| 69 |
+
• Key takeaway: don't be afraid to make decisions, learn from mistakes, and adapt constantly
|
| 70 |
+
• Importance of strategic alignment with OKRs or company strategy in decision-making
|
What is good release engineering_summary.txt
ADDED
|
@@ -0,0 +1,36 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Release engineering importance for open source projects
|
| 2 |
+
• Relationship between developers and end users of open source software
|
| 3 |
+
• Core infrastructure components (RabbitMQ) and their reliance on stable releases
|
| 4 |
+
• Comparison of release engineering in RabbitMQ and FreeBSD operating system
|
| 5 |
+
• Examples of release engineering gone wrong (security bugs, breaking changes, delayed shipping)
|
| 6 |
+
• Consequences of poor release engineering (lost trust, reluctance to upgrade)
|
| 7 |
+
• Importance of user confidence in software releases
|
| 8 |
+
• Vicious cycle of developers struggling with updates leading to decreased user adoption
|
| 9 |
+
• Relationship between end-user happiness and release engineering
|
| 10 |
+
• Comparison of RabbitMQ and FreeBSD as core infrastructure components
|
| 11 |
+
• Discussion of specific use cases where one or the other is more critical
|
| 12 |
+
• Overview of the FreeBSD release engineering process, including a fixed interval between major releases and flexible planning
|
| 13 |
+
• The FreeBSD development process involves a detailed calendar for planning and communication
|
| 14 |
+
• The community can plan and test new versions in advance, with Netflix being one example
|
| 15 |
+
• The release engineering timeline depends on whether it's a minor or major release
|
| 16 |
+
• Minor releases typically take weeks to months, while major releases take 2-3 months or more
|
| 17 |
+
• Major releases do not follow semantic versioning, but aim for compatibility between releases
|
| 18 |
+
• Contributors can find tasks in the Bugzilla bug tracker and solve problems they encounter with FreeBSD to contribute
|
| 19 |
+
• The community can participate by submitting patches through GitHub pull requests, mailing lists, or Bugzilla
|
| 20 |
+
• Release engineering in FreeBSD
|
| 21 |
+
• Calendar-based release cycles for major and minor releases
|
| 22 |
+
• Communication and organization improvements through fixed intervals and advance announcements
|
| 23 |
+
• Other open-source projects (Darktable, Mesa library) that implement similar release engineering strategies
|
| 24 |
+
• Balance between shipping stable software and incorporating new features/drivers
|
| 25 |
+
• Difficulty of testing complex graphics drivers and finding the right balance in shipping updates
|
| 26 |
+
• Use of Erlang for web development and its benefits
|
| 27 |
+
• Hot code reloading feature of Erlang and its challenges
|
| 28 |
+
• RabbitMQ not using hot code reloading due to complexity
|
| 29 |
+
• Packaging and configuration management issues with Erlang-based systems
|
| 30 |
+
• Challenges of packaging and distributing complex distributed stateful systems like RabbitMQ
|
| 31 |
+
• Benefits of containerization and Kubernetes in managing such systems
|
| 32 |
+
• Challenges with databases in containerized environments
|
| 33 |
+
• Limitations of RabbitMQ's current functionality compared to traditional systems
|
| 34 |
+
• Discussion of implementing hot code reloading in RabbitMQ
|
| 35 |
+
• Potential benefits and feasibility of implementing hot code reloading only for bug fixes
|
| 36 |
+
• Release engineering practices and experiences shared by users of open-source projects
|
What is good release engineering?_summary.txt
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Importance of good release engineering for core infrastructure
|
| 2 |
+
• Jean-Sébastien Padron's experience as a contributor to RabbitMQ and FreeBSD
|
| 3 |
+
• Challenges of debugging complex systems with multiple software versions
|
| 4 |
+
• The role of communication in release engineering, especially for open-source projects
|
| 5 |
+
• Benefits of good release engineering, including improved user satisfaction and feedback
|
| 6 |
+
• Importance of making money in open-source projects
|
| 7 |
+
• Challenges and risks associated with release engineering for RabbitMQ
|
| 8 |
+
• Definition and characteristics of core infrastructure components (RabbitMQ as an example)
|
| 9 |
+
• Comparison between RabbitMQ and FreePSD (operating system) regarding release engineering
|
| 10 |
+
• Examples of failed release engineering efforts (RabbitMQ security bug fix/ break-in change, FreeBSD 5.0 release cycle)
|
| 11 |
+
• Trade-offs between shipping a new version quickly vs. taking time to stabilize the code base
|
| 12 |
+
• Importance of timely software releases and updates
|
| 13 |
+
• Impact on user confidence and willingness to consume future changes
|
| 14 |
+
• Relationship between release engineering and user happiness
|
| 15 |
+
• Comparison of RabbitMQ and FreeBSD as core infrastructure
|
| 16 |
+
• Considerations for companies using these systems (e.g. cars, gaming, streaming)
|
| 17 |
+
• Real-life example of a customer issue with RabbitMQ in Paris
|
| 18 |
+
• RabbitMQ is involved in message exchange between car and key
|
| 19 |
+
• Importance of core infrastructure, such as RabbitMQ, being transparent but often overlooked
|
| 20 |
+
• Teleport Access Plane for unified access to computing resources
|
| 21 |
+
• Release engineering process for FreePST, including fixed interval between major releases and minor releases
|
| 22 |
+
• Use of a calendar tool for release planning, including code freeze, beta releases, and final release dates
|
| 23 |
+
• Importance of communication and flexibility in the release process
|
| 24 |
+
• The FreeBSD release engineering process was introduced after FreeBSD 5 and has undergone changes to adjust the timeframe between releases for easier user understanding.
|
| 25 |
+
• The FreeBSD calendar is published on the FreeBSD.org website and announced on mailing lists, providing a clear schedule of upcoming releases.
|
| 26 |
+
• The development process takes place in an internal Git repository hosted by FreeBSD, with read-only mirrors available on GitHub; there are discussions about introducing alternative tools like GitLab.
|
| 27 |
+
• The community can communicate with developers through various mailing lists focused on specific topics or branches.
|
| 28 |
+
• Users can participate in FreeBSD development by finding tasks on the Bugzilla bug tracker or solving problems they encounter while using FreeBSD.
|
| 29 |
+
• Submissions for patches can be made through pull requests on GitHub, mailing lists, or Bugzilla after opening an issue.
|
| 30 |
+
• Release cycle and timeline for FreeBSD
|
| 31 |
+
• Differences in versioning between FreeBSD and other operating systems
|
| 32 |
+
• Principles of Least Astonishment (POLA) in FreeBSD release engineering
|
| 33 |
+
• Importance of compatibility and deprecation in major releases
|
| 34 |
+
• Timeline for major and minor releases in FreeBSD
|
| 35 |
+
• Comparison to RabbitMQ's current release engineering process
|
| 36 |
+
• Inspiration from other open-source projects, including Darktable and Mesa library
|
| 37 |
+
• Distributed team meetings and challenges with graphics drivers
|
| 38 |
+
• Discussion of FreeBSD and its stability in comparison to other systems
|
| 39 |
+
• Importance of balancing shipping updates quickly with ensuring software stability
|
| 40 |
+
• Challenges of testing graphics drivers on various hardware configurations
|
| 41 |
+
• Shift from including graphics drivers in the core FreeBSD source code to packaging them separately
|
| 42 |
+
• Software development process involving testing, feedback, and updates
|
| 43 |
+
• Importance of communication with contributors and users in release engineering
|
| 44 |
+
• Limiting the impact of mistakes and being honest about them
|
| 45 |
+
• AirLong (Yoz) web server used for a previous project
|
| 46 |
+
• Hot code reloading feature of AirLong
|
| 47 |
+
• Packaging Debian packages for the service
|
| 48 |
+
• RabbitMQ software development process, lack of hot code reloading
|
| 49 |
+
• RabbitMQ code changes can be problematic if not handled correctly
|
| 50 |
+
• Migration from state V1 to V2 requires careful handling
|
| 51 |
+
• Clustered systems make this process even more complicated
|
| 52 |
+
• Packaging AirLong VM with configuration management tools is challenging
|
| 53 |
+
• RabbitMQ's plugin system and microservices architecture contribute to complexity
|
| 54 |
+
• Containerization has helped simplify packaging and deployment
|
| 55 |
+
• Kubernetes cluster operators can help manage complex deployments
|
| 56 |
+
• Kubernetes' challenges with stateful distributed systems
|
| 57 |
+
• Limitations of RabbitMQ in containers and Kubernetes environments
|
| 58 |
+
• Hot code reloading feature not available in RabbitMQ, but potentially achievable through bug-fix only patch releases
|
| 59 |
+
• Benefits of hot code reloading for users and developers
|
| 60 |
+
• Open discussion on release engineering practices and user experience
|
| 61 |
+
• Goodbyes spoken multiple times
|
| 62 |
+
• Timing and duration of goodbyes vary
|
| 63 |
+
• No other conversation or topics discussed
|
Why Kubernetes_summary.txt
ADDED
|
@@ -0,0 +1,42 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Lars Wikman helped improve Changelog.com's codebase
|
| 2 |
+
• He and Alex had differing approaches to improving performance
|
| 3 |
+
• Lars worked on various projects for The Changelog, including email functionality and the meta-costs feature
|
| 4 |
+
• Jerod has not implemented the meta-costs feature yet
|
| 5 |
+
• Lars is deeply invested in the BEAM ecosystem (Erlang/Elixir)
|
| 6 |
+
• His top favorite features of BEAM are concurrency/parallelism, resiliency, and dynamic typing
|
| 7 |
+
• Shipping Elixir apps and their dependencies
|
| 8 |
+
• Releases and packaging options for Elixir/Erlang
|
| 9 |
+
• Docker and Docker Compose use cases and benefits
|
| 10 |
+
• Database management with PostgreSQL, MySQL, SQLite, and Litestream
|
| 11 |
+
• Stateful vs stateless systems and implications for deployment
|
| 12 |
+
• The importance of simplicity and avoiding radical changes to existing software
|
| 13 |
+
• Critique of Mnesia, a distributed database included with the BEAM ecosystem, citing scalability issues and conflict resolution problems
|
| 14 |
+
• Use of SQLite as a caching solution for Elixir projects, leveraging standard tooling and compatibility with Ecto
|
| 15 |
+
• Discussion of WhatsApp's use of Mnesia, employing it in a limited capacity due to concerns over consistency and performance
|
| 16 |
+
• Evaluation of CockroachDB as a distributed database solution, highlighting its Postgres compatibility and scalability features
|
| 17 |
+
• Concerns about using Kubernetes as an abstraction layer, arguing that developers should still be aware of underlying details such as Linux installations
|
| 18 |
+
• Decision to use PostgreSQL instead of SQLite in a recent project due to the reliability and community support behind the former
|
| 19 |
+
• Discussion of maintaining confidence in deployed software, including considerations for updates, CVEs, and backup strategies
|
| 20 |
+
• Difficulty in taking small steps to improve systems as they become more complex
|
| 21 |
+
• Importance of sticking with defaults and common paths for reliability and upgradability
|
| 22 |
+
• Dangers of "chasing shiny" new technologies and frameworks without need or justification
|
| 23 |
+
• Need to question the assumption that a product must be scalable, and to consider whether it's necessary
|
| 24 |
+
• Value of writing retrospective posts to document lessons learned from past projects
|
| 25 |
+
• Trade-offs between microservices and monolith architecture, and importance of knowing when to use each approach
|
| 26 |
+
• Lars Wikman's skepticism towards using Kubernetes for small-scale systems
|
| 27 |
+
• Gerhard Lazu's explanation of why Changelog chose to use Kubernetes (maturity, managed service offered by Linode)
|
| 28 |
+
• Challenges with managing DNS updates and certificates in a Kubernetes environment
|
| 29 |
+
• Discussion on using Ansible, Terraform, Concourse CI, and Docker Swarm before settling on Kubernetes
|
| 30 |
+
• Benefits of using Kubernetes for complex systems with multiple concerns and integrations
|
| 31 |
+
• Discussion around using proprietary cloud services for file serving
|
| 32 |
+
• Comparison between using NGINX and Kubernetes for load balancing and infrastructure management
|
| 33 |
+
• Difficulty in understanding the value proposition and benefits of using Kubernetes
|
| 34 |
+
• Critique of Kubernetes as being overly complex, generalized, and "over-engineered"
|
| 35 |
+
• Alternative approach to using a runtime environment like the BEAM (Erlang/Elixir) that provides high-availability and observability features out of the box
|
| 36 |
+
• The discussion centers around the simplicity and complexity of Kubernetes
|
| 37 |
+
• Gerhard Lazu defends Kubernetes as a complex but simple system with a clear interface and API
|
| 38 |
+
• He compares it to other deployment tools like Chef and Ansible, stating that Kubernetes is a more comprehensive solution
|
| 39 |
+
• Lars Wikman shares his experience with Kubernetes and notes its ability to simplify operations, but also paves over details
|
| 40 |
+
• The conversation touches on the trade-off between simplicity and explicitness, with Gerhard arguing for a more declarative approach in certain situations
|
| 41 |
+
• Lars likens Kubernetes to Electron, suggesting that it makes operations simpler but obscures underlying complexities
|
| 42 |
+
• Both discussants agree that abstraction layers can be beneficial, but also highlight their potential drawbacks when applied incorrectly.
|
Why Kubernetes?_summary.txt
ADDED
|
@@ -0,0 +1,66 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• The importance of a simple approach to shipping software
|
| 2 |
+
• Kubernetes and its complexities
|
| 3 |
+
• A discussion on the value of simplicity in application development
|
| 4 |
+
• Performance improvements made to changelog.com's codebase
|
| 5 |
+
• An introduction to Render, a zero DevOps cloud platform
|
| 6 |
+
• Meta costs feature and its potential benefits
|
| 7 |
+
• The Beam ecosystem (Erlang and Elixir) has its own virtual machine and benefits from Erlang technology
|
| 8 |
+
• The speaker writes in Elixir, not Erlang, but is invested in the Beam ecosystem
|
| 9 |
+
• Concurrency and parallelism are built-in features of the Beam that make it easy to use
|
| 10 |
+
• Resiliency is also a key feature, allowing components to fail without affecting the entire system
|
| 11 |
+
• The speaker prefers dynamic languages over typed ones, citing ease of development as a benefit
|
| 12 |
+
• The speaker discusses the challenges of shipping a lightweight application with minimal dependencies.
|
| 13 |
+
• OpenSSL is mentioned as a tricky dependency to manage.
|
| 14 |
+
• The conversation turns to on-prem deployments and the use of Docker to set up infrastructure.
|
| 15 |
+
• The speaker explains their plan to provide a Docker Compose file, credentials, and let someone else set up the database (Postgres) using Docker.
|
| 16 |
+
• Discussion around configuration management, especially with Postgres, including versioning, SSL enabling, and tuning.
|
| 17 |
+
• The speaker suggests shipping a binary or executable for simple use cases, but notes that this is not feasible for more complex scenarios like on-prem deployments.
|
| 18 |
+
• Stateless systems are mentioned as an alternative to stateful ones, where no data needs to be moved with the service.
|
| 19 |
+
• The speaker shares their own experience with building stateless systems and using SQLite for simpler operational requirements.
|
| 20 |
+
• A project called Lightstream is mentioned as a solution for replicating SQLite databases and ensuring high availability.
|
| 21 |
+
• Discussing the use of SQLite in small-scale SaaS applications
|
| 22 |
+
• Mention of Lightstream and its author Ben Johnson (also known as Ben B. Johnson) and his experience with database systems
|
| 23 |
+
• Importance of simplicity and effectiveness over complexity in software development
|
| 24 |
+
• Discussion on adapting to existing infrastructure for clients, including using SQLite if necessary
|
| 25 |
+
• Amnesia and Beam ecosystems, their challenges, and limitations at scale
|
| 26 |
+
• Example of WhatsApp's use of Amnesia for metadata storage, but not for heavy writes or reads
|
| 27 |
+
• Mention of RabbitMQ as a project that has issues with Amnesia at scale
|
| 28 |
+
• Explanation of Amnesia's design limitations and its suitability for tightly coupled machines in telecom applications
|
| 29 |
+
• Replicating Postgres and its complexities
|
| 30 |
+
• Concerns of using CockroachDB vs Postgres
|
| 31 |
+
• Kubernetes as an abstraction layer simplifying everything, but still requiring attention to details
|
| 32 |
+
• Choosing PostgreSQL over SQLite for a recent project due to concerns about adapter reliability and maintaining support
|
| 33 |
+
• Importance of choosing widely supported and documented solutions for maintainability and future-proofing
|
| 34 |
+
• Importance of carefulness in choosing technology and architecture
|
| 35 |
+
• Value of scalability and reliability in certain situations
|
| 36 |
+
• Dangers of "chasing shiny new frameworks" without considering needs
|
| 37 |
+
• Need to ask enough questions (e.g. "why") before making decisions
|
| 38 |
+
• Lessons learned from past mistakes and successes
|
| 39 |
+
• Microservices vs monoliths, importance of choosing wisely
|
| 40 |
+
• Kubernetes, potential overcomplication
|
| 41 |
+
• Discussion of the benefits and drawbacks of using Kubernetes
|
| 42 |
+
• Experiences with other containerization tools, including K3S
|
| 43 |
+
• Reasons for choosing Kubernetes, including maturity and managed services offered by Linode
|
| 44 |
+
• Challenges in implementing Kubernetes, such as DNS updates, certificate management, and secret storage
|
| 45 |
+
• Concerns around automation, monitoring, and scalability
|
| 46 |
+
• Managing infrastructure upgrades without worrying about versions
|
| 47 |
+
• Current infrastructure setup using Terraform, Ansible, Docker Compose, and Concourse CI
|
| 48 |
+
• Considering a control plane to continuously apply configs and improve management
|
| 49 |
+
• Evaluating Kubernetes for large-scale deployment and scalability concerns
|
| 50 |
+
• Alternative solutions like K3S, GitOps, and proprietary cloud services for file serving and load balancing
|
| 51 |
+
• Discussion of a project's database setup, including PostgreSQL and CockroachDB
|
| 52 |
+
• Complexity of getting started with Kubernetes and its value proposition
|
| 53 |
+
• Comparison between Kubernetes and other frameworks or runtimes, such as Erlang Elixir and the Beam
|
| 54 |
+
• Critique of Kubernetes for being over-engineered and trying to solve everything
|
| 55 |
+
• Alternative approach to using a more specialized runtime that handles infrastructure concerns
|
| 56 |
+
• The speaker suggests that Kubernetes is often used too early in projects and can be overwhelming due to its complexity
|
| 57 |
+
• Kubernetes provides simplicity by abstracting away many details, but this abstraction can also obscure understanding of the underlying system
|
| 58 |
+
• The speaker notes that Kubernetes is a powerful tool for automating operations, but it requires a significant learning curve
|
| 59 |
+
• Comparison is made to other tools like Chef, Ansible, and Heroku, highlighting Kubernetes' unique features and benefits
|
| 60 |
+
• The speaker suggests that Kubernetes can make operations simpler, but at the cost of understanding the underlying details
|
| 61 |
+
• Abstraction layers are seen as a double-edged sword: providing convenience, but also obscuring knowledge of the system.
|
| 62 |
+
• The power of imperative code and its ability to clearly show what is happening in a system
|
| 63 |
+
• Criticism of declarative approaches, such as Kubernetes, for adding unnecessary complexity to simple systems
|
| 64 |
+
• Importance of understanding the needs and context of different teams (dev and ops) when choosing tools and abstractions
|
| 65 |
+
• Need for collaboration and communication between dev and ops teams to create effective solutions
|
| 66 |
+
• Benefits of agreeing on abstractions and having a planned approach to problem-solving
|
üéÑ Merry Shipmas üéÅ_summary.txt
ADDED
|
@@ -0,0 +1,68 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• Introduction to a CI/CD LEGO set used by Changelog.com for production
|
| 2 |
+
• New pipeline improves coding-to-prod time to at least twice as fast as before
|
| 3 |
+
• Use of Dagger and CUE language in the pipeline
|
| 4 |
+
• Discussion of the team's experience working on the project, including challenges and learning opportunities
|
| 5 |
+
• Explanation of the new pipeline workflow, including parallel dependency builds and caching mechanisms
|
| 6 |
+
• Plans for improving developer experience with BuildKit and CUE
|
| 7 |
+
• Demonstration of the new pipeline and its features, including actions and parallel dependency builds.
|
| 8 |
+
• BuildKit and Docker build features
|
| 9 |
+
• Steps as container-based actions with inputs and outputs
|
| 10 |
+
• Pipeline running in parallel with caching and speed improvements
|
| 11 |
+
• Dagger integration with GitHub Actions and local machines
|
| 12 |
+
• Open tracing feature for visualizing pipeline performance
|
| 13 |
+
• Fine-grained step relationships enabling parallel execution
|
| 14 |
+
• CI setup and environment variables configuration
|
| 15 |
+
• Secrets management using SOPS encryption
|
| 16 |
+
• Discussion of a pipeline's configuration and how it interacts with Docker and CUE (Configure, Unify, Execute)
|
| 17 |
+
• Explanation of CUE as a configuration language that aims to be better than JSON and YAML
|
| 18 |
+
• Benefits of using CUE for schema definition, data validation, and type-checking
|
| 19 |
+
• Example use case: deploying serverless functions on AWS using CUE
|
| 20 |
+
• Mention of future improvements with Europa, including improved DX (Developer Experience) and potential removal of hoops to jump through in the pipeline configuration
|
| 21 |
+
• Discussion of the value of profiling Kubernetes workloads
|
| 22 |
+
• Explanation of sampling profiling and its benefits over traditional profiling methods
|
| 23 |
+
• Introduction to Parka, a tool for recording and analyzing CPU profiles
|
| 24 |
+
• Demo of Parka's functionality, including visualizing CPU samples and Flame Graphs
|
| 25 |
+
• Discussion of how Parka can be used to optimize code and reduce CPU usage
|
| 26 |
+
• Discussion of performance spikes in Parka's profiling data
|
| 27 |
+
• Symbolization and ingestion of profiling data as potential causes for performance issues
|
| 28 |
+
• Optimizations to reduce performance impact, including buffer reuse and storage optimizations
|
| 29 |
+
• Displaying Flame Graphs in Parka, with the ability to view different profiles and machine-compiled binaries
|
| 30 |
+
• Explaining memory addresses in Flame Graphs due to stripped debug information in Postgres binary
|
| 31 |
+
• Introduction of Debuginfod project for on-demand debug symbol retrieval
|
| 32 |
+
• Discussion of Erlang VM's just-in-time compiler and perf.maps implementation
|
| 33 |
+
• Comparison view feature in Parka, with interpretation of results regarding CPU cycles and observations of stack traces.
|
| 34 |
+
• Discussion of color scheme for visual representation
|
| 35 |
+
• Attempt to diagnose an issue with Parka Agent symbolization, specifically a memory address that doesn't match any executable code
|
| 36 |
+
• Investigation into procfs and process maps to understand memory-mapping behavior
|
| 37 |
+
• Theoretical explanation of potential issues with stack trace snapshots in eBPF
|
| 38 |
+
• Decision to seek further expertise from Lukas Larsson on Erlang runtime behavior
|
| 39 |
+
• Discussion of using Crossplane to provision a Linode Kubernetes cluster for Changelog.com setup
|
| 40 |
+
• Discussion about an upcoming Easter Egg in a project
|
| 41 |
+
• Review of control plane and Kubernetes cluster versions (K 1.3.1 and patch updates to 1.3.3)
|
| 42 |
+
• Terrajet setup and requirements for Crossplane version (version 1.3 sufficient)
|
| 43 |
+
• Pairing session on setting up a new repository using the Provider Jet template
|
| 44 |
+
• Troubleshooting issues with Terraform provider source and Terraform download name in the Docker file
|
| 45 |
+
• Discussing a GitHub issue with a Linode Terraform provider
|
| 46 |
+
• Resolving an issue with the provider's version and import path
|
| 47 |
+
• Understanding how to set up credentials for the Linode provider in a Terraform configuration
|
| 48 |
+
• Introduction to Terrajet, a code generator that creates Crossplane providers from Terraform providers
|
| 49 |
+
• Explanation of how Terrajet was used to create a Linode provider for Crossplane
|
| 50 |
+
• Discussion of the number of providers generated with Terrajet and where they can be found
|
| 51 |
+
• List of new providers added to Crossplane, including Equinix, Exoscale, and Jet Linode
|
| 52 |
+
• Discussion on TerraJet's ability to handle large numbers of CRDs (custom resource definitions) with APIs
|
| 53 |
+
• Introduction of a new provider for AWS that has 765 CRDs
|
| 54 |
+
• Explanation of how a Crossplane provider was added in just 12 commits
|
| 55 |
+
• Announcement of upcoming changes for Terrajet, including stabilized API groups and commercial WebHooks
|
| 56 |
+
• Demonstration of how easy it is to create a new Crossplane provider using TerraJet
|
| 57 |
+
• Installation of Crossplane and the Linode provider in production
|
| 58 |
+
• Explanation of how small images can be used to pull larger images with metadata
|
| 59 |
+
• Crossplane used to provision a new Linode Kubernetes Engine (LKE) cluster
|
| 60 |
+
• The CRD (Custom Resource Definition) in Linode Jet Crossplane IO v1 Alpha 1 group is used for provisioning clusters
|
| 61 |
+
• Terrajet uses Terraform's tfstate and exports it as a secret, which is then decoded by Crossplane to generate the kubeconfig
|
| 62 |
+
• The goal is to create a self-updating, self-provisioning system where Crossplane can provision resources within the cluster without needing external kubeconfig
|
| 63 |
+
• If a resource (in this case, the cluster) is deleted, Crossplane will reconcile and try to recreate it after a 1-minute wait period
|
| 64 |
+
• Crossplane recreates a cluster and its nodes after it is accidentally deleted
|
| 65 |
+
• Composite resources allow for the creation of multiple resources in one composition
|
| 66 |
+
• The "batteries included" concept allows for installing base system components with a single composition
|
| 67 |
+
• Compositions can be used to define custom APIs and manage applications across multiple clusters
|
| 68 |
+
• Future plans include moving Crossplane from being hosted on a cluster to being hosted on Upbound cloud, allowing for centralized management of multiple clusters and other resources.
|
🎄 Merry Shipmas 🎁_summary.txt
ADDED
|
@@ -0,0 +1,136 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
• CI/CD Lego set (PR395) for changelog.com
|
| 2 |
+
• Continuous CPU profiling (PR396)
|
| 3 |
+
• Auto-restoring Kubernetes clusters (PR399)
|
| 4 |
+
• Dagger, a universal deployment engine introduced in episode 23
|
| 5 |
+
• Implementation and challenges of integrating Dagger with changelog's infrastructure
|
| 6 |
+
• Benefits of using Dagger for CI/CD pipelines
|
| 7 |
+
• Interactions between Q and BuildKit and how they're applied to BuildKit states
|
| 8 |
+
• Improvements in the new pipeline for compiling dependencies and running tests in parallel
|
| 9 |
+
• Use of caching mechanisms and ephemeral databases
|
| 10 |
+
• Changes to the API to make it more explicit and intuitive
|
| 11 |
+
• Integration with GitHub Actions and its potential use in the pipeline
|
| 12 |
+
• Overview of Dagger's current state and improvements being made
|
| 13 |
+
• Pipeline execution in parallel
|
| 14 |
+
• Caching of steps to speed up pipeline execution
|
| 15 |
+
• Dagger's ability to use caching for faster builds
|
| 16 |
+
• Comparison of Dagger and Docker build times
|
| 17 |
+
• OpenTracing integration for visualization of pipeline execution
|
| 18 |
+
• Flexibility to run pipelines on any CI setup, including GitHub Actions and CircleCI
|
| 19 |
+
• Demonstration of Dagger's cached run and its performance
|
| 20 |
+
• Discussion on using BuildKit to enable parallel execution of fine-grained steps
|
| 21 |
+
• Explanation of how GitHub Actions integration works with Dagger
|
| 22 |
+
• Breakdown of a specific GitHub Actions config file, including environment variables, jobs, and actions used
|
| 23 |
+
• Description of using Tailscale Tunnel for remote Docker access
|
| 24 |
+
• Discussion on committing secrets and using SOPS for encryption
|
| 25 |
+
• Transitioning from "environment" to "plan" or "DAG"
|
| 26 |
+
• Using CI package for tasks and automation
|
| 27 |
+
• Docker-based workflow with encrypted credentials
|
| 28 |
+
• Providing inputs for environment/plan/DAG, including source code and dependencies
|
| 29 |
+
• Explanation of queue configuration language and its features (schema definition, data validation)
|
| 30 |
+
• DAG or pipeline stages (app image, test container, etc.)
|
| 31 |
+
• Depths compile as a way to describe and apply structures in other places
|
| 32 |
+
• Discussion of the advantages of Queue over other configuration management tools like YAML and Helm
|
| 33 |
+
• Explanation of how Queue's schema definition feature can define the shape of a particular configuration, including constraints on different fields
|
| 34 |
+
• Example use case for Kubernetes deployments with CPU field constraints
|
| 35 |
+
• Description of how Queue's compiler errors steer users in the right direction
|
| 36 |
+
• Discussion of potential future developments in the Queue community, including a language server
|
| 37 |
+
• Mention of upcoming changes with Europa that will simplify and improve the user experience
|
| 38 |
+
• Profiling has been a key tool for developers since software engineering began
|
| 39 |
+
• Traditional profiling was expensive and only done when necessary
|
| 40 |
+
• Sampling profiling introduced a more efficient method, recording stack traces at statistically significant intervals (e.g., 100 times per second)
|
| 41 |
+
• This allows for detailed analysis of CPU usage and optimization opportunities
|
| 42 |
+
• Parca is an implementation that provides near real-time flame graphs and comparative CPU profiles for Kubernetes workloads
|
| 43 |
+
• It uses EVPF technology to minimize overhead and record stack traces directly in the kernel
|
| 44 |
+
• Benefits include saving money, improving performance, and understanding system bottlenecks.
|
| 45 |
+
• The Parca agent sends CPU profiles to the Parca server for analysis and visualization.
|
| 46 |
+
• The PPF (Profiling Format) standard is used for profiling data, allowing integration with other tooling and workflows.
|
| 47 |
+
• The server ingests CPU profiles from the agent and allows downloading in PPF format for external use.
|
| 48 |
+
• The Parca UI displays flame graphs, showing cumulative values of CPU usage for each span.
|
| 49 |
+
• Garbage collection can be a significant contributor to CPU spikes due to memory allocation and deallocation.
|
| 50 |
+
• Continuous profiling and symbolization can contribute to garbage collection spikes.
|
| 51 |
+
• Optimizations such as buffer reuse can help reduce memory allocations.
|
| 52 |
+
• The discussion begins with examining a Postgres database and its compiled binary, observing that it only shows memory addresses due to debug information being intentionally removed for size optimization.
|
| 53 |
+
• A workaround is mentioned using Debug Info D, a project hosting servers for on-demand debug symbol retrieval.
|
| 54 |
+
• Parker doesn't currently support this feature, but the developers are working on implementing it.
|
| 55 |
+
• The discussion moves on to examining an Erlang VM and its interpreted code, noting that it has a just-in-time compiler.
|
| 56 |
+
• A comparison is made with other dynamic languages and virtual machines, highlighting the need for runtime-specific implementation in Parker.
|
| 57 |
+
• The use of perf maps in Erlang is mentioned as a potential solution for symbolizing memory addresses on the fly.
|
| 58 |
+
• There are issues with implementing this feature for Erlang, but support is expected to be added in the future.
|
| 59 |
+
• The discussion concludes with an overview of the compare view in Parker, which allows users to compare two profiles side by side.
|
| 60 |
+
• Observations of CPU cycles and stack traces
|
| 61 |
+
• Analysis of performance metrics using a diff function
|
| 62 |
+
• Discussion of memory address symbolization
|
| 63 |
+
• Investigation into a memory address with unknown origin
|
| 64 |
+
• Use of Linux procfs to inspect binary code memory mapping
|
| 65 |
+
• Attempt to identify the source of an unknown memory address
|
| 66 |
+
• Discussion of a table that shows executable code coming from the binary
|
| 67 |
+
• Explanation of how the stack can sometimes be too tall when retrieving stack trace snapshots from eBPF
|
| 68 |
+
• Theoretical possibility of executing code on the stack in Erlang VM
|
| 69 |
+
• Proposal to ask Lucas Larson for expertise on the matter
|
| 70 |
+
• Mention of pull request 396 and a plan to follow up on it
|
| 71 |
+
• Review of Parca discussion and agreement to fix issue R
|
| 72 |
+
• Plan to use cross-plane to provision Linode Kubernetes cluster using TerraJet tool
|
| 73 |
+
• Discussion of testing generated provider with cross-plane control plane or local kind cluster
|
| 74 |
+
• Proposal to start with production setup, including installing cross-plane in the production environment
|
| 75 |
+
• discussion about providing a kubeconfig to access a cluster
|
| 76 |
+
• mention of TerraJet and its use in generating providers for crossplane
|
| 77 |
+
• confirmation that version 1.3 of crossplane is sufficient for using TerraJet
|
| 78 |
+
• demonstration of connecting to a system using TerraJet
|
| 79 |
+
• discussion of the TerraJet generation process and collaboration with other team members
|
| 80 |
+
• introduction of ProviderJet, a template for creating new repositories
|
| 81 |
+
• instructions on how to use the ProviderJet template to create a new repository
|
| 82 |
+
• Specifying provider name lower and upper case in a command
|
| 83 |
+
• Replacing all instances of template with the specified commands
|
| 84 |
+
• Understanding Terraform provider source and download name in Docker files
|
| 85 |
+
• Clarifying that Terraform provider source and download name are not the same thing
|
| 86 |
+
• Identifying the correct URL for the Linode Terraform provider
|
| 87 |
+
• Finding the changelog for the Terraform provider Linode
|
| 88 |
+
• Examining GitHub as a potential example of the V4 version
|
| 89 |
+
• Discussion about determining if a Linode provider is using an old version
|
| 90 |
+
• Importance of checking the Git repo for the Terraform provider to confirm version
|
| 91 |
+
• Realization that the V4 version is available as a Go package and can be imported
|
| 92 |
+
• Identifying the line in the Go module that needs to be updated or replaced
|
| 93 |
+
• Understanding how to use replace statements in the Go module to update dependencies
|
| 94 |
+
• Setting up credentials for Linode using environment variables and CLI tokens
|
| 95 |
+
• Clarification on where the Linode token is obtained
|
| 96 |
+
• Key username and its origin
|
| 97 |
+
• Inv token and its use
|
| 98 |
+
• TerraJet, a tool for utilizing the Terraform community's work in Crossplane
|
| 99 |
+
• Creating a Linode provider using TerraJet and Terraform
|
| 100 |
+
• TerraJet's design and functionality as a code generator and controller
|
| 101 |
+
• The history of Marcus's involvement with Terraform and Linode
|
| 102 |
+
• The current state of providers generated with TerraJet, including AWS, Azure, GCP, and others.
|
| 103 |
+
• ProviderJet AWS has 765 custom resource definitions (CRDs), which is too many for the Kubernetes community
|
| 104 |
+
• Another provider was added in the last week, which generated a ProviderJet Linode with 12 commits to Crossplane Contrib
|
| 105 |
+
• The previous Linode provider in Crossplane had not been maintained and may not work with the latest versions of Crossplane
|
| 106 |
+
• A single resource (LKE cluster) is currently available for provisioning in TerraJet, but additional resources are needed
|
| 107 |
+
• Future plans include announcements about stabilized providers (AWS, Azure, GCP), versioned resources, and conversion webhooks
|
| 108 |
+
• Implementing a cross-plane provider using TerraJet
|
| 109 |
+
• Ease of use with TerraJet compared to other implementations
|
| 110 |
+
• Example of a community-written provider (Exoscale) in 6 hours
|
| 111 |
+
• Adding an instance resource to JetLinit provider as simple as 10-15 lines of code
|
| 112 |
+
• Step-by-step process for creating a Crossplane Linode provider
|
| 113 |
+
• Installing Crossplane and the Linode provider using Helm
|
| 114 |
+
• Discussion of crossplane RBAC manager and pods
|
| 115 |
+
• Using Canines as a CLI for quick tasks
|
| 116 |
+
• Creating new clusters with Linode jet crossplane IO V1 alpha 1 group
|
| 117 |
+
• Provisioning new clusters using crossplane LKE
|
| 118 |
+
• Overview of how crossplane continuously reconciles requests
|
| 119 |
+
• Creation of a new LKE instance and cluster in Linode and Kubernetes
|
| 120 |
+
• Obtaining kubeconfig for the newly created cluster
|
| 121 |
+
• Discussion of using Crossplane to target a Kubernetes cluster without exposing the kubeconfig
|
| 122 |
+
• Exploring self-automated system where Crossplane provisions resources and updates application
|
| 123 |
+
• Demonstration of deleting a cluster and observing the controller's behavior in reconciling the absence of the cluster
|
| 124 |
+
• Explanation of how the controller will try to create a new cluster if it detects that one is missing, with a wait period of up to 1 minute
|
| 125 |
+
• Discussion of a custom resource that triggers a Kubernetes event
|
| 126 |
+
• Cluster creation and reconciliation process
|
| 127 |
+
• Issue with Linode node pool being deleted when cluster was deleted from UI
|
| 128 |
+
• Introduction to composite resources and their benefits in managing multiple resources as one
|
| 129 |
+
• Explanation of how composite clusters can recreate nodes, installations, and other dependencies automatically
|
| 130 |
+
• Example scenario where accidental deletion of a cross-plane cluster led to discussion on the importance of automated recreation of dependent resources
|
| 131 |
+
• Idea of improving current functionality by installing base components and using two compositions with XRDs to define APIs for multiple resources.
|
| 132 |
+
• Clusterscoped does not have any namespaces
|
| 133 |
+
• Creating a composition with base system components for a cluster
|
| 134 |
+
• Using a central production cluster with its own claim, similar to PVC, and referencing it from other namespaces via XRD
|
| 135 |
+
• Publishing a new API instead of manually configuring cloud-specific fields
|
| 136 |
+
• Moving Crossplane from being hosted on the current cluster to a seed cluster on a cloud like AWS or GCP
|