willtheorangeguy commited on
Commit
149f212
·
verified ·
1 Parent(s): 8f54409

add all 2021 summaries

Browse files
Files changed (44) hide show
  1. A monorepo of serverless microservices_summary.txt +43 -0
  2. A universal deployment engine_summary.txt +50 -0
  3. Assemble all your infrastructure_summary.txt +41 -0
  4. Bare metal meets Kubernetes_summary.txt +55 -0
  5. Cloud Native fundamentals_summary.txt +39 -0
  6. Cloud-native chaos engineering_summary.txt +37 -0
  7. Connecting your daily work to intent & vision_summary.txt +43 -0
  8. Crossing the platform gap_summary.txt +55 -0
  9. Docs are not optional_summary.txt +40 -0
  10. Elixir observability using PromEx_summary.txt +33 -0
  11. Find the infrastructure advantage_summary.txt +52 -0
  12. Gerhard at KubeCon NA 2021 Part 1_summary.txt +77 -0
  13. Gerhard at KubeCon NA 2021 Part 2_summary.txt +70 -0
  14. Gerhard at KubeCon NA 2021: Part 1_summary.txt +151 -0
  15. Gerhard at KubeCon NA 2021: Part 2_summary.txt +133 -0
  16. Grafana’s "Big Tent" idea_summary.txt +88 -0
  17. Grafana’s Big Tent idea_summary.txt +62 -0
  18. Honeycomb's secret to high-performing teams_summary.txt +39 -0
  19. Introducing Ship It!_summary.txt +37 -0
  20. Is Kubernetes a platform_summary.txt +44 -0
  21. Is Kubernetes a platform?_summary.txt +91 -0
  22. It's crazy and impossible_summary.txt +42 -0
  23. Kaizen! Are we holding it wrong_summary.txt +66 -0
  24. Kaizen! Are we holding it wrong?_summary.txt +127 -0
  25. Kaizen! Five incidents later_summary.txt +48 -0
  26. Kaizen! The day half the internet went down_summary.txt +59 -0
  27. Learning from incidents_summary.txt +47 -0
  28. Let's Ship It!_summary.txt +5 -0
  29. Money flows rule everything_summary.txt +50 -0
  30. OODA for operational excellence_summary.txt +38 -0
  31. OpenTelemetry in your CICD_summary.txt +45 -0
  32. OpenTelemetry in your CI⧸CD_summary.txt +134 -0
  33. Optimize for smoothness not speed_summary.txt +40 -0
  34. Real-world implications of shipping many times a day_summary.txt +49 -0
  35. Shipping KubeCon EU 2021_summary.txt +49 -0
  36. The foundations of Continuous Delivery_summary.txt +58 -0
  37. What does good DevOps look like_summary.txt +38 -0
  38. What does good DevOps look like?_summary.txt +70 -0
  39. What is good release engineering_summary.txt +36 -0
  40. What is good release engineering?_summary.txt +63 -0
  41. Why Kubernetes_summary.txt +42 -0
  42. Why Kubernetes?_summary.txt +66 -0
  43. 🎄 Merry Shipmas 🎁_summary.txt +68 -0
  44. 🎄 Merry Shipmas 🎁_summary.txt +136 -0
A monorepo of serverless microservices_summary.txt ADDED
@@ -0,0 +1,43 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • The Skyhook team worked together in 2019 on a serverless project and have since been out of touch.
2
+ • The COVID-19 pandemic had a significant impact on Skyhook as a travel website business, but also presented an opportunity to rethink their product and improve it.
3
+ • Skyhook is a website that allows users to book adventure trips with local guides, providing a unique and authentic experience.
4
+ • The team decided to move towards serverless technology, initially using AWS Lambda functions backed by an RDS database (Aurora).
5
+ • They later realized the limitations of this approach and began exploring other options, including DynamoDB and splitting their services into separate databases.
6
+ • The team eventually moved to a more modular architecture with each service having its own DynamoDB database.
7
+ • Switch from REST API to GraphQL/AppSync
8
+ • Implementation of a microservices-based architecture with serverless functions
9
+ • Improved reliability and reduced bugs in the system
10
+ • Reduced deploy times from 20 minutes to 3 minutes
11
+ • Increased testing and faster feedback cycles
12
+ • Addition of feature flags for rapid feature deployment and customer testing
13
+ • Using AWS AppSync for synchronous communication between microservices
14
+ • Utilizing AWS Event Bridge for asynchronous communication between services
15
+ • Implementing Next.js with Vercel for server-side rendering and caching of static pages
16
+ • Serving the application through a custom deployment environment using GitHub Actions and Vercel's zero-config option
17
+ • Achieving fast latency (10ms) in internal service interactions, but potentially improving it
18
+ • Exposing API services to individual microservices for data querying
19
+ • Using standardized JSON objects with schemas for event bus messages
20
+ • Discussion of Vercel vs Netlify for zero-config deployment
21
+ • Benefits of using Vercel with Next.js as the parent company
22
+ • Managing environments, including multiple PR-specific URLs and data migration
23
+ • GitHub Actions setup for automated testing and deployments
24
+ • Single repository approach for microservices, including benefits and challenges
25
+ • Automated testing and linting on code changes, including integration tests
26
+ • Configuration and setup of services using Hygen tool for CDK and AWS
27
+ • Storage of configuration in the repository next to usage
28
+ • Changes to infrastructure deployment using AWS CDK
29
+ • Avoidance of CloudFormation due to complexity and yaml issues
30
+ • Development experience improvements, including environment portability and data management
31
+ • Challenges with payments provider during pandemic, including disabled refunds and changed regulations
32
+ • Discussing potential solutions for improving development experience and overcoming current challenges
33
+ • The importance of customer experience and managing risks in third-party services, particularly with payment providers
34
+ • A case study on a travel company's experience with a payment provider that suddenly prevented automatic refunds across their API
35
+ • How the company resolved the issue by convincing their provider to re-enable automatic refunds for them
36
+ • An alternative solution using tools like Spreedly to hook in with multiple payment providers
37
+ • A second incident where a system issue was solved with an unorthodox approach involving event streams and Lambda functions
38
+ • The importance of prioritizing customers' needs over shipping code or adding new features
39
+ • A discussion on the feature "hosts sign-up" that improved the process for hosts to get signed up, resulting in a 5-fold increase in host sign-ups
40
+ • Development of a user-friendly cancellation feature on the Skyhook marketplace
41
+ • Utilization of third-party tooling (e.g. Algolia) to implement features such as search functionality and improve development speed
42
+ • Adoption of serverless tools (e.g. AWS Lambda) for faster code deployment and improved customer experience
43
+ • Use of Drip for email marketing services due to its e-commerce specialization
A universal deployment engine_summary.txt ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Introduction to Dagger, a new tool for application delivery
2
+ • Origins of Dagger: founders' experience at Docker and desire to work together on a new project
3
+ • Problem of fragmentation in CI/CD systems and infrastructure management tools
4
+ • Dagger's solution: unifying existing tools into a cohesive platform for application delivery
5
+ • Focus on applications rather than infrastructure, considering infrastructure as a dependency
6
+ • The "value line" and how it shifts over time, with changes in technology and building blocks (e.g. containers)
7
+ • Definition of an application: everything needed to deploy it, including continuous deployment tasks
8
+ • Dagger's goal is to provide a ubiquitous application delivery standard that allows companies to define their own answer to the question "Where is the line between application and infrastructure?"
9
+ • Dagger differs from Docker by not trying to be a runtime for applications, but rather allowing users to tell it how they want to run and deploy their applications.
10
+ • CUE (Configuration Superpowers for Everyone) is the configuration language used by Dagger to declare application delivery flows.
11
+ • CUE provides a powerful way for platform engineers or application developers to define everything needed to take code from a repository to running live on any environment.
12
+ • Dagger uses CUE packages to provide reusable building blocks, including standard library packages and cloud provider-specific packages.
13
+ • Users can import these packages and use them in their configuration files.
14
+ • Configuration files are used to declare inputs (including secrets) and define how to deploy the application.
15
+ • Running "dagger up" executes the defined deployment plan.
16
+ • Deployment fragmentation: multiple tools and scripts required for deployment
17
+ • Yaml configuration complexity and limitations
18
+ • The need for a more portable and reusable deployment solution
19
+ • Dagger as a potential solution, offering a better development experience and reusability
20
+ • Comparison to Docker's impact on packaging and running applications
21
+ • Potential for Dagger to change the way code is deployed in the future
22
+ • Buildkit and LLB (Low-Level Binary) explanation
23
+ • Dagger using Buildkit for more than just building
24
+ • DAG computation and pipelines
25
+ • Docker dependency and alternatives (Containerd, runC)
26
+ • Volumes and remote execution
27
+ • Comparison with TerraForm (infrastructure management vs CI/CD pipeline portability)
28
+ • Internal use of Dagger at the company
29
+ • Implementing tests using CUE
30
+ • Dagger replacing CI logic for portable test running
31
+ • Deployment of DAGs with Dagger
32
+ • Go Releaser being used in conjunction with Dagger
33
+ • Dagger's closed beta and access process
34
+ • Learning from Docker's success and mistakes
35
+ • Designing a cloud product alongside the open source tool
36
+ • Importance of community involvement in Dagger development
37
+ • Encouraging external contributions as an extension of the internal team
38
+ • The importance of community engagement in building an ecosystem
39
+ • Defining open source contributors as "power users" who contribute to code and documentation
40
+ • How to best contribute to the project: using it, engaging with it, and providing feedback on its usability and documentation
41
+ • Priorities for the project, including:
42
+ + Building a strong and engaged core community of developers
43
+ + Creating successful accounts (actual projects using Dagger)
44
+ + Developing a cloud product with good conversion and retention rates
45
+ • Job openings for founding team members to help build the company and evolve the product
46
+ • The difficulty of finding the ideal candidate for a project or role
47
+ • The pain points and challenges of DevOps and CI/CD
48
+ • The potential for innovation and excitement in the industry despite current difficulties
49
+ • The Dagger platform's closed beta and plans to make it widely available once ready
50
+ • The availability of support and resources from the Dagger team, including community access and expert advice.
Assemble all your infrastructure_summary.txt ADDED
@@ -0,0 +1,41 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Marques is still involved with Crossplane, but not part of the current podcast
2
+ • The version of Crossplane in November 2019 was 0.5.0, and now it's on 1.3.0
3
+ • There have been over 1,800 commits since 0.5.0 from 24 contributors
4
+ • The user experience of Crossplane has changed significantly, with more flexibility and power in defining compositions and abstractions
5
+ • Compositions are a way to combine resources to satisfy abstract types, and can be combined within each other
6
+ • Configuration packages declare dependencies on providers and other configurations, allowing for the creation of complex platforms
7
+ • Defining abstractions in Crossplane and enabling flexibility for users to define their own
8
+ • Discovering and sharing abstractions through registries and repositories
9
+ • Packaging and sharing of abstractions using OCI-compliant registries
10
+ • Building a registry with rich discoverability features by Upbound
11
+ • Creating a directed acyclic graph (DAG) to resolve dependencies and conflicts between configuration packages
12
+ • Importance of Crossplane in providing a unified API for infrastructure management
13
+ • Evolution of the story behind Crossplane, from storage orchestration to dynamic provisioning of various infrastructure resources
14
+ • Business value of using Crossplane in shared services infrastructure platform teams and application teams
15
+ • Challenges of managing infrastructure across different cloud services and providers
16
+ • Overview of Crossplane's value proposition for building customized infrastructure platforms
17
+ • Importance of discoverability and ease of use in onboarding with Crossplane
18
+ • Role of Upbound Cloud in providing additional features and functionality beyond the open-source version
19
+ • Reference platforms and documentation available to help users get started and learn more about Crossplane
20
+ • Crossplane abstractions for defining entire infrastructure setup
21
+ • Linode provider exists and can be used with Crossplane
22
+ • Integrating CDN (Fastly) with Crossplane as a resource
23
+ • Helm and Kubernetes providers available in Crossplane
24
+ • Template or configuration package for deploying Phoenix web app possible through Crossplane registry
25
+ • Relationship between Crossplane and Argo CD, including using GitOps to provision infrastructure and applications
26
+ • Two options for managing control plane: running Crossplane on premises or using Upbound Cloud's hosted instance
27
+ • Issues with Kubernetes are not relevant as long as Crossplane is always available and healthy.
28
+ • The value proposition of Crossplane lies in its decoupling from infrastructure management, allowing users to focus on other tasks.
29
+ • A hosted control plane is important for provisioning infrastructure and ensuring infrastructure health.
30
+ • Automating infrastructure management through managed services can free up teams to work on more complex and interesting problems.
31
+ • Crossplane's goal is to automate tedious tasks, not eliminate jobs, but rather enable teams to focus on higher-level tasks.
32
+ • Open sourcing and community development for Crossplane
33
+ • Extending Crossplane through APIs and providers for multi-cloud support
34
+ • Comparison with Terraform, including differences in active reconciliation and permissioning at abstraction level
35
+ • Crossplane's composition model and its benefits for infrastructure management and isolation
36
+ • Hack week results, including new provider developments and tooling enhancements
37
+ • Development of tools for integrating designers into the app development process
38
+ • Hack week project: k8s container registry, allowing direct image pushing into Kubernetes without an external registry
39
+ • WebAssembly and browser-based OCI image building
40
+ • Community growth and contribution to Crossplane.io
41
+ • Future vision of infrastructure management with higher-level abstractions and control planes
Bare metal meets Kubernetes_summary.txt ADDED
@@ -0,0 +1,55 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Gerhard Lazu shares his personal experience of almost joining Packet in the summer of 2019 due to an email mix-up
2
+ • Marques Johansson and David Flanagan discuss what attracted them to Equinix Metal (formerly Packet), highlighting their interest in bare metal infrastructure and networking capabilities
3
+ • The impact of the Equinix acquisition on Packet's products and services, including expanded global reach and integration with Equinix's existing infrastructure
4
+ • David Flanagan shares his experience using Packet before the Equinix acquisition and notes the benefits of integrating with Equinix's extensive network
5
+ • Acquisition of Packet by Equinix
6
+ • Evolution from bare metal servers to Equinix Metal platform
7
+ • Benefits of leveraging Equinix network and infrastructure
8
+ • Trade-offs in instance size and pricing
9
+ • Importance of maintaining the "purity" of bare metal experience
10
+ • Challenges and considerations for providing managed Kubernetes on top of bare metal
11
+ • Definition of Kubernetes and its components
12
+ • Challenges of running Kubernetes on bare metal, particularly for HPC workloads
13
+ • Evolution of Kubernetes over the next five years towards more bespoke implementations
14
+ • Kubeadm as a popular tool for deploying Kubernetes
15
+ • Cluster API as an opinionated way to deploy Kubernetes clusters with automated remediation
16
+ • Tools for managing multiple clusters and visualizing cluster infrastructure
17
+ • Discussion of UI tools for Kubernetes management, including Argo CD and Flux
18
+ • Use cases for managing multiple Kubernetes clusters through a management cluster
19
+ • Introduction to Rawkode Academy, a YouTube channel focused on cloud-native technology and Kubernetes learning
20
+ • Challenges of keeping up with evolving technology and importance of sharing knowledge and expertise
21
+ • Example episode of Klustered, where hosts Thomas Stromberg and Kris Nova intentionally try to "wreck each other's clusters" in a livestream
22
+ • The hosts discuss episodes of Rawkode Academy where they fix broken Kubernetes clusters with varying levels of complexity.
23
+ • Kris Nova uses advanced techniques (LD_PRELOAD, kernel modules, eBPF) to debug a cluster, while Thomas Stromberg uses forensic analysis tools to help identify issues.
24
+ • David Flanagan recommends an episode featuring MayaData's team discussing CSI driver development and storage architecture.
25
+ • The hosts discuss the format shift of Rawkode Academy from individual fixes to more complex cluster breaks.
26
+ • They also mention the evolution of breaks in clusters over time, with participants now modifying Go code for kubelet and recompiling it.
27
+ • Gerhard Lazu suggests renaming Rawkode Academy to "Break my Kubernetes" or a similar title due to its focus on debugging and fixing issues.
28
+ • The conversation turns to the complexity of Kubernetes clusters and how each one is unique in its problems, making debugging and running them efficiently challenging.
29
+ • Challenges of managing workloads across many servers
30
+ • Kubernetes as a solution for container management
31
+ • Trade-offs between microservices architecture and operational complexity
32
+ • Declarative configuration and stateful declaration in Kubernetes
33
+ • Using Kubernetes with monolithic applications
34
+ • Benefits of using Kubernetes, including service discovery, DNS, reconciliation, and remediation
35
+ • Ecosystem and community around Kubernetes and its software extensions (controllers and CRDs)
36
+ • Crossplane as an alternative to Terraform for managing infrastructure as code
37
+ • Infrastructure deployment using Crossplane
38
+ • User data scripts for provisioning devices
39
+ • Equinix Metal provider integration with Crossplane
40
+ • Complexity of deploying Changelog's monolithic app
41
+ • Kubernetes issues with Kube-proxy, Calico, and Cilium
42
+ • Performance problems with long HTTP request tails
43
+ • Blue/green deployment methodology for upgrades and testing
44
+ • Use of bare metal for CPU-intensive tasks or stream processing to improve performance
45
+ • Virtualized setups can suffer from "noisy neighbors" issues due to shared resources
46
+ • Cloud providers' interest in maximizing costs and profits leads to resource contention
47
+ • Hybrid architectures with both virtualized and bare metal infrastructure may be necessary
48
+ • Equinix Metal's partnership with cloud services like Fly.io for building a CDN in 5 hours
49
+ • Evaluating the benefits of using bare metal versus managed Kubernetes services for specific workloads
50
+ • Benefits of using bare metal infrastructure compared to virtualized environments
51
+ • Tinkerbell project: an open-source tool for deploying and managing bare metal infrastructure
52
+ • Challenges of operating bare metal, including the need for specialized knowledge and expertise
53
+ • Equinix Metal's API and high-level abstractions (e.g. Crossplane, Kubernetes) for managing bare metal resources
54
+ • Pros and cons of using bare metal, including flexibility, performance, and visibility into system operations
55
+ • Potential use cases and applications for bare metal infrastructure
Cloud Native fundamentals_summary.txt ADDED
@@ -0,0 +1,39 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • The hosts Gerhard Lazu and Katie Gamanji discuss how they met at an End User Partner Summit
2
+ • Katie Gamanji shares her experience with cloud-native tools, starting with Kubernetes setup difficulties and progress in documentation improvements
3
+ • Katie introduces the Cloud-Native Fundamentals course, aiming to provide a practical approach to understanding the landscape and using specific tools
4
+ • Gerhard praises the diversity of approaches and choices in the cloud-native landscape, which can be overwhelming for beginners
5
+ • Katie explains her curation process for the course, focusing on breaking down complex topics into fundamental principles and easy-to-follow steps
6
+ • CI/CD pipeline separation
7
+ • Use of GitHub Actions for CI and Argo CD for CD
8
+ • Importance of clear distinction between continuous integration and delivery
9
+ • Interoperability and diversity of tooling in cloud-native environment
10
+ • Separation of CI and CD allows for independent changes and flexibility
11
+ • Unix philosophy applied to cloud-native with small utilities combined in infinite ways
12
+ • Cloud-native approach benefits from being pluggable and interoperable
13
+ • Kubernetes can be replaced with other scheduling platforms like Nomad or serverless options
14
+ • Serverless computing has its advantages, but may not be suitable for every organization
15
+ • Modernization of infrastructure is required to take full advantage of cloud services
16
+ • A PaaS (Platform as a Service) may be a viable alternative to container orchestration tools
17
+ • Monolithic architecture can be an acceptable starting point for development, but should be broken down into microservices once the team grows and becomes more complex.
18
+ • The importance of segregating applications into microservices for fault tolerance and independent management
19
+ • The need to reiterate and adjust the segregation of services as the application evolves
20
+ • Merging microservices to optimize management and improve performance
21
+ • Stale or unused microservices should be retired from the application
22
+ • Understanding the organization's requirements and context is crucial in determining whether microservices are necessary
23
+ • Kubernetes is a suitable option for managing microservices, but not always the best choice, especially for small teams or startups with limited resources
24
+ • Cloud providers can offer free tiers and be a more accessible option for smaller teams or organizations
25
+ • Kubernetes as a tool for managing complex applications, providing automated scaling, declarative representation, and control managers to ensure desired state.
26
+ • Custom resource definitions (CRDs) and Ingress for managing reachability and granular control over HTTP endpoints.
27
+ • Kubernetes' unified API and scalability across various platforms.
28
+ • Pipeline and continuous integration and delivery (CI/CD) processes for automating updates and deployments to production environments.
29
+ • Stages of CI/CD including testing, packaging, storing, and distributing artifacts, and propagating changes through dev, QA, staging, and production environments.
30
+ • GitOps strategy and its importance in cloud-native development
31
+ • Argo CD vs FluxCD, with Argo CD being preferred due to its visual interface and community support
32
+ • Choice of CI tool, with GitHub Actions being recommended for simplicity
33
+ • Importance of monitoring, telemetry, logs, traces, and events in application development, including readiness and liveness probes
34
+ • Observability in cloud-native development, including Grafana and Prometheus for metrics collection and visualization
35
+ • Instrumenting code for monitoring and debugging purposes
36
+ • Cloud-native development requires a DevOps culture
37
+ • DevOps is not just a tool or technology, but a collaboration between application developers and infrastructure engineers to leverage tools for transparency and efficiency
38
+ • A course on cloud-native fundamentals is being developed and will be free, with the first four courses (Cloud-native Fundamentals, Message Passing, Observability, and Security) making up a nano-degree that will be available as a standalone paid option
39
+ • The course aims to make cloud-native ubiquitous and accessible to everyone, with the author hoping to reach the next generation of cloud-native practitioners
Cloud-native chaos engineering_summary.txt ADDED
@@ -0,0 +1,37 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Reliability of systems and infrastructure is often assumed, but failures can occur at any time
2
+ • Chaos engineering is a method for testing system resiliency by introducing artificial faults
3
+ • Importance of chaos engineering in preventing costly downtime and improving overall reliability
4
+ • Applying chaos engineering principles to specific systems such as CDNs and complex microservices environments
5
+ • Need for developers, SREs, and site reliability engineers to work together to fix root causes of failures
6
+ • Chaos engineering involves testing at multiple levels, including infrastructure dependencies and service reliability.
7
+ • Definition of chaos engineering
8
+ • Importance of steady-state hypothesis and understanding system behavior
9
+ • Injecting harm (faults) to build immunity (resilience)
10
+ • Scientifically trying to understand user happiness through metrics, logs, and events
11
+ • Willful fault injection to verify system behavior and identify tolerance limits
12
+ • Applying non-best practices in small doses for security and performance testing
13
+ • Chaos engineering as a practice to intentionally break and test systems to improve resilience
14
+ • Importance of learning from failures rather than successes in software development
15
+ • Applying chaos engineering to monolithic applications, not just microservices
16
+ • Tools and platforms for chaos engineering, such as LitmusChaos
17
+ • Best practices for implementing chaos engineering, including playing the role of a person outside the system, using good metrics and monitoring, and starting with small experiments in pre-production environments
18
+ • Litmus is an open-source, CNCF project that provides chaos engineering capabilities for Kubernetes environments.
19
+ • It can be installed as a Helm chart or operator with its own CRDs.
20
+ • The control plane of Litmus sets up the account and user access, while the agent infrastructure is where experiments are executed.
21
+ • Argo workflows are used to construct scenarios, and Argo CD integrates with Litmus for GitOps support.
22
+ • Litmus can be triggered by event tracker functionality via Argo CD updates or other GitOps tools.
23
+ • It supports storing chaos artifacts in Git, allowing changes to reflect on the chaos center.
24
+ • Users without Kubernetes can spin up a small cluster to use Litmus and create chaos scenarios for non-Kubernetes environments.
25
+ • Running databases on Kubernetes is discussed, with Uma expressing that it's becoming more feasible due to active community support.
26
+ • Stateful sites and distributed databases are key elements in Kubernetes
27
+ • Storage systems and containerized storage solutions (e.g. OpenEBS) are evolving for running databases on Kubernetes
28
+ • Networking issues, such as latency and packet loss, can impact database replication and performance
29
+ • Distributed application architecture, such as message brokers, can make it easier to run on Kubernetes
30
+ • Chaos engineering is essential for testing failures in Kubernetes environments and improving resilience
31
+ • Different platforms (e.g. AWS, GCP, Linode) have varying recovery times and require tailored approaches
32
+ • Infrastructure matters and needs to be considered when running databases on Kubernetes
33
+ • The importance of testing reliability in production, rather than just in staging
34
+ • Chaos engineering as a tool for simulating failures and improving system resilience
35
+ • The value of creating random triggers to test systems after changes are made in production
36
+ • The need for a culture of continuous chaos engineering at all levels of an organization
37
+ • The ultimate goal of chaos engineering is to be able to confidently break things in production, thereby ensuring system reliability
Connecting your daily work to intent & vision_summary.txt ADDED
@@ -0,0 +1,43 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Disconnect between vision, actions, and reported outcomes
2
+ • Arnaud's Y Combinator demo and its challenges in condensing a message into 60 seconds with one slide
3
+ • Echoes' 60-second pitch to investors
4
+ • Product Hunt launch as part of Y Combinator's advice on being public and launching early
5
+ • The importance of shipping early and getting feedback from customers
6
+ • Changes to Echoes since its launch at Y Combinator, including refining the ideal customer and messaging
7
+ • The universal problem that Echoes aims to solve: connecting daily work as engineers to intent in companies with more than 20 engineers
8
+ • The key value of Docker and Echoes is creating a shared understanding among teams and stakeholders.
9
+ • Measuring the right level of information is crucial for success, but current metrics often fail to provide actionable insights.
10
+ • Lines of code, PRs closed/merged, etc. are examples of metrics that don't accurately reflect quality or progress.
11
+ • The true metric should be whether work is creating value for the business in a sustainable way.
12
+ • Measuring intent (why something is being done) is essential, but difficult to capture with current systems.
13
+ • Echoes aims to provide a central definition of intent and make it easy for engineers to express their reasons behind their work.
14
+ • This will enable a consolidated view on what teams are working towards and how they're progressing towards those goals.
15
+ • Infering code intent and developer habits may not be relevant or accurate
16
+ • Importance of understanding and agreeing on "Why" in organizational goals and objectives
17
+ • Arnaud's passion for developer empowerment and mission to help companies improve context for engineers
18
+ • Differentiating between poor ("making money", "getting followers") and good ("customer satisfaction", "empathy") Why examples
19
+ • Autonomous teams and product team organization model as a solution to complex interactions and information flow issues
20
+ • The importance of clear vertical communication within organizations
21
+ • Challenges in scaling technical organizations and maintaining business-technical alignment
22
+ • The role of intent and money flows in driving decision-making in large companies
23
+ • Structuring information for different layers to promote efficient communication
24
+ • Using OKR (Objectives and Key Results) model to align individual goals with company objectives
25
+ • Measuring and mitigating bias in open source communities
26
+ • Differences between open source and commercial product intentions
27
+ • Challenges of reconciling a company's interests with an open source project's needs
28
+ • Importance of transparency and understanding motivations for using open source
29
+ • Docker's experience with open sourcing its project and its subsequent challenges
30
+ • Discussion on the current state of a company after a hype period has passed
31
+ • Arnaud Porterie's experience and motivations for starting Echoes, a new project
32
+ • Key aspects of Echoes: its focus on being virtuous for everyone involved and improving quality of life for engineers
33
+ • Importance of tools in reflecting an organization's culture
34
+ • The need for feedback and help to make Echoes successful
35
+ • History and meaning behind the name "Echoes"
36
+ • Arnaud Porterie's background as a Pink Floyd fan and his use of band-related names for projects
37
+ • Discussion on finding the right path or sense of direction in work, using intuition and foresight
38
+ • Echoes does not access code or count lines of code contributed/deleted
39
+ • Echoes helps capture interactions between teams and orgs, not performance reviews or grading
40
+ • Value in combining goals (why), daily tasks (what), and progress towards them
41
+ • Potential benefits for small teams with limited resources to focus efforts
42
+ • Future developments: tying outcomes to metrics, integrating with HR systems
43
+ • Gerhard Lazu's interest in using Echoes at Changelog and Arnaud Porterie's willingness
Crossing the platform gap_summary.txt ADDED
@@ -0,0 +1,55 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Platforms and platform thinking
2
+ • Colin Humphreys' experience with Cloud Foundry and building platforms
3
+ • Shift from project to product mindset in the industry
4
+ • Platform-as-a-product approach and taking product methodology to the platform layer
5
+ • Gerhard Lazu's unfulfilled promise from 7 years ago
6
+ • Crossing the platform gap and its challenges
7
+ • The concept of the "platform gap" as described by Paula Kennedy
8
+ • Two approaches to addressing the platform gap: organization change (team topologies) and treating platforms as products
9
+ • Pre-recording talks for conferences and the benefits and drawbacks of this approach
10
+ • Chris Hedley's background in application development and his experience with Cloud Foundry
11
+ • The potential for platforms to reduce organizational friction and enable teams to focus on delivering value
12
+ • The limitations of trying to create a single platform that fits all organizations
13
+ • The importance of tailoring platforms to specific business needs and industry requirements
14
+ • The need for platform developers to take ownership of building and operating their own platforms
15
+ • The current state of cloud-native ecosystems being too complex for many users
16
+ • The desire for a simplified PaaS experience, but with the ability to customize and compose it to fit individual needs
17
+ • Syntasso's framework, Kratix, which helps organizations build tailored platforms for their business needs
18
+ • Difficulty in managing complex cloud-native landscapes with multiple Kubernetes clusters
19
+ • Limitations of traditional operators technology for building and distributing software across multiple clusters
20
+ • Introduction of Kratix framework to address the problem of providing a platform API across multiple Kubernetes clusters
21
+ • Concept of "promises" to deliver services as needed by application teams, prioritized through collaboration between platform and application teams
22
+ • Defining "promises" as abstractions above operators to offer things as a service from the platform team
23
+ • Collaborating with application teams to understand their needs and defining custom resource definitions
24
+ • Creating promises that encapsulate complexity and provide sane defaults for developers
25
+ • Using Kratix's promise framework to deliver services such as Java stacks or Jenkins
26
+ • Tying concepts together through platform-as-a-product thinking, collaboration, and ongoing lightweight interaction between teams
27
+ • Maintaining the product lifecycle of promises, including testing and upgrading operators and resources
28
+ • Templating system discussion
29
+ • Introduction to Kratix framework and its capabilities
30
+ • Comparison with Helm and other templating languages
31
+ • Day 1 vs day N experiences with Kratix
32
+ • Role of operators in maintaining and upgrading systems
33
+ • Importance of versioning in Kubernetes API
34
+ • Benefits and drawbacks of combining multiple schedulers and technologies
35
+ • Introduction to Flux and its role within GitOps toolkit
36
+ • Argo CD vs Flux and the role of the GitOps toolkit in Kubernetes
37
+ • Custom resource definitions (CRDs) and controllers/operators in K8s
38
+ • Testing Kratix, including use of Ginkgo-based test suite and property-based testing
39
+ • Value of K8s native technologies, such as Flux, over non-K8s-native technologies like Concourse
40
+ • Syntasso's experience with Kratix development, including limited CI/CD capabilities
41
+ • Complexity of integration tests for CRDs and Kubernetes
42
+ • Use of KinD and Kubebuilder v3 to simplify testing and development
43
+ • Challenges of balancing speed and investment in testing as the company grows
44
+ • The small team size and structure of the company (CEO, CTO, and a small engineering team)
45
+ • Future plans and constraints, including potential scaling of the engineering team and consultancy side
46
+ • Kratix is a software solution that enables organizational change through the implementation of Team Topologies and platform development
47
+ • Customers are using Kratix to perform a Reverse Conway Maneuver, creating platform teams with great interactions with application teams
48
+ • Syntasso is investing in scaling up to meet demand for Kratix, hiring people, and growing as a company
49
+ • The key takeaway from the conversation is that people need platforms to help them go faster, and Syntasso wants to help build differentiated and valuable platforms through Kratix
50
+ • The goal of Kratix is to provide a framework for building platform development, making it easier for teams to create customized platforms on Kubernetes
51
+ • Discussion of Chris Hedley being the one who provides honest opinions
52
+ • Colin Humphreys confirming Chris's reputation for honesty
53
+ • Gerhard Lazu mentioning Team Topologies and wanting to read it
54
+ • Paula Kennedy recommending Team Topologies as good and practical
55
+ • Gerhard Lazu expressing interest in trying out Kratix (described as a system)
Docs are not optional_summary.txt ADDED
@@ -0,0 +1,40 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Importance of documentation in coding
2
+ • Personal experiences with documentation as a developer
3
+ • Role of documentation in enabling user experience
4
+ • Connection between documentation and code
5
+ • Documentation as an API to the product
6
+ • Impact of good documentation on user retention and success
7
+ • Challenges of context-switching for developers and potential solutions through documentation
8
+ • Rethinking documentation approaches for better developer experience
9
+ • Importance of documenting code alongside development process
10
+ • Why documentation should not be optional for a product
11
+ • Value of having writers involved in the development process
12
+ • Strategies for smaller teams or teams without dedicated writers (hiring technical writers, product team writing docs, having a champion)
13
+ • Best practices for developers to write documentation during the development process
14
+ • Undervalued technical writers are often overstretched and expected to know everything about complex systems.
15
+ • Documentation can be treated as part of the development process, allowing for ongoing documentation and improved learning experiences.
16
+ • There are three stages of documentation: ignoring documentation, writing basic documents as a developer, and having a dedicated team with technical writers.
17
+ • Effective documentation should consider different learning styles, including visual, interactive, and text-based content.
18
+ • Documentation is not just text, but rather a learning experience that can include videos, interactive elements, and other multimedia content.
19
+ • The goal of documentation is to provide context and clarity for users, rather than simply presenting information.
20
+ • Reevaluating documentation approaches for GitHub Actions
21
+ • Introducing storytelling and visuals to make documentation more engaging
22
+ • Competitive research and incorporating community contributions
23
+ • Prioritizing user needs, including new users and those familiar with the product
24
+ • Revamping the GitHub Actions page with improved discoverability and search functionality
25
+ • The evolution of GitHub Actions' UI and documentation over time
26
+ • Kathy Korevec's efforts to improve GitHub Actions' documentation as part of her broader mandate to enhance documentation at GitHub
27
+ • The importance of community feedback and iteration in improving products like GitHub Actions
28
+ • The concept of earned trust by developers when using GitHub Actions, particularly considering its initial beta release and potential flaws
29
+ • The significance of focusing on details and iterating rapidly to win back user trust and loyalty
30
+ • Documenting code and repository structure
31
+ • Pros and cons of having documentation in a single repository vs. separate from code
32
+ • Benefits of tying documentation to GitHub Actions and workflows
33
+ • Potential for automating documentation flow with templates and synchronization
34
+ • Considerations for small teams vs. larger organizations
35
+ • Use cases for private and public documentation repositories
36
+ • Discussion of potential follow-up interview with Kathy Korevec now at Vercel
37
+ • Importance of embracing failure in the industry and learning from it
38
+ • Bias towards loss and negative emotions associated with failure vs. success
39
+ • Value of admitting mistakes and using them as opportunities for growth
40
+ • Significance of documentation for developers and its role in unlocking understanding and productivity
Elixir observability using PromEx_summary.txt ADDED
@@ -0,0 +1,33 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Alex Koutmos discusses his work on Elixir projects, including Changelog app optimizations
2
+ • PromEx library for Prometheus metrics and Grafana dashboards is introduced
3
+ • Features of PromEx include automatic configuration, plugin support, and annotations for deploys
4
+ • Discussion on the challenges of manual Prometheus and Grafana setup and how PromEx addresses them
5
+ • Alex Koutmos shares his experience with Erlang 24's just-in-time compiler and its potential benefits for Elixir and Phoenix applications
6
+ • Elixir OTP 24 performance improvements (30-50% increase)
7
+ • PromEx and its integration with Prometheus metrics and Grafana Agent
8
+ • Observability pillars: metrics, logs, and traces, and their benefits and trade-offs
9
+ • Potential advantages of using events as a single observability data store
10
+ • Differences between metrics and logs
11
+ • Current limitations of monitoring tools (metrics/logs/traces)
12
+ • Potential for unified observability tool or approach
13
+ • Benefits of explicit tools for specific purposes vs. one unifying tool
14
+ • The role of exemplars in bridging the gap between metrics, traces, and logs
15
+ • Challenges of using logs as a source of metrics and performance data
16
+ • Log support in PromEx is limited to shipping mechanism
17
+ • PromEx uses Grafana Agent for exporting logs to Loki
18
+ • Discussion of events and how they are used in Elixir/Erlang ecosystem
19
+ • OpenTelemetry implementation for tracing in Elixir/Erlang
20
+ • Telemetry library for surfacing internal library events
21
+ • PromEx converts telemetry events into Prometheus metrics
22
+ • Users can create their own plugins and Grafana dashboards for specific needs
23
+ • Integration with Honeycomb for exposing raw events considered but not currently implemented
24
+ • Discussion of available plugins for PromEx, including Phoenix, Oban, Ecto, and Broadway
25
+ • Plans for updating Changelog.com to Erlang 24, with a live upgrade from Erlang 23
26
+ • Expected benefits of upgrading to Erlang 24, including reduced memory usage, improved serialization speed, and lower latency
27
+ • Discussion of metrics and monitoring for the upgrade, including Grafana Cloud probes
28
+ • Plans for documenting the upgrade process through blog posts and livestreams
29
+ • Plans for the weekend: gardening and DIY projects
30
+ • Balancing work (PromEx/Erlang) with personal interests/hobbies
31
+ • Discussion of DIY skills/experience
32
+ • Weather conditions affecting plans (barbecue)
33
+ • Importance of documenting work with photos/videos
Find the infrastructure advantage_summary.txt ADDED
@@ -0,0 +1,52 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Zac Smith discusses his absence from KubeCon 2022 in North America
2
+ • He mentions his role as a busy executive at a Fortune 500 company and how it limits his attendance at conferences
3
+ • Zac talks about the benefits of attending conferences, specifically the "hallway track" where he can meet people and get a sense of what's going on
4
+ • He reminisces about his favorite conferences, including ARM Tech Conference and KubeCon
5
+ • The conversation turns to Zac's transition from Packet to Equinix Metal, including his emotional attachment to Packet and the challenges of adapting to a larger company culture
6
+ • Founding a company and dealing with the emotions involved
7
+ • Rebranding Packet as Equinix Metal and the challenges that came with it
8
+ • Why the speaker does what he does (being an entrepreneur)
9
+ • Importance of diversity in technology innovation
10
+ • Need for sustainable technology solutions to address climate change and reduce waste
11
+ • Changing the business model around distribution of technology to a more circular economy
12
+ • Introduction of a new operating model and sustainable business model
13
+ • How Equinix Metal changed Zac Smith's "Why" compared to Packet
14
+ • The advantages of being part of Equinix, including scale and interconnectivity
15
+ • Comparison of Packet's IaaS approach with Equinix Metal's capabilities
16
+ • Collaboration and innovation within the Equinix ecosystem
17
+ • Equinix's focus on sustainability and environmental initiatives (ESG)
18
+ • Zac Smith's passion for the industry and his vision for automating hardware interaction
19
+ • Creating a comprehensive hardware compatibility list for the internet
20
+ • Focus on providing fundamental primitives and enabling an ecosystem, rather than becoming an all-purpose platform
21
+ • The importance of staying focused on core competencies and avoiding getting bogged down in secondary features or services
22
+ • The challenge of cooling high-performance chips with dense transistors and increasing power consumption
23
+ • The need for innovative solutions to address the "electricity problem" in data centers, including exposing reliable metrics to software developers
24
+ • Challenges in mixed data centers with diverse technologies and limited ability to purpose-build infrastructure
25
+ • Need for efficient cooling methods, such as liquid cooling, to reduce energy consumption and environmental impact
26
+ • Opportunities to capture waste heat as energy or sell it back to the grid
27
+ • Unsustainability of current evaporative cooling methods, which require millions of gallons of water per day
28
+ • Importance of standardization in data center design, including mechanical form factors and rack configurations
29
+ • Potential for Open 19, an open standard for mechanical form factor, to enable standardized data centers and reduce waste
30
+ • Open 19 project with blind mate connector design for easy server installation
31
+ • Reusable packaging to reduce waste and improve logistics
32
+ • Standardization of physical infrastructure like containers for software
33
+ • Multi-architecture support in data centers (Intel, AMD, ARM)
34
+ • Equinix Metal's approach to supporting multiple architectures (ARM servers)
35
+ • History of Cavium ThunderX and early adoption of ARM ecosystem
36
+ • Importance of being agnostic on architecture and promoting competition in the market
37
+ • The potential of ARM architecture in laptops and its impact on software development
38
+ • The emergence of RISC-V as an open-source instruction set architecture (ISA) and its possibilities for custom chips
39
+ • The importance of sustainability in hardware and the need to create a circular economy
40
+ • The role of regulatory impacts, customers, and business drivers in pushing sustainability forward
41
+ • The potential for technology distribution to be solved through APIs and automated deployment
42
+ • Hardware security and supply chain vulnerability
43
+ • Zero-trust approach to hardware
44
+ • Sustainable hardware and reduction of e-waste
45
+ • Equinix Metal's expansion and focus on distribution capabilities
46
+ • Business model shifts in the tech industry towards as-a-service models
47
+ • Partnership between software companies, OEMs, and cloud providers
48
+ • The importance of making a positive impact with technology in a sustainable way
49
+ • Collaborative approach to solving global challenges through software and hardware combinations
50
+ • Ecosystem-driven development where value is created by solving problems together
51
+ • Examples of successful projects such as Tinkerbell OSS, otel-cli, and Equinix labs
52
+ • Emphasis on "doing well by doing good" and creating a bigger opportunity tent
Gerhard at KubeCon NA 2021 Part 1_summary.txt ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Overview of Linkerd 2.10 and new features in 2.11
2
+ • Introduction of policy control in Linkerd 2.11 for micro-segmentation and security
3
+ • Declaration of policy through annotations or CRDs (Custom Resource Definitions)
4
+ • Read-only UI in Linkerd, focusing on understanding system state rather than configuration
5
+ • Security theme in Linkerd development, including encryption and regulatory compliance
6
+ • Future plans for securing traffic in Kubernetes clusters
7
+ • Linkerd's ease of use for beginners
8
+ • Recommended production deployment practices (Helm, Terraform, etc.)
9
+ • Potential operator for automated upgrades and installations
10
+ • Linkerd's upgrade process from 2.10 to 2.11
11
+ • Supported Kubernetes versions and dependencies (cert manager)
12
+ • Importance of certificate rotation and clock skew considerations in production environments
13
+ • Linkerd community's transactional relationship with users
14
+ • Benefits of in-person interaction vs virtual conferences
15
+ • Importance of user gratitude and sharing success stories
16
+ • KubeCon event and talks featuring Linkerd users' experiences
17
+ • William Morgan's personal preferences and interests at KubeCon
18
+ • Upcoming releases and events for the Linkerd project
19
+ • Linkerd and Buoyant Cloud discussed as complementary technologies
20
+ • Expansion of mesh capabilities to non-Kubernetes environments
21
+ • Focus on policy and data plane improvements in Linkerd
22
+ • Introduction of Polar Signals, a company offering continuous profiling solution
23
+ • Discussion of continuous profiling, its history, and how it can be done cost-effectively in production using eBPF and Kubernetes
24
+ • Parca (a continuous profiling tool) is being opened up to the world at KubeCon
25
+ • The goal of Parca is to provide a way for developers to optimize their systems and reduce costs by identifying performance bottlenecks
26
+ • Continuous profiling is still a relatively new concept, and Parca aims to democratize it and educate the community about its benefits
27
+ • The tool uses eBPF (extended Berkeley Packet Filter) to collect data on system performance metrics such as CPU, memory, disk operations, and network operations
28
+ • Parca's UI has undergone significant improvements over a short period of time due in part to extensive dogfooding (using the software internally)
29
+ • The developers use Parca themselves to optimize their own tool, creating a self-reinforcing cycle of performance improvement
30
+ • Plans to productionize eBPF-related projects
31
+ • Advice for those who couldn't attend KubeCon in person or virtually
32
+ • Updates on Parca's development process and community involvement
33
+ • COSI (Cozy Operating System Initiative) progress and implementation in Talos
34
+ • Discussion of the future of operating systems, specifically with regards to API-driven interfaces and reduced reliance on SSH
35
+ • Talos installation methods and ease of use
36
+ • Creating a Kubernetes cluster with minimal setup and networking complexity
37
+ • Using COSI or PXE booting for bare metal installation
38
+ • Cloud deployment options and image upload requirements
39
+ • Consistency across environments, including laptops, cloud, and bare metal
40
+ • Minimalism and lack of unnecessary packages in Talos compared to other operating systems
41
+ • Security features, such as reproducible supply chain, read-only file system, and ephemeral storage
42
+ • Signing and tracing code commits from development to deployment for security and audit purposes
43
+ • Concerns about minimalist systems and security
44
+ • Use of musl instead of glibc and its performance implications
45
+ • Talos' use of musl and Go programming language
46
+ • Kubernetes and containerization with glibc
47
+ • Host and container configuration for musl and glibc
48
+ • Linux kernel version and LTS strategy
49
+ • KubeSpan announcement and on-demand cluster scaling
50
+ • Discussion of Andrew Rynhard joining an AWS Graviton instance to his laptop
51
+ • Andrew Rynhard's excitement about attending KubeCon in person and meeting his company colleagues
52
+ • Advice from Andrew Rynhard on how people who can't attend KubeCon in person should participate, including joining the CNCF Slack and watching catch-up videos
53
+ • David Flanagan's personal updates, including the arrival of his new baby boy Caleb and his job change to be a developer advocate for Pulumi
54
+ • Remote participation in KubeCon and managing multiple sessions
55
+ • Comparison of David Flanagan's and Gerhard Lazu's methods for participating in remote KubeCons
56
+ • Interacting with other attendees during virtual events
57
+ • Chairing the operations track at KubeCon, selecting talks, and being familiar with upcoming sessions
58
+ • GitOps tools Argo and Flux, their use cases, and benefits
59
+ • The failed attempt to consolidate both tools into a single "GitOps Toolkit" in 2019
60
+ • Interest in understanding the strengths and weaknesses of each tool and attending an upcoming GitOps summit
61
+ • Comparison between Flux and Argo for GitOps
62
+ • David Flanagan's new role at Pulumi and his interest in infrastructure as code and continuous integration/delivery
63
+ • Benefits of using Pulumi over TerraForm and HCL, including support for high-level programming languages
64
+ • Comparison with other tools such as Dagger (using CUE), Crossplane, and CUE Blocks
65
+ • Discussion of CUE language and its use cases, particularly in comparison to HCL and Pulumi
66
+ • Discussion of limitations and constraints in infrastructure as code tools
67
+ • Comparison of Dagger and Boundary for providing a single interface to infrastructure management
68
+ • Advantages of Crossplane for continuous reconciliation and control over execution
69
+ • Similarities between Pulumi, CDK from Amazon, and other tools for infrastructure as code
70
+ • Preference for TypeScript as a language for infrastructure as code due to its strict typing and flexibility
71
+ • Comparison of Go and TypeScript for use with Pulumi
72
+ • Discussion of challenges in managing dependencies in Go
73
+ • Changing format of Rawkode Live from high-level introductions to use case-specific content
74
+ • Focusing on real-world applications and solutions with specific tools
75
+ • Reducing decision fatigue by providing more practical examples and inspiration
76
+ • Exploring the cloud-native ecosystem and its many projects
77
+ • Importance of balance between breadth of knowledge and in-depth expertise
Gerhard at KubeCon NA 2021 Part 2_summary.txt ADDED
@@ -0,0 +1,70 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • eBPF (extended Berkeley Packet Filter) as a kernel technology allowing custom programs to run in the kernel and interact with events
2
+ • eBPF's potential for observability, security, and networking applications
3
+ • Comparison of eBPF to JavaScript in terms of making the kernel programmable
4
+ • Cilium's use of eBPF for network plumbing and observability
5
+ • Cilium components, including:
6
+ + CNI (Container Networking Interface)
7
+ + Hubble (network information collection and visualization)
8
+ + Hubble UI (human-readable flow visualization)
9
+ • Integration with other tools for alerting and monitoring, such as Prometheus and Grafana
10
+ • Getting started with Cilium using Helm chart, command-line tool, or operator
11
+ • Upcoming install fests for Cilium on the Cilium.io website
12
+ • Live coding sessions at KubeCon to demonstrate eBPF programming
13
+ • Liz Rice's plans for her live coding session content and format
14
+ • Duffie Cooley joining Isovalent and working with Liz Rice
15
+ • Announcements about new projects joining the CNCF, including Cilium becoming a CNCF incubation-level project
16
+ • Discussing ways for attendees who can't attend KubeCon in person to feel part of the event
17
+ • Benefits of virtual elements in events, including increased accessibility and connectivity
18
+ • Features and updates on Cilium and eBPF, including kernel service mesh and weekly install fests
19
+ • Comparison of in-person vs. virtual KubeCon experiences
20
+ • Importance of community interaction and networking at KubeCon
21
+ • Discussion on hybrid event success, including virtual office hours and participant engagement
22
+ • Handling sensitive data in Crossplane, with proposals for external API credentials and secret stores
23
+ • Addressing a question about the need for Crossplane when cloud providers' consoles are accessible, and potential improvements to educational content and messaging
24
+ • Humorous exchange about Dan Mangum being the "Chief ClickOps Officer" (CCOO) of Crossplane
25
+ • Jared Watts' experience using Crossplane to manage GKE clusters and concerns about secrets handling in Kubernetes
26
+ • Discussion about KubeCon locations, including San Diego, Los Angeles, and Detroit
27
+ • Conversation about exercise habits, with Dan Mangum running in LA and Jared Watts participating in surfing and ice hockey
28
+ • Announcements about upcoming KubeCon EU and North America events in Valencia and Detroit respectively
29
+ • Maturity process and incubation status
30
+ • Increased adoption and community growth after announcement
31
+ • Governance and project release processes
32
+ • Benefits of being an incubating project, including increased visibility and advanced conversations with users
33
+ • Community building and user trajectory (getting started, intermediate, and advanced use)
34
+ • Challenges with GCP provider upgrades and future plans to make the process smoother for users
35
+ • Migrating to a stable GCP API and the process involved
36
+ • Levels of maturity and guarantees within Crossplane ecosystem
37
+ • Future plans for provider deployment model and customization
38
+ • Plans for improved provider coverage through code generation
39
+ • Custom compositions and extending the composition engine with custom logic
40
+ • KubeCon format, including virtual participation and hybrid experience
41
+ • MeetingPlay platform used for live Q&A during talks
42
+ • Zoom sessions were available but not utilized by David Ansari
43
+ • Virtual office hours participated in by Gerhard Lazu
44
+ • David Ansari's first KubeCon as a speaker, with pre-recorded talk submission process
45
+ • Discussion on the benefits of pre-recorded talks and live Q&A
46
+ • Feedback on David's talk, including suggestions for shorter length to allow more time for discussion
47
+ • Discussion of the format and effectiveness of pre-recorded talks at conferences
48
+ • Value of pre-recording for speakers to manage stage fright and prepare questions
49
+ • Importance of meeting people and having in-person interactions at conferences
50
+ • Variety and diversity of conference topics and tracks, as well as on-demand talk availability
51
+ • Observations on memorable communication techniques and anxiety management during public speaking
52
+ • Favorite talks and content, including eBPF ecosystem discussions
53
+ • eBPF foundation and its applications
54
+ • eBPF's focus on kernel events and observability
55
+ • Gerhard Lazu's plans to use eBPF in upcoming projects (Parca.dev and Cilium)
56
+ • KubeCon conference organization and support
57
+ • Sigstore project: open-source code for signing and verifying open source software
58
+ • Sigstore's differences from PGP, including transparency logs and centralization
59
+ • Signing and verifying digital content with Sigstore
60
+ • Software supply chain security and the role of signing commits
61
+ • Sigstore and its adoption in signing release artifacts and container images
62
+ • Use cases for Cosign in signing container images and verifying their provenance
63
+ • Distrosless base image suite and its properties, including reproducibility and transparency
64
+ • Chainguard company and its About page with Easter eggs and interactive elements
65
+ • The hosts discuss Dan Lorenc's uncut hair as a result of the pandemic
66
+ • Discussion of Easter eggs in software, including one hidden face on the Chainguard website
67
+ • The importance and growing recognition of software supply chain security
68
+ • The impact of the SolarWinds attack on the industry and government regulations
69
+ • Dan Lorenc's experience at KubeCon and Supply Chain Security Con
70
+ • Chainguard's goals and plans for future development, including continued focus on Sigstore adoption
Gerhard at KubeCon NA 2021: Part 1_summary.txt ADDED
@@ -0,0 +1,151 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Linkerd details from KubeCon North America 2021
2
+ • PARCA: a new continuous system profiling tool using eBPF
3
+ • TalosOS and KubeSpan perspective with Andrew Reinhardt
4
+ • New beginnings with RawCode (David Flanagan) after a busy two months
5
+ • Partners mentioned: Fastly, LaunchDarkly, Linode, Fly
6
+ • Linkerd 2.11 release and new features, including policy control for microsegmentation
7
+ • Introduction of two new CRDs in Linkerd 2.11
8
+ • Expressing policy using annotations and CRDs for traffic control
9
+ • Flexibility in cluster configuration from open to locked-down settings
10
+ • Limited customization via UI, focusing on read-only functionality
11
+ • Security concerns driving development of policy features and microsegmentation
12
+ • Securing traffic within a Kubernetes cluster as a major theme in Linkerd's evolution
13
+ • Development of a new theme in Linkerd
14
+ • Importance of user value and adoption
15
+ • Challenges in tackling complex problems
16
+ • MTLS and Kubernetes blog post by the speaker
17
+ • Linkerd 2.11 installation methods
18
+ • Maintaining legacy installation methods for simplicity
19
+ • Importance of repeatable deployments in production environments
20
+ • Recommended practices for installing Linkerd in production
21
+ • Operator concept for automating installations and upgrades
22
+ • Upgrade process from Linkerd version 2.10 to 2.11
23
+ • Breaking changes in multi-cluster mechanics
24
+ • Additive features in Linkerd 2.11
25
+ • Policy and MTLS implementation
26
+ • Certificate rotation for cluster-level issuer certificate
27
+ • Dependencies on Kubernetes versions and cert manager
28
+ • Production runbook for Linkerd available on buoyant.io
29
+ • TLS certificates and clock skew issues
30
+ • Importance of human interaction in open-source communities
31
+ • Linkerd project and its impact on users
32
+ • Benefits of sharing experiences and use cases with the community
33
+ • Advice for virtual conference attendees to make the most out of it
34
+ • The contrast between in-person and virtual conference experiences
35
+ • The speaker's virtual booth at KubeCon is set up with fun and interesting content, including a run book and other Linkerd-related materials.
36
+ • There will be a raffle for Linkerd swag, including hats and shirts.
37
+ • The speaker is excited about two talks: one from Elkjof, the largest retailer in the Nordics, on how they use Linkerd and Kubernetes to replatform their company, and another from Intain Australia on how they 10x'd their throughput using Linkerd.
38
+ • The speaker will be meeting with people who have worked on Linkerd for a long time but has never met in person before.
39
+ • There are no specific plans or announcements mentioned for the next six months.
40
+ • Planning for releases 2.12 and 2.13
41
+ • Boynt Cloud: a SaaS complement to Linkerd with free tier and features like metrics hosting, topology maps, and traffic breakdowns
42
+ • Linkerd future plans: policy focus and mesh expansion to run proxies outside of Kubernetes
43
+ • Polar Signals: founded by the speaker after leaving CoreOS/Red Hat, focusing on continuous profiling in observability
44
+ • The speaker wants to explore the concept of continuous profiling before discussing it with others.
45
+ • Continuous profiling has been around since the 1960s and was initially expensive and hard to do in production.
46
+ • Sampling profiling allows for continuous monitoring without high overhead, making it accessible to hyperscalers.
47
+ • eBPF (extended Berkeley Packet Filter) technology enables low-overhead data capture and exportation to user space.
48
+ • Kubernetes has unified the observability space by standardizing terms like "pod" and "container".
49
+ • The combination of eBPF with Kubernetes allows for automatic discovery and analysis of CPU time consumption across containers and infrastructure.
50
+ • eBPF and its role in presenting system information
51
+ • Continuous profiling and the need for education in this space
52
+ • Parka's open-source goals, including democratizing continuous profiling and reducing infrastructure costs
53
+ • The backstory behind Parka's development, including a proof of concept with Conprof and Google's paper on cost optimization
54
+ • The ease of use and UI improvements in Parka
55
+ • Dogfooding as a key factor in the development and improvement of Parka
56
+ • Parka is performance-sensitive software with a specifically designed storage and query engine for continuous profiling.
57
+ • The team uses Parka to optimize itself, creating a vicious cycle of improvement.
58
+ • eBPF (Extended BPF) is evolving into a production-ready state, with many people exploring its applications.
59
+ • The speaker is excited about the potential of eBPF and mentions specific talks at KubeCon related to it.
60
+ • Travel restrictions prevent some attendees from attending in person, but they can still participate virtually or catch up on recordings later.
61
+ • Advice for those who couldn't attend includes finding local virtual meetups, watching recordings, and trying to be part of the community as much as possible.
62
+ • The next KubeCon EU is expected to have improved circumstances for attendance due to COVID cases decreasing.
63
+ • In the next six months, Parka will likely release more features based on community feedback, rather than a set plan.
64
+ • Discussion of the benefits of community involvement in open source projects
65
+ • The role of the CNCF and its successful approach due to community thinking
66
+ • Congratulations on a well-designed hiring page that serves as an example for others
67
+ • Update on Cozy, including rewriting the networking stack of Talos using Cozy concepts
68
+ • Launch of Koops Band, an automated wire guard product
69
+ • Options for running Talos: laptop, bare metal, cloud
70
+ • Easy way to start with Talos is to spin up a Kubernetes cluster on your laptop using the CLI command "Talos CTL cluster create"
71
+ • Bare metal setup can be done by using an ISO or Cozy, but requires networking configuration
72
+ • Pixie booting and Sedaro product can streamline the process, but may not be necessary for beginners
73
+ • Cloud setup involves uploading an image and turning it on with correct user data
74
+ • Talos aims to provide a consistent experience across different environments, allowing users to describe their application and how it should run using declarative YAML.
75
+ • Discussion of Talos and its benefits
76
+ • Comparison to Debian and Ubuntu
77
+ • Minimalism of Talos (50 megabytes, no package manager)
78
+ • Removal of unnecessary features (SSH, Bash) for Kubernetes focus
79
+ • Security emphasis in Talos (reproducible supply chain, read-only file system)
80
+ • Ephemeral nature of Talos
81
+ • Importance of hardening the experience and eliminating node-level management
82
+ • The speaker discusses Talos's use of Musil instead of GLibC for C libraries
83
+ • Performance issues are reported when running Musil outside of GLibC
84
+ • The speaker attributes this to the limited scope of Musil in their environment
85
+ • They mention using Go and a new init system, contributing to Musil's performance
86
+ • Kubernetes containers use GLibC, reducing the role of Musil in the ecosystem
87
+ • The speaker recalls issues with Alpine-based container images and Ubuntu ones
88
+ • They discuss running the latest LTS kernel version (5.10.62)
89
+ • The team considers releasing LTS-style versions of Talos with pinned Linux kernel versions
90
+ • A new product called KubeSpan is announced, which bridges bare metal clusters with cloud instances using Talos's API-driven stack
91
+ • The discussion centers around KubeSpan, a technology that allows users to securely scale Kubernetes clusters across different networks and locations.
92
+ • WireGuard is used as the underlying networking protocol to establish secure connections between nodes.
93
+ • The technology enables users to maintain a consistent network experience regardless of location, including remote or edge computing scenarios.
94
+ • KubeSpan makes it seamless to expand or contract clusters as needed, without disrupting the cluster's operation.
95
+ • There are some limitations and considerations to be aware of, such as needing at least one direction of communication between nodes.
96
+ • The technology has potential applications in various use cases, including on-premises data centers, cloud environments, and edge computing scenarios.
97
+ • Meeting in person at KubeCon
98
+ • Virtual attendance options (booths, Slack, catch-up videos)
99
+ • Prioritizing sessions and topics of interest
100
+ • Balancing technical and management roles
101
+ • Exploring new technologies and tools (Talos OS, Sdero, Cubespan)
102
+ • Raygun will provide daily performance summaries for websites
103
+ • KubeCon is being discussed, specifically the speaker's experience attending remotely due to travel ban
104
+ • The speaker has had a significant change in personal life, having a new baby and changing jobs from Equinix Metal to Pulumi
105
+ • Remote participation methods are being discussed, including joining sessions on Slack, Discord, Twitter, and watching recorded talks later
106
+ • Discussing a KubeCon experience with multiple sessions running at the same time
107
+ • Comparing in-person vs virtual attendance and consumption of talks
108
+ • Mentioning community member Noel Georgie's ability to watch four or five talks simultaneously
109
+ • Sharing personal preference for single-tasking during events
110
+ • Revealing involvement as chair of the operations track and selecting talks for KubeCon
111
+ • Discussing popular sessions on GitOps, infrastructure as code, and specific tools like Argo, Terraform, Crossplane, and Pulumi
112
+ • GitOps tools comparison: Flux vs Argo
113
+ • GitOps tool consolidation attempt by original creators of Argo and Flux
114
+ • Challenges with custom resources in Argo
115
+ • Ease of use and simplicity of Flux
116
+ • Benefits of using Flux for agnostic YAML generation
117
+ • Announced GitHub Summit and KubeCon events
118
+ • Continuous integration and delivery
119
+ • Infrastructure as code
120
+ • Pulumi's platform for deploying applications
121
+ • Comparison between Terraform, HCL, and Pulumi
122
+ • Dagger and its use of Q language
123
+ • Programming languages for defining resource graphs (Go, TypeScript, etc.)
124
+ • Encapsulation of knowledge through programming languages
125
+ • Pulumi vs Crossplane: comparison of their approaches
126
+ • XRDs (compositions) in Crossplane for combining resources
127
+ • Providers in Crossplane interacting with IASs
128
+ • Dagger and Q: data language, block-based, and query APIs
129
+ • Dagger's ability to move beyond infrastructure provisioning
130
+ • Boundary as a continuous delivery component for applications
131
+ • Constraints of Crossplane still being defined by YAML
132
+ • Continuous reconciliation in Crossplane vs Pulumi
133
+ • Control over actual reconciliation in Crossplane vs client-side in Pulumi
134
+ • Dagger making infrastructure provisioning easy with minimal boilerplate
135
+ • Comparison to Pulumi and CDK from Amazon for similar approaches
136
+ • CDK having advantages over YAML alternatives
137
+ • Similarities between Pulumi and CDK for TypeScript support
138
+ • Benefits of using TypeScript for infrastructure as code due to its strict typing and ecosystem
139
+ • Differences in experience between using Go versus TypeScript with Pulumi
140
+ • Convenience factors of the TypeScript ecosystem compared to Go
141
+ • Inventing tools that were half-working and often caused more pain than they solved
142
+ • Switching from vendor-managed repositories to GoMod
143
+ • Difficulty in choosing between multiple GitOps tools and CNI options
144
+ • Raw Code Live's transition to use-case specific content instead of just introductory material
145
+ • Importance of having breadth of knowledge about available tools, but also needing to apply them in real-world scenarios
146
+ • Onboarding process and its importance for a smooth job transition
147
+ • Acceleration and lack of time to appreciate the present
148
+ • Future plans for Clustered, Raw Code Live, and Pulumi
149
+ • Alignment of personal interests with new role at Pulumi
150
+ • Wrap-up and thank yous from host and guests
151
+ • Promotion of changelog.com podcasts and community
Gerhard at KubeCon NA 2021: Part 2_summary.txt ADDED
@@ -0,0 +1,133 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • KubeCon North America 2021 interviews
2
+ • EBPF (eBPF) discussed as a powerful tool for observing and managing system behavior
3
+ • Comparison of EBPF to JavaScript's impact on HTML pages
4
+ • Liz Rice's perspective on EBPF's benefits, including improved visibility and understanding of system issues
5
+ • Discussion of networking challenges in Kubernetes environments and how EBPF can help address them
6
+ • EBPF programs and their potential applications
7
+ • Tools that build on EBPF primitives and offer useful abstractions
8
+ • History of observability in particular using EBPF
9
+ • Cilium and its use of EBPF for networking and observability
10
+ • Cilium components, including the CNI, Hubble, and Hubble UI
11
+ • Integration with other tools for alerting and monitoring
12
+ • User expresses interest in using Cilium in a production environment
13
+ • Discusses getting started with Cilium, including Helm chart and CLI options
14
+ • Announces upcoming "install fests" for interactive guidance with experienced Cilium users
15
+ • Plans to watch live coding session on eBPF programming at KubeCon
16
+ • Discussion of using BCC framework and Go for ease of demonstrating eBPF capabilities
17
+ • Overview of steps in a typical live coding session, including Hello World example and exploring kernel-user space data transfer
18
+ • Discussion about upcoming live coding sessions
19
+ • Plans for KubeCon, including attending remotely and virtually
20
+ • Introduction of new team member Duffy Cooley and his experience in networking
21
+ • Upcoming project updates and announcements at KubeCon
22
+ • Cilium becoming a CNCF incubation level project
23
+ • General discussion about collaboration and working with team members
24
+ • Excitement about an upcoming Cilium community event
25
+ • Discussing how to participate in KubeCon despite not being physically present
26
+ • Benefits of virtual participation, including interacting with others and asking questions
27
+ • Using Slack for connection and conversation during events
28
+ • Virtual office hours as a way to connect with others
29
+ • The value of maintaining a virtual element in future events for accessibility and inclusion
30
+ • eBPF and Cilium projects are mentioned as having interesting developments in the next six months
31
+ • Service Mesh space is evolving with different products emerging
32
+ • Cilium's role in the Service Mesh story will be significant
33
+ • KubeCon event was discussed, including its safe environment due to health protocols
34
+ • Attendance at KubeCon was lower than previous years, but had a unique atmosphere allowing for community collaboration
35
+ • Discussion of previous KubeCon event and virtual participation
36
+ • Review of successful virtual office hours and inclusive event organization
37
+ • Handling of sensitive data in CrossPlan, including credentials for cloud providers and infrastructure
38
+ • Addressing questions about security and credentials
39
+ • Importance of messaging and education around the value of CrossPlan
40
+ • Creation of a "Chief ClickOps Officer" role as a tongue-in-cheek solution to addressing direct access to cloud provider consoles.
41
+ • Discussion on Crossplane's benefits
42
+ • Handling secrets in Kubernetes
43
+ • Comparison of running experiences in San Diego and LA
44
+ • Upcoming KubeCon locations (Detroit, Valencia)
45
+ • Announcements from KubeCon EU
46
+ • Crossplane entering incubation status
47
+ • Effects of incubation on the project's growth and maturity
48
+ • Inroads made into the community and more people to reach
49
+ • CNCF declaring project as mature and making noise about it
50
+ • Project governance and release processes remain unchanged
51
+ • Growth of the community due to increased visibility and maturity
52
+ • Benefits of being an incubating project, including baseline knowledge from new users
53
+ • Journey of cross-plane from sandbox to incubation in the CNCF
54
+ • Process and timeline for applying for incubation status
55
+ • Level of activity and busyness resulting from the incubation process
56
+ • Getting started guide and introducing advanced concepts early on
57
+ • The process of creating RDS instances on AWS or Cloud SQL instances on GCP from a Kubernetes cluster
58
+ • Building community around Crossplane, including YouTube content and Slack discussions
59
+ • Importance of end-users helping each other with use cases and feature requests
60
+ • Challenges with the GCP provider upgrade (0.18/0.19) and potential future improvements
61
+ • Migration guide for upgrading to newer versions of Crossplane
62
+ • Maturity levels within the Crossplane ecosystem and need for clear guarantees around breaking changes
63
+ • Stability of Crossplane platforms and APIs
64
+ • Breaking changes in provider packages
65
+ • Provider deployment models (current limitations and future possibilities)
66
+ • Granular provider installs and API extension mechanisms
67
+ • Future plans for Crossplane roadmap (hosted control plane model, partitioning)
68
+ • Discussion about upcoming plans for the next six months
69
+ • Dan's proposals for community-driven projects being well-received
70
+ • Exciting developments in provider coverage and custom compositions
71
+ • Provider coverage: generating cross-plane providers for cloud providers' APIs
72
+ • Custom compositions: enabling users to extend the composition engine with custom logic
73
+ • KubeCon experience, including virtual participation and interaction with attendees
74
+ • The speaker's experience at KubeCon as a pre-recorded talk presenter
75
+ • Benefits of pre-recorded talks for speakers and attendees, including flexibility and live Q&A
76
+ • Challenges of presenting a pre-recorded talk, such as managing time and editing the video
77
+ • The value of live Q&A in a pre-recorded talk, allowing for immediate responses to questions
78
+ • Suggestions for future talks, including shortening the presentation to leave more time for Q&A.
79
+ • Discussion and feedback from users is valuable in talks
80
+ • Understanding audience level of knowledge and experience
81
+ • Keeping talks concise and not giving away all information at once
82
+ • Encouraging discussion and questions to gauge audience interest
83
+ • The importance of knowing one's audience and adapting the talk accordingly
84
+ • Using a pre-recorded talk can be beneficial for first-time speakers
85
+ • The role of Slack in facilitating conversations and Q&A after talks
86
+ • Discussion of attending KubeCon in person versus virtually
87
+ • Preferences for giving talks in person vs pre-recording
88
+ • Recommendations for improving public speaking skills, specifically referencing Matt Abrahams' book and talks on memorable communication
89
+ • Review of KubeCon's diverse range of tracks and topics
90
+ • Discussion of favorite talks or memorable moments from the conference
91
+ • The benefits of virtual conferences, including being able to consume content quickly and connect with others in a different way.
92
+ • eBPF (Extended Berkeley Packet Filter) ecosystem, including Liz Rice's talk on cloud native superpowers with eBPF, and the speaker's enthusiasm for kernel events and eventing.
93
+ • Plans to implement eBPF in upcoming projects, specifically parka.dev and Cilium.
94
+ • Observability from a kernel perspective, which the speaker finds unique and impressive.
95
+ • Speaker support at KubeCon, including a dedicated Slack channel with rapid response times.
96
+ • The combination of in-person and virtual attendance at KubeCon, which worked well but was challenging to organize.
97
+ • Plans to attend in-person at next year's KubeCon.
98
+ • Designing language models requires a coherent approach, not just combining features from other languages
99
+ • The SIGStore project aims to make signing and verifying open source software easy and free
100
+ • SIGStore is inspired by the Let's Encrypt model, which made web traffic encryption free and automated
101
+ • SIGStore uses transparency logs, which are more modern than some of PGP's methods
102
+ • Transparency logs provide benefits such as being slightly centralized but not requiring trust in a central operator
103
+ • SIGStore takes a different approach from PGP, using newer encryption standards and focusing on simplicity
104
+ • Signing Git commits with PGP keys
105
+ • SIGStore ecosystem for signing various artifacts
106
+ • Centralized infrastructure security concerns
107
+ • Refactoring Git to use multiple techniques for signing, including non-PGP methods
108
+ • Software supply chain security importance
109
+ • Signing release tags, artifacts (e.g. zip files, tarballs, container images), and packages
110
+ • Cosign project for signing container images
111
+ • Container image standards and metadata propagation in the Open Containers Initiative
112
+ • The OCI specification has added a new field to track the Ubuntu base image used in builds
113
+ • This allows for easier tracking and verification of build processes
114
+ • Jason Hall at Red Hat contributed to this change
115
+ • A "distro-less" concept was mentioned, which comes from Google and is related to container builds
116
+ • The Kubernetes team moved their images to a distro-less approach without notifying the original creators
117
+ • Chainguard's About page has an Easter egg that reveals humorous information when clicked on
118
+ • Discussion of a social media post about hair
119
+ • Easter eggs on a website
120
+ • Software supply chain security and its growing importance
121
+ • The speaker's work on software supply chain security at Google
122
+ • Government regulations and standards being developed to address the issue
123
+ • The need for companies to prioritize software security
124
+ • The speaker returns from KubeCon and shares their experience
125
+ • Supply Chain Security Con (SCSC) is discussed as a day-zero event before KubeCon
126
+ • SCSC is mentioned to be a negative one event, highlighting the importance of addressing security concerns
127
+ • A talk at KubeCon about using OCI registries for chat applications is highlighted as a favorite moment
128
+ • The speaker's future plans for ChainGuard, including focusing on SIG Store adoption and company development
129
+ • Partnership acknowledgments
130
+ • Music credits
131
+ • End of the episode
132
+ • Upcoming return to the broadcast
133
+ • Game segment initiation
Grafana’s "Big Tent" idea_summary.txt ADDED
@@ -0,0 +1,88 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Discussion on Tom's past appearance on the podcast (Changelog episode 375) and how much has changed since then
2
+ • Introduction to new tools and features: Loki, Tempo, and Grafana Agent with Prometheus and Grafana Cloud
3
+ • Explanation of Cortex architecture and its role in offering a generous free tier for Grafana Cloud
4
+ • Discussion on Tom's previous appearance at KubeCon 2019 North America and how the industry has evolved since then
5
+ • Overview of new features and updates: Tempo, Loki 2.0 with improved query language, and linking metrics and logs with traces
6
+ • Discussion of the impact of the global pandemic on Grafana Labs
7
+ • Mention of the scalability and remote-first nature of Grafana Labs
8
+ • Reference to a keynote speech on observability and its vision for the future
9
+ • Description of the development and benefits of Loki, a Grafana project
10
+ • Discussion of Grafana Cloud and its hosted managed service features
11
+ • Explanation of unified alerting in Grafana and its combination of Prometheus system features
12
+ • Mention of the importance of cloud architecture and multi-tenancy in offering a free tier
13
+ • Description of the horizontally scalable, multi-tenant version of Cortex
14
+ • Discussion about the cost-saving statistical multiplexing techniques used in Loki and Tempo
15
+ • Consistency across offerings due to shared architecture and techniques
16
+ • Background of VP of product explaining their coding expertise
17
+ • Experience with open-source codebases, including Zen hypervisor project and Prometheus/Cortex development
18
+ • Mention of Grafana Cloud features, including Metric Tank and future plans for Graphite V5
19
+ • Connection between Acuna Analytics (former company) and GoSquared (previous startup)
20
+ • Discussion about past experiences with analytics and monitoring systems (GoSquared, MongoDB, Cassandra, Graphite)
21
+ • Comparison of scalability and limitations of various systems (Graphite, Prometheus, Cortex)
22
+ • Mention of Acuna's contribution to the Cassandra project (virtual nodes technique)
23
+ • Connection between Cassandra/Graphite and modern systems (Cortex, Loki, Tempo)
24
+ • Reflection on the evolution of analytics and monitoring technology
25
+ • Debate about the definition of observability and its relationship to metrics, logs, and traces
26
+ • Discussion of the importance of curiosity and understanding system behavior for observability
27
+ • Grafana Labs avoids one-size-fits-all solutions and instead supports multiple tools and combinations to help users get the best results
28
+ • The goal is to bring together different teams' tools into a single place with a unified experience
29
+ • The ideal tool helps users access data and test hypotheses, rather than providing automation or root cause analysis
30
+ • Situationally-appropriate tool selection depends on the problem and available tools
31
+ • The speaker mentions a colleague named Manu who was previously involved with the Phoenix app and is now at a cryptocurrency company.
32
+ • The speaker explains that the Phoenix app is monolithic, meaning it's not broken down into microservices, and has a specific architecture involving a CDN, load balancer, Ingress Nginx, and a database.
33
+ • The speaker discusses the importance of instrumenting the system to collect metrics and troubleshoot slow requests.
34
+ • The speaker mentions using Prometheus and exporters to collect metrics from various components of the system.
35
+ • The speaker explores integrating Fastly logs with Grafana Cloud but notes that there is no native integration and that a proxy would be required to forward logs.
36
+ • The speaker discusses how Loki in Grafana Cloud can process log data into usable metrics, such as request rates, error rates, and latencies.
37
+ • Deploying Promptail as a daemon set and sending logs to Loki
38
+ • Instrumenting application code with Prometheus client library
39
+ • Collecting metrics from database (e.g. MySQL) using exporter
40
+ • Organizing dashboards in a consistent format (e.g. request rates, error rates, latency)
41
+ • Using mixin packaging format for distributing dashboards and alerts
42
+ • Referencing Cortex or Kubernetes mixins as examples
43
+ • Challenges in using JSON for changelogs due to version differences between languages (e.g. Go, Python, JavaScript)
44
+ • Introduction of mixins as an advanced feature for packaging and redistributing software components
45
+ • Advantages of JSON it bundler tools (MixTool, Grizzly, Tanker) for managing complex configurations
46
+ • Use of a single repository for config management in Grafana Cloud with Kubernetes clusters
47
+ • Managing Kubernetes jobs using JSON it
48
+ • Discussion of the vision for delivering dashboards, alerts, and applications as a single package
49
+ • Criticism that this approach is too hard to use and may not be suitable for most people
50
+ • Introduction of a more opinionated and integrated version of JSON it in Grafana Cloud
51
+ • Simplification of configuration through the Grafana agent and its integration with various exporters.
52
+ • JSON it bundler
53
+ • Grafana agent vs Prometheus operator
54
+ • Challenges with dashboard integration in Grafana
55
+ • Best practices for building dashboards:
56
+ • Templating data sources and job/instance labels
57
+ • Using templates to dynamically discover jobs/metrics
58
+ • Adding info metrics to software
59
+ • Building dashboards as code using libraries (Grafana, Grafana Builder, Grafana Lib)
60
+ • Version controlling dashboards from the start
61
+ • Implementing GitOps style approach with tools like Grizzly
62
+ • Discussing the use of Grafana with a JSON definition of a dashboard
63
+ • Implementing dev deploy cycle on a laptop for developing dashboards and uploading them to Grafana
64
+ • Version controlling source code instead of JSON files for reviewability and collaboration
65
+ • The 80/20 rule for Grafana usage, where 80% is easy-to-use editing and 20% is advanced SRE/DevOps approach
66
+ • Pair programming an hour-long YouTube stream to capture the advanced approach
67
+ • Discussing VS Code Sharing and Rufana Cloud/Rufana Agent integration
68
+ • Importance of capturing and sharing the advanced approach for others to learn from it
69
+ • Barriers to entry for tracing vs logs
70
+ • Challenges in the tracing space due to high investment and instrumentation requirements
71
+ • Benefits of tracing, particularly in performance challenges
72
+ • Open Telemetry and its tracing stack
73
+ • Auto-instrumentation in various languages (e.g. Java, Python)
74
+ • Distributed tracing and blind spots in instrumented stacks
75
+ • Tracing in load balancers and CDNs (e.g. AWS ELBs, Fastly)
76
+ • Distributed tracing and spans in software applications
77
+ • Instrumenting Elixir server and client for better understanding of request flow
78
+ • Challenges in getting complete traces from all services and the effort-reward trade-off
79
+ • Focusing on key hops in the application stack (e.g. Ingress Nginx, Kubernetes service, application)
80
+ • Potential limitations of adding spans to certain layers (e.g. load balancer, TCP level)
81
+ • Using OpenTelemetry for vendor-neutral tracing standards and potential for adding spans to open-source projects
82
+ • Creating Grafana dashboards for visualization of request flow and exploring different tools and version control systems
83
+ • Iterating on solving specific observability problems
84
+ • Long-term value of integrating tempo and other tools
85
+ • Ecosystem maturity and changing tooling landscape
86
+ • Big tent philosophy in observability and data sources
87
+ • Grafana Labs' mission to support multiple tooling choices
88
+ • Origin of the term "big tent" and its application in Grafana
Grafana’s Big Tent idea_summary.txt ADDED
@@ -0,0 +1,62 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Launch of Tempo, a tracing system from Grafana Labs
2
+ • Loki 2.0 with improved query language and pipeline operator for filtering logs
3
+ • Collaboration between Grafana Labs and Prometheus team on LogQL design
4
+ • Development of exemplars in Prometheus and Grafana to link metrics and traces
5
+ • Prediction of observability future in KubeCon 2019 keynote and subsequent development
6
+ • Launch of GEM (Grafana Enterprise Metrics) and growth of Grafana Labs to over 400 employees
7
+ • Impact of global pandemic on Grafana Labs, which was set up as remote-first organization
8
+ • Unified alerting system in Grafana, combining features from Prometheus and Grafana alerting systems
9
+ • Launch of generous free tier for Grafana Cloud
10
+ • The speaker discusses how Cortex is a horizontally-scalable, multi-tenant version of Prometheus that allows for free provisioning and reduced costs.
11
+ • Cortex's architecture has been replicated in Loki and Tempo, providing consistency across offerings and reducing operational burden.
12
+ • The speaker's background as a software engineer and his involvement in the creation of Cortex are discussed.
13
+ • Grafana Cloud is mentioned as having a time-series database called Metrictank, which was later replaced with Cortex-style architecture.
14
+ • Acunu Analytics' contribution to Cassandra through virtual nodes is highlighted as an example of innovation in distributed systems.
15
+ • The connection between Graphite and Prometheus/Cortex is noted, with similarities between the scaling challenges faced by these projects.
16
+ • Definition of observability discussed
17
+ • Critique of traditional "three pillars" definition of observability (metrics, logs, traces)
18
+ • Importance of curiosity and interest in understanding system behavior for observability
19
+ • Discussion of Grafana Labs' approach to observability as a big tent philosophy that supports multiple solutions and techniques
20
+ • Tom Wilkie's preference for defining observability as helping engineers understand their applications and infrastructure through various tools and data sources
21
+ • Example of using Grafana to solve a specific problem (slow requests) in a monolithic application
22
+ • Discussion on Phoenix app architecture, including its monolithic structure and request flow
23
+ • Troubleshooting slow requests using Grafana ecosystem tools, specifically CloudWatch exporter and Prometheus
24
+ • Integrating Fastly logs with Grafana Cloud/Loki, including validation issues and proxy requirements
25
+ • Instrumenting the system for metrics and logs, including CDN, load balancer, Ingress NGINX, and application code
26
+ • Using Loki to extract metrics from logs and create dashboards
27
+ • Applying Tom's "RED" method (request rate, error rate, request duration) to instrument applications
28
+ • Creating a top-to-bottom dashboard layout for system performance analysis
29
+ • Mixins as a packaging format for Grafana dashboards and Prometheus alerts
30
+ • Overview of popular mixins, including Cortex, Kubernetes, and Etcd
31
+ • Use of mixins to simplify dashboard management and reduce cognitive load
32
+ • Jsonnet language used to express alerts and dashboards in mixin format
33
+ • Mixin tooling and ecosystem (e.g. mix tool, Grizzly, Tanker)
34
+ • Monorepo approach with single repo for config management across multiple Kubernetes clusters
35
+ • Use of Jsonnet for managing all aspects of deployment, including Kubernetes jobs and configuration
36
+ • Vision of end-to-end integration through a single language and tooling (Jsonnet)
37
+ • Kubernetes integration with Docker monitoring
38
+ • Using Grafana Agent for metric and log collection
39
+ • Difficulty in integrating dashboards with PromEx library
40
+ • Template-based dashboard approach with data source templating
41
+ • Building dashboards as code using Jsonnet or Grafonnet
42
+ • GitOps-style approach to managing dashboards with tools like Grizzly
43
+ • Collaboration on a YouTube stream to explore building dashboards as code
44
+ • Discussion of using Grafana Cloud and Grafana Agent for metrics and logs
45
+ • Overview of Tempo as a tracing component and its integration with Grafana Cloud
46
+ • Challenges of implementing tracing, including high barrier to entry and lack of incremental rewards
47
+ • Importance of traces in understanding performance issues and identifying slow requests
48
+ • Explanation of OpenTelemetry as a cross-functional project simplifying telemetry data collection
49
+ • Discussion of auto-instrumentation for languages such as Java, Python, and Go
50
+ • Problems with distributed tracing, including holes in instrumentation and black blind spots
51
+ • Need for entire stack to be instrumented to get full value from tracing
52
+ • Future possibilities for improved tracing capabilities through OpenTelemetry and W3C Trace Context
53
+ • Instrumenting spans for distributed tracing
54
+ • Determining the optimal places to instrument spans in a complex system (e.g. Ingress NGINX, Kubernetes)
55
+ • Effort vs reward trade-off in getting complete traces from every service
56
+ • Using OpenTelemetry to get vendor-neutral and open-source support for span instrumentation
57
+ • Integrating with Grafana dashboards and tools for version control and iteration
58
+ • Big tent philosophy approach to observability tooling (supporting multiple systems and vendors)
59
+ • Integration of systems in new ways
60
+ • Supporting multiple query languages within a single database (e.g. Tempo)
61
+ • OpenTelemetry's vendor-neutral approach
62
+ • Conversation discussion and exchange of interest between Tom and Gerhard
Honeycomb's secret to high-performing teams_summary.txt ADDED
@@ -0,0 +1,39 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Definition of observability and its origins in mechanical engineering
2
+ • Observability as a way to understand internal system state without prior knowledge
3
+ • Instrumenting code to gather context and information about system behavior
4
+ • Importance of gathering high cardinality dimensions such as user IDs and request data
5
+ • Distinguishing between metrics-based monitoring tools for infrastructure and observability for understanding code behavior
6
+ • Shift from monolithic architecture to microservices and serverless, requiring more robust observability methods
7
+ • Applying observability principles to monolithic systems and focusing on end-user experience and journey through the app
8
+ • Development teams spend more time with code than end users
9
+ • CI/CD pipelines are essential for observability and reducing bug fixes
10
+ • Observability helps engineers have a tight feedback loop by quickly seeing changes in production
11
+ • Time is key: shipping to production as soon as possible (ideally < 15 minutes) reduces bugs and pathologies
12
+ • Shipping into production is crucial, and testing in production is inevitable; the goal is to do it well with guardrails
13
+ • "Dead code" isn't valuable unless it's in production
14
+ • The number of engineers required to maintain codebase scales with time spent on maintenance, with 2x as many engineers needed for each doubling of time
15
+ • Importance of minimizing wait times in engineering, especially when trying to solve new problems or ship changes quickly
16
+ • Goal of achieving a 15-minute deployment cycle for most companies, with some variation depending on stack and complexity
17
+ • Relationship between testing and shipping speed, with tests ideally running within the same short timeframe
18
+ • Concept of "shipping" as not just deploying code, but also learning from it and getting answers to questions quickly
19
+ • Example of Changelog.com's monolithic application and how to make it more observable using Honeycomb OpenTelemetry instrumentation
20
+ • Visualization of data in Honeycomb, including features like BubbleUp for diagnosing problems and identifying differences
21
+ • Overview of the backend infrastructure for storing events, including Kafka, retriever nodes, S3, Lambda jobs, and API interactions
22
+ • Use of Kafka as a storage engine
23
+ • Comparison with Kinesis and outsourcing vs running in-house
24
+ • Managing and updating Kafka clusters
25
+ • Performance characteristics of storing data on SSDs and S3
26
+ • Monitoring and testing Honeycomb using internal "dogfood" cluster
27
+ • Automated deployment process to kibble, dogfood, and production environments
28
+ • Importance of acknowledging human fallibility and optimizing for learning
29
+ • Importance of building systems that make it easy for engineers to write code quickly
30
+ • Characteristics of a high-performing team, including ability to ship often and focus on new problems
31
+ • Benefits of joining a high-performing team vs trying to improve an existing one
32
+ • Role of engineering managers in creating healthy teams and pushing back against short-sighted approaches
33
+ • Unhealthy power dynamics between product people and engineers, and importance of triad-based relationships
34
+ • Healthy relationship between money flow and priorities, including considering long-term investment and employee well-being
35
+ • Importance of uninterrupted focus for engineers
36
+ • Measuring happiness and health of engineering teams through surveys and open communication
37
+ • Human element in software development, treating engineers as people not machines
38
+ • Observability and CI/CD pipelines for improving team performance
39
+ • Book "Observability Engineering" and its free early release
Introducing Ship It!_summary.txt ADDED
@@ -0,0 +1,37 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Introduction and meeting of hosts Jerod Santo, Adam Stacoviak, and Gerhard Lazu
2
+ • Discussion of the show's concept and title "Ship It"
3
+ • Explanation of what "shipping" means in the context of software development
4
+ • Background story on how Gerhard Lazu started helping Changelog.com with infrastructure issues and evolved into an annual infrastructure show
5
+ • Story about the process of shipping improvements to infrastructure, including testing, feedback, and partner relationships
6
+ • Discussion of the idea for a podcast where teams can share their experiences and learn from each other's "shipping" processes
7
+ • Invitation for listeners to join the conversation and participate in the show
8
+ • Discussion of podcast format and potential topics
9
+ • Gerhard's goal for 10,000 episodes and joking about system breakdown
10
+ • Importance of community and people element in software development
11
+ • Potential topics for discussion, including observability, Kubernetes, continuous delivery, and agile methodology
12
+ • Upcoming episodes with guest experts, such as Ben Ford from Commando Development
13
+ • Aspirations for the podcast to be a place where developers can discuss all aspects of delivering quality software, not just technical details
14
+ • Discussion of software infrastructure and reliability
15
+ • Introducing Gerhard Lazu, a world-class SRE, and his expertise on shipping
16
+ • Gerhard's background in broadcasting and early interest in tech
17
+ • His journey from frontend developer to web hosting provider and interest in infrastructure tools like Ruby on Rails and NGINX
18
+ • Development of Deliver, a tool for deploying websites, and its connection to Ship It podcast
19
+ • Jerod Santo's recollection of interacting with Gerhard through Changelog Media years ago and his decision to email him about the podcast
20
+ • Gerhard Lazu discusses his personal history and how it relates to Changelog
21
+ • Gerhard's background and skills are mentioned, including his experience with various programming languages and technologies
22
+ • The origins of Changelog are discussed, including its beginnings as a side project and its growth over the years
23
+ • Jerod Santo and Adam Stacoviak share their own experiences working with Gerhard and the evolution of Changelog
24
+ • The importance of commitment to one's work is emphasized by Adam and Gerhard
25
+ • Plans for future episodes of Ship It are mentioned, including guests and topics that will be explored
26
+ • The hosts mention a special guest who has been involved in conversations about the podcast.
27
+ • They discuss the goal of creating meaningful and impactful topics for listeners.
28
+ • The hosts explain their process for selecting episodes, including taking suggestions from listeners through changelog.com/request.
29
+ • They highlight various ways listeners can get in touch with them, such as Slack, Twitter, or email.
30
+ • Gerhard mentions that he welcomes passionate topics and conversations, even those that may be contentious.
31
+ • Adam suggests a potential episode topic based on a discussion in the Slack channel about Kubernetes vs PaaS vs IaaS.
32
+ • The hosts discuss the importance of context and nuance in discussions about technology, and how there is no one-size-fits-all solution.
33
+ • They highlight the unique aspect of their podcast being that it is production-focused, with actual code going into the application they are discussing.
34
+ • PromEx and live updating of Changelog.com in production
35
+ • Latest version of Erlang and its impact on Changelog.com performance
36
+ • Livestreaming the process on YouTube for Friday, 28th
37
+ • Unique approach to testing infrastructure and showcasing technology
Is Kubernetes a platform_summary.txt ADDED
@@ -0,0 +1,44 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Table tennis games between Gerhard Lazu and Tammer Saleh in 2016-2017
2
+ • Missed office culture due to remote work, including camaraderie and social interactions
3
+ • Benefits of fully remote companies, such as attracting talent and promoting equality
4
+ • Concerns about cultural divide between cities and countryside, and the potential for remote work to "flatten" this divide
5
+ • Advantages and trade-offs of leaving a big city, including loss of good dinners and table tennis
6
+ • Kubernetes, including its complexity, adoption rates, and original intentions for use by application developers
7
+ • Common problems companies face when starting with Kubernetes, such as navigating YAML and understanding complex concepts like affinity rules
8
+ • Companies need help with complex Kubernetes problems, not maintenance or on-call tasks
9
+ • Harder Kubernetes problems include on-premise installations, custom code development for health checks, and integrating secure technologies like AWS Nitro Enclaves
10
+ • Kubernetes has no single tool for managing clusters on bare metal like BOSH for Cloud Foundry
11
+ • Kubernetes is a "kumbaya DevOps model" where everyone needs to know everything, with blurred lines between operator and application developer responsibilities
12
+ • YAML is a common format for modeling complex software in Kubernetes
13
+ • Kubernetes can be too complex for small teams or startups
14
+ • The speaker suggests that fully managed platforms like Heroku or Fly.io are often a better choice than Kubernetes
15
+ • The litmus test is to "stay on fully managed platforms as long as you can"
16
+ • Docker played a crucial role in Kubernetes' success by standardizing the concept of containers
17
+ • Kubernetes would not have gained traction without Docker's influence and the subsequent hype surrounding it
18
+ • Relationship between Docker and Kubernetes, and whether knowledge of Docker is necessary for understanding Kubernetes
19
+ • Centralizing knowledge of crafting efficient Docker files as a team effort, rather than individual application developers learning it
20
+ • Importance of understanding Linux networking concepts when getting started with Kubernetes
21
+ • Using managed Kubernetes services (e.g. EKS, AKS, GKE) to simplify adoption and reduce complexity
22
+ • Avoiding unnecessary tooling and focusing on core functionality in order to minimize maintenance and upgrade issues
23
+ • The complexity and challenges of using Kubernetes for automation
24
+ • Importance of investing in education and training for engineers to understand the complexity of Kubernetes
25
+ • Need for internal platforms or tools to manage and automate resources within the cluster
26
+ • Role of automation in unlocking the value proposition of Kubernetes
27
+ • Benefits of hiring experts or finding partners with subject matter expertise in Kubernetes
28
+ • Discussion of the importance of debugging and understanding what is happening in the runtime environment, including the use of various tools such as Grafana Cloud, Honeycomb, and eBPF
29
+ • The concept of "Heroku-like" interfaces for developers to interact with Kubernetes without needing to understand its intricacies.
30
+ • Importance of observability and metrics in containerized environments
31
+ • Benefits and challenges of using Kubernetes, including cluster size and complexity
32
+ • Best practices for running stateless workloads in Kubernetes (many small clusters or homogenous workloads)
33
+ • Limitations and considerations for running stateful workloads in Kubernetes (smaller clusters, RDS)
34
+ • Running PostgreSQL as a stateful set in Kubernetes
35
+ • Avoiding managed services like RDS or CockroachDB for simplicity
36
+ • Single instance of Postgres without replication for low downtime
37
+ • Hourly full backups with restore within 2-3 minutes
38
+ • Trade-off between potential data loss and operational ease
39
+ • Managing large numbers of databases as stateful sets in Kubernetes can be problematic
40
+ • Never shipping products can make a startup faster
41
+ • Launching early increases complexity and slows down operations
42
+ • Delay Kubernetes adoption unless necessary, use managed platforms instead
43
+ • Using Kubernetes requires significant automation and education efforts
44
+ • Focusing on simplicity when using Kubernetes is essential to manage "innovation debt"
Is Kubernetes a platform?_summary.txt ADDED
@@ -0,0 +1,91 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Tamer Saleh and Gerhard Lassil discuss their shared experience working in the same London office on Cloud Foundry
2
+ • They transition to discussing Kubernetes, its challenges, and their experience helping companies like Bloomberg and Shopify with DevOps problems
3
+ • Gerhard asks why companies need Kubernetes and what are the right reasons for choosing it
4
+ • Tamer's company, Super Orbital, offers engineering and training services to tackle hard Kubernetes and DevOps problems
5
+ • The conversation includes a humorous anecdote about table tennis culture at Pivotal and its decline with remote work
6
+ • Company has been fully remote since before the apocalypse, finding it easier to adapt
7
+ • Benefits of remote work include access to global talent and equal footing for all employees
8
+ • Remote work can also lead to cultural benefits by bringing people from different backgrounds together
9
+ • Cities are a strain on infrastructure and can create cultural divides; remote work can help flatten this divide
10
+ • Companies now see Kubernetes as necessary, rather than just interesting, with many seeking to implement it
11
+ • Challenges of implementing Kubernetes include its complexity, with many resource types and attributes to understand
12
+ • Kubernetes release cycle has slowed down to every three months
13
+ • Original authors of Kubernetes did not envision application developers directly using it
14
+ • Complexity of YAML in Kubernetes is significant and requires engineer knowledge
15
+ • Training for Kubernetes is a popular workshop topic due to complexity
16
+ • Customers struggle with on-premise installations, targeting 80% market share through Kubernetes
17
+ • Going on-premise is challenging, even with Kubernetes substrate, due to lack of telemetry and control
18
+ • Highly regulated customers require custom code development for health checks and security
19
+ • Integrating EKS with Nitro was challenging but successful
20
+ • Comparison of Cloud Foundry to Kubernetes in terms of management complexity
21
+ • Discussion of Bosch, a tool used for managing Cloud Foundry, and its similarities to Terraform and Ansible
22
+ • Explanation of the "great wall DevOps model" vs. the "kumbaya DevOps model"
23
+ • Observations on the use of YAML in Kubernetes and potential future changes
24
+ • General discussion of Kubernetes' ubiquity and ability to handle complexity
25
+ • Complex software modeling with Kubernetes
26
+ • Maturity level needed for data services
27
+ • Ubiquity of Kubernetes and its expected use
28
+ • Finding the right combination of objects or products in Kubernetes ecosystem
29
+ • Complexity and beauty of building blocks in Kubernetes community
30
+ • Trade-offs between using Kubernetes and other platforms for small teams
31
+ • Analogy between Linux on laptop experience and Kubernetes adoption
32
+ • Recommendation to stay on fully managed platforms for as long as possible
33
+ • Discussion of provisioning raw instances vs Kubernetes
34
+ • Importance of standardization in container technology
35
+ • Docker's role in popularizing containers and enabling Kubernetes' success
36
+ • History of container technology, including early versions like Solaris Zones and FreeBSD Jails
37
+ • Kubernetes' adoption and growth due to community excitement around Docker
38
+ • The speaker discusses how Kubernetes and Docker are often confused as being the same thing
39
+ • Docker is no longer a dependency for Kubernetes, but its standard is still used
40
+ • Understanding Docker concepts, such as container runtimes, is necessary to grasp Kubernetes
41
+ • Application developers don't need to be experts in crafting Dockerfiles, but rather understand the basics of Docker Compose and command-line tools
42
+ • Centralizing expertise in Dockerfile creation can help teams use Kubernetes effectively
43
+ • It's possible to use Kubernetes without a deep understanding of Docker
44
+ • The speaker shares their personal experience with starting with Docker before learning Kubernetes
45
+ • Importance of understanding Linux networking and general networking concepts for Kubernetes
46
+ • Use of managed Kubernetes services (EKS, AKS, GKE) over self-managed clusters due to cost and ease of use
47
+ • Risks and complexities associated with additional tooling such as Istio
48
+ • Need for restraint when adding new components or tools to a cluster
49
+ • Importance of understanding networking before diving into advanced features like Istio
50
+ • Examples of essential components (cert manager) versus nice-to-have components (Helm)
51
+ • Potential pitfalls in cluster management, including upgrade complexities and resource splitting
52
+ • Using Helm charts for internal applications is tedious and can be handled by simpler tools
53
+ • Automation is key when using Kubernetes, not just for cluster management but also for resource management within the cluster
54
+ • Investing in automation will save time and money in the long run
55
+ • Teams should focus on building an internal automation system, including CI/CD pipelines and GitOps
56
+ • Hiring experts or partnering with companies that specialize in Kubernetes can be beneficial to avoid wasted time and resources
57
+ • The importance of education for engineers when working with Kubernetes and cloud native technologies.
58
+ • The need for automation in the world of Kubernetes and cloud native.
59
+ • The spectrum of internal platforms, from simple Docker file management to full Heroku-style interfaces.
60
+ • The challenges of debugging and understanding complex systems like Kubernetes.
61
+ • The benefits of having multiple tools and services for monitoring and logging, such as Grafana Cloud and Honeycomb.
62
+ • Importance of observability in understanding application behavior
63
+ • EBPF and Pixie for deep insights into system performance
64
+ • Redundancies and failovers to minimize downtime
65
+ • Debugging challenges and the need for visibility into complex systems
66
+ • Observability and metrics as crucial investments, especially with Kubernetes
67
+ • The difficulty of building observability infrastructure without automation tools
68
+ • Feeding observability data back into automation for automated rollouts and error detection
69
+ • Simplifying Kubernetes setup through public sharing of configuration and components
70
+ • Inefficiencies in IT teams lead to wasted resources (20% CPU and memory usage)
71
+ • CIOs seek to reduce infrastructure costs by consolidating VMs into one massive cluster
72
+ • Kubernetes adoption was initially driven by cost savings, but operators saw benefits in its API and extensibility
73
+ • Operators found that large clusters can be difficult to manage and upgrade, leading to the concept of "fleets" (small, homogeneous clusters)
74
+ • Running small clusters per availability zone or workload type improves manageability and reduces costs
75
+ • Stateful workloads pose challenges for Kubernetes and should be handled with caution, either by externalizing databases or using teams to manage them
76
+ • Issues with PostgreSQL replication and networking
77
+ • Use of Crunchy data and Zalanda operators
78
+ • Comparison of managed vs self-managed PostgreSQL services
79
+ • Data backup and restore procedures
80
+ • Downtime and availability considerations for single instance PostgreSQL
81
+ • Trade-offs between feature complexity and simplicity in system design
82
+ • Serving stale content when origin is down
83
+ • Managed services for databases vs running own infrastructure
84
+ • Pitfalls of running multiple stateful sets in Kubernetes
85
+ • Technical debt and complexity associated with scaling database operations
86
+ • Importance of launching when necessary, rather than prematurely adopting complex solutions
87
+ • Delay Kubernetes adoption as long as possible
88
+ • Use existing managed platforms instead of managing Kubernetes installations
89
+ • Focus on automation and education when adopting Kubernetes
90
+ • Be prepared to spend "innovation points" on learning and implementing Kubernetes
91
+ • Kubernetes is more complicated than expected, with many configuration options and best practices.
It's crazy and impossible_summary.txt ADDED
@@ -0,0 +1,42 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Apple's goal is not to overtake PC market share, but to make the best personal computers at affordable prices
2
+ • Steve Jobs' decision to drop out of college was one of the best decisions he ever made
3
+ • He dropped in on a calligraphy class at Reed College, which influenced the design of the Macintosh computer
4
+ • Jobs believed that you can't connect the dots looking forward, but only in hindsight; trusting your heart and destiny is key
5
+ • The first iMac G3 had a lasting impact on Gerhard Lazu's life, introducing him to Apple products
6
+ • Steve Jobs discussed his adoption story and how it influenced his decision to attend college
7
+ • He shared the importance of design and typography, specifically the font rendering on Mac devices
8
+ • Evolution of computing from large mainframe computers to personal computers
9
+ • Invention of the fractional horsepower electric motor as a precursor to personal computers
10
+ • Comparison of human efficiency with other animals, highlighting humans' ability to create tools that amplify their abilities
11
+ • Importance of starting with customer needs and working backwards to technology development
12
+ • Role of vision and passion in driving innovation, but also the need for focus and prioritization
13
+ • Characteristics of good engineering management, including clear decision-making processes and a focus on empowerment rather than direction.
14
+ • Managing complexity and knowing when to stop adding features or personnel
15
+ • Importance of good leadership and having a clear vision
16
+ • Eliminating unnecessary code and focusing on quality over quantity
17
+ • Measuring productivity through outcomes rather than metrics such as lines of code written
18
+ • Self-managing teams and promoting a culture of learning from mistakes
19
+ • Importance of recruiting great people and giving them the autonomy to do their job
20
+ • The value of asking for help and being willing to fail in order to learn and grow
21
+ • Apple's organizational structure is like a startup, with a flat hierarchy and weekly meetings among top executives to discuss everything.
22
+ • Teamwork and trust are key at Apple, allowing employees to work together effectively and bring new ideas to the table.
23
+ • Steve Jobs emphasizes the importance of letting employees make decisions and own their projects to foster innovation and learning.
24
+ • Apple's strategy is to be both a hardware and software company, with the direct sales force being essential for innovative products that require education and demonstration.
25
+ • Apple's greatest strength is its vertical integration, allowing it to control product design from end-to-end and tackle complex problems faster than competitors.
26
+ • Software is seen as Apple's competitive advantage, while hardware churns too quickly to provide a sustainable edge.
27
+ • Remote work and remote hosts
28
+ • Concept of technology windows opening and closing
29
+ • Importance of having a well-oiled shipping machine (supply chain) for fast production and market adoption
30
+ • Collaboration between engineering and manufacturing teams, with shared databases and processes
31
+ • Eliminating waste in the production process by reusing technologies and not changing them mid-production
32
+ • The importance of having real-time quality feedback to address manufacturing defects
33
+ • The drawbacks of traditional inventory management and warehouses, and the benefits of Just-In-Time (JIT) manufacturing
34
+ • The concept of viewing companies from a manufacturing perspective on a scale from Stage 1 (manufacturing as a necessary evil) to Stage 5 (manufacturing as an opportunity for competitive advantage)
35
+ • Apple's approach to manufacturing, including hiring software engineers to view factory operations as a software problem and designing custom robots and automation systems
36
+ • The importance of passion, talent scouting, and building a strong team in achieving success
37
+ • The value of treating creativity with reverence and allowing ideas to be fragile and barely-formed, rather than being compromised or dismissed.
38
+ • The impact of Steve Jobs' vision on the company
39
+ • The importance of caring and civic responsibility in work
40
+ • Overcoming challenges and persevering through failures
41
+ • Celebrating the victory of beauty, purity, and giving a damn
42
+ • Personal anecdotes about working with Steve Jobs for nearly 15 years
Kaizen! Are we holding it wrong_summary.txt ADDED
@@ -0,0 +1,66 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Celebrating 30 episodes of Ship It podcast
2
+ • Discussing the impact and journey of creating a podcast
3
+ • Reflecting on future plans for upcoming episodes (40+)
4
+ • Explaining GitOps approach to infrastructure management
5
+ • Analyzing an incident where "latest" tag caused problems with app container image
6
+ • Identifying need for revisiting GitOps approach
7
+ • Unsolved cases and mysterious events
8
+ • GitOps adoption and deployment strategies
9
+ • Using Argo CD for automating infrastructure reconciliations
10
+ • Importance of versioning manifests in repositories
11
+ • Push-based vs pull-based deployments
12
+ • Preventing issues with "latest" tags in Docker images
13
+ • Implementing continuous integration and delivery (CI/CD)
14
+ • Integration with Honeycomb for monitoring CDN behavior
15
+ • Implementing Honeycomb for observability and visibility into CDN behavior
16
+ • Leveraging Fastly's caching capabilities to improve performance
17
+ • Analyzing slow requests and identifying areas for optimization
18
+ • Discussing the impact of cache misses on user experience
19
+ • Examining the benefits and limitations of relying on a third-party CDN
20
+ • Discussion about CDN caching limitations
21
+ • Estimating storage needs in terabytes vs gigs
22
+ • Visibility into 99th percentile tail latency
23
+ • Law of diminishing returns in optimization efforts
24
+ • Apple Watches consuming MP3 files causing slow requests
25
+ • Suggesting static content be served from a CDN for faster access
26
+ • Implementing Fastly as a CDN for serving cache pages and files
27
+ • Troubleshooting issues with Fastly's performance and functionality
28
+ • Exploring ways to optimize Fastly usage and reduce "misses" on MP3 files
29
+ • Discussing the benefits of having more visibility into how Fastly works, including using Honeycomb for data analysis
30
+ • Setting up a dev environment on M1 Macs, specifically with changelog.com and Docker
31
+ • GitHub Codespaces discussed as an alternative to local development environments
32
+ • Equinix Metal and other cloud providers mentioned as potential alternatives to Azure-backed infrastructure
33
+ • GitPod and Tilde.dev mentioned as examples of alternative development platforms
34
+ • Discussion of potential collaboration with GitHub on Codespaces development
35
+ • Adam Stacoviak's preference for using Codespaces over setting up his own local dev environment
36
+ • Gerhard Lazu's idea of exploring a more configurable version of Codespaces in the future
37
+ • Planning for buffer time in scheduling
38
+ • Managing last-minute changes to podcast episodes
39
+ • Solutions for technical issues with GitHub Codespaces and Elixir/Postgres installation
40
+ • Using a temporary solution with an old machine until a new MacBook is available
41
+ • Update on moving uploads to cloud storage (S3) and deprioritizing tasks due to other commitments
42
+ • Investigating a mysterious bug in an Elixir/Phoenix application involving character encoding and URLs
43
+ • Discussing how to handle bugs in dependencies and the importance of staying up-to-date with the latest versions
44
+ • Describing the process of upgrading Phoenix from 1.5 to 1.6, including encountering API changes and breaking tests
45
+ • Refactoring a meta module after discovering that the upgrade broke metadata on all pages
46
+ • The concept of "yak shaving" and how it relates to solving problems and taking shortcuts
47
+ • The concept of a "yak shave" is discussed, referring to the phenomenon where upgrading or improving one aspect of a system leads to additional work and complexity
48
+ • The idea that sometimes it's necessary to "bite off more than you can chew" in order to make progress
49
+ • A discussion about being in a state of flow and how it can lead to significant productivity gains, even if the initial goal is not achieved
50
+ • Mention of several upcoming gifts or topics for future episodes, including:
51
+ • Using Crossplane to manage Kubernetes infrastructure
52
+ • Integrating with Honeycomb
53
+ • Exploring Dagger
54
+ • Parka
55
+ • Reflection on the evolution of the podcast's infrastructure and network over time
56
+ • The hosts discuss the importance of trying out various tools and sharing their experiences on the show
57
+ • Feedback from the podcast is shared with vendors, including Honeycomb and Crossplane
58
+ • The hosts emphasize the value of collaboration and giving feedback to improve tools and services
59
+ • The Ship It initiative is mentioned as a way for end-users to provide feedback to vendors
60
+ • Partnerships are discussed, with many companies being thanked for their support
61
+ • The hosts reflect on the show's journey and thank listeners for their participation
62
+ • Gerhard shares an extreme example of a yak shave, where he spent three weeks troubleshooting internet connection issues with multiple routers and internet connections.
63
+ • The group's initial attempts to discuss the issue are interrupted by laughter, but eventually they manage to compose themselves and explore the logistics and humor in Gerhard's situation.
64
+ • The conversation devolves into jokes about over-engineering and redundancy, with the group suggesting that Gerhard's experience is an extreme example of a principle often referenced in sci-fi (e.g. "why build one when you can build two?").
65
+ • The episode ends with a lighthearted tone, poking fun at Gerhard's dedication to solving his internet issues.
66
+ • The idea of redundancy and over-engineering becomes a recurring theme, with the group joking about Gerhard's need for multiple ISPs and routers.
Kaizen! Are we holding it wrong?_summary.txt ADDED
@@ -0,0 +1,127 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Kaizen discussion and changelog compilation
2
+ • GitOps implementation challenges
3
+ • Using Honeycomb for question asking
4
+ • Jared's work on moving static files to S3-like object store
5
+ • Christmas gifts and upcoming episode themes
6
+ • Importance of GitHub Codespaces integration
7
+ • Backstage 20 release and Changelog 459 relation
8
+ • Partnership announcements (Fastly, LaunchDarkly, Linode)
9
+ • Fly platform promotion for global app deployment
10
+ • The conversation revolves around an incident that occurred and how it has been addressed
11
+ • The incident is related to a GitOps approach where unhealthy pods were put back into service using the "latest" tag
12
+ • The speaker explains that the latest tag refers to the most recent version, which can be problematic if the latest version is broken or outdated
13
+ • A tradeoff was made in the past by allowing corners to be cut for efficiency, but it failed once and now needs to be revisited
14
+ • The conversation turns to a need to revisit the GitOps approach and consider using fixed versions instead of "latest" to avoid similar incidents
15
+ • The speaker reflects on how they learned about the incident through investigation and analysis of the manifest
16
+ • They discuss the importance of capturing specific version numbers for apps and containers to avoid infinite loops or failures.
17
+ • Difficulty in handling unfinished TV shows and similar content
18
+ • Discussion of GitOps and its implementation
19
+ • Current lack of proper GitOps configuration in the system
20
+ • Need to use GitOps properly with tools like Argo CD
21
+ • Reviewing resources for learning about GitOps, including GitOps.org and WeWorks' website
22
+ • Understanding of push-based and pull-based deployment models
23
+ • Importance of following a standardized flow for deployments to prevent issues like using "latest" when it's broken
24
+ • Capturing production for recovery from disaster
25
+ • Importance of specific SHA (version) tagging in container images
26
+ • Incident where a "disaster" occurred due to a broken "latest" tag and continuity not being in place
27
+ • The role of caching and CDN in minimizing the impact of the incident
28
+ • Integration with Honeycomb for enhanced visibility into app behavior and interactions
29
+ • Resolving an issue related to slow MP3 requests using pull request/issue 383.
30
+ • Integration with Honeycomb provides detailed insights into CDN performance
31
+ • Observability features allow for slicing and dicing of data by various criteria, including top URLs, browser, user agent, country, and city
32
+ • Cache status and hit/miss rates can be viewed in detail, as well as audio request breakdowns
33
+ • Derived queries enable exploration of specific issues and root causes
34
+ • Slow requests and their impact on website performance are identified, with an example of a GIF taking 1.4 minutes to load due to its large size and need for travel to the data center
35
+ • Discussion of a large GIF file being served from Newark to Hong Kong and taking a long time to load
36
+ • Use of lazy loading to improve user experience by allowing content to be accessed while the image is still loading
37
+ • Issues with cache misses on Fastly CDN, including expired content not being cached indefinitely
38
+ • Limitations of current caching setup, including headers asking for content to be kept in CDN for a few weeks but it may expire when requested again
39
+ • Discussion of paying for caching service to keep all content cached globally
40
+ • Assessment of total assets and weight of content to determine feasibility of caching everything
41
+ • Discussion of latency and tail latency issues
42
+ • Idea to serve static content from CDN instead of own infrastructure
43
+ • Law of diminishing returns and slow clients consuming resources
44
+ • Need for optimization in serving non-cached content from CDN
45
+ • Requesting Fastly to cache content indefinitely
46
+ • Imposter syndrome due to feeling like not using CDN correctly
47
+ • The speaker is frustrated with the performance of their CDN, specifically Fastly
48
+ • They discuss how long-term content is not being cached as expected
49
+ • They mention that they are a media company with static content that doesn't change often
50
+ • They express confusion about why the CDN is not working as intended despite following best practices
51
+ • They suggest that there may be issues within the CDN itself or its configuration that need to be addressed
52
+ • They propose reaching out to Fastly for further assistance and collaboration.
53
+ • Discussion of a high number of misses in MP3 file delivery
54
+ • Importance of data visibility and the impact of having "hard facts" with Honeycomb integration
55
+ • Conversation about Fastly's functionality and how it handles misses
56
+ • Reference to LaGuardia and Hong Kong locations, possibly related to edge caching or CDN configuration
57
+ • Explanation of Incident.io and its role in incident management within Slack
58
+ • Promotion of Raygun for performance monitoring and user insights
59
+ • Personal anecdote about setting up new M1 Macs
60
+ • Discussing challenges with setting up M1 Mac for changel.com development environment
61
+ • Considering alternatives to Docker and GitHub Code Spaces
62
+ • Wanting to run own infrastructure on Equinix Metal or Linode
63
+ • Concerns about cost and simplicity of GitHub Code Spaces
64
+ • Understanding GitHub's infrastructure and lack of agnosticism in dev environments
65
+ • Suggesting alternative cloud spaces options, such as Gitpod
66
+ • The speaker wants to discuss using GitHub Code Spaces for development environments.
67
+ • They mention wanting to partner with GitHub and have them sponsor Changelog's use of Code Spaces.
68
+ • The speaker prefers using a pre-built, automated dev environment over setting up their own local machine.
69
+ • They express frustration with managing upgrades on their local machine and the potential for conflicts between personal projects and work-related development environments.
70
+ • The speaker considers an electric vehicle analogy to describe their desire for a "prescribed dev space" that is easy to use and doesn't require them to manage upgrades or configurations.
71
+ • They discuss the importance of identity and access control in such a dev environment.
72
+ • A short-term solution suggested is using Code Spaces as it currently exists, with the hope of future improvements.
73
+ • Discussion of using GitHub Code Spaces as a solution for the Changelog app
74
+ • Comparison with Gitpod and Equinix Metal
75
+ • Planning for a future episode on GitHub Code Spaces in December
76
+ • Short-term solution: brew install Elixir, brew install Postgres, clone the repo (rejected)
77
+ • Alternative short-term solution: use Code Spaces wrapped in a bow (GitHub-provided infrastructure)
78
+ • Shipping delays for new MacBooks
79
+ • Using old machines as a temporary solution
80
+ • Uploading to cloud storage (specifically S3)
81
+ • Prioritizing tasks due to limited time and GitHub issues
82
+ • Bug fix: newsletter links proxy encodes special URLs with HTML instead of percent based
83
+ • Apostrophe in URL causing encoding issue
84
+ • The speaker is investigating an issue with a web framework, specifically Elixir Phoenix, where an apostrophe in a URL is causing HTML encoding instead of URL encoding.
85
+ • They consider it a dependency issue and seek advice on how to proceed from Gerhard.
86
+ • Gerhard suggests checking for issues in the repository, looking at code changes around the problem area, and opening an issue if necessary.
87
+ • The speaker questions whether this is actually a bug or just expected behavior.
88
+ • They decide to upgrade all dependencies, including Phoenix, rather than addressing the specific issue directly.
89
+ • The upgrade process reveals breaking changes in the new version of Phoenix that were not anticipated by the speaker.
90
+ • Upgrading from Phoenix 1.5 to 1.6 caused issues with API changes
91
+ • Two specific keys in the "assigns" data bag were removed: view module and view template
92
+ • The removal caused metadata issues on the entire site, including Twitter embeds and third-party integrations
93
+ • The developer had to refactor the meta module and fix several hours of work
94
+ • A yak was shaved (in a humorous analogy)
95
+ • Upgrading or replacing Ingress Nginx with Traffic
96
+ • External DNS management
97
+ • Honeycomb Agent and other agents' setup
98
+ • The yak shaving problem: getting stuck in a cycle of small tasks leading to more work
99
+ • State of flow and perseverance in completing tasks
100
+ • Overconsumption of time on non-priority tasks during a state of flow
101
+ • Mention of multiple gifts and projects
102
+ • Discussion of using cross-plane to manage infrastructure
103
+ • Benefits of integrating various tools, including Dagger and Honeycomb
104
+ • Importance of giving feedback to improve products
105
+ • Storytelling approach in the podcast and its benefits
106
+ • Connection between the creators and users of certain projects (e.g. Solomon Hikes)
107
+ • Reflection on the "circle of life" and serendipity in collaborations
108
+ • Discussing feedback and suggestions for various tools, including Honeycomb, Dagger, Crossplane, and Grafana Cloud
109
+ • Importance of observability in the CDN and its benefits
110
+ • Concept of "an and proposition" rather than "either or" when choosing tools with different strengths and weaknesses
111
+ • Understanding trade-offs between different tools and not looking for a single "perfect" tool
112
+ • Upcoming episodes and topics, including contributions from Echoes initiative
113
+ • Discussion of user experience and the importance of a patient and knowledgeable approach
114
+ • Introduction to Kaizen and its application in improving processes
115
+ • Expression of gratitude to team members, listeners, and partners
116
+ • Announcement of future plans for the podcast and community
117
+ • Promotion of the changelog.com website and community
118
+ • Closing remarks and preview of upcoming episodes
119
+ • The show's previous recording was cut due to a humorous and uncontrollable break caused by Gerhard's reaction to Jared's yak shave story.
120
+ �� Gerhard spent three weeks resolving his home network setup issues with multiple routers, internet connections, and physical installations.
121
+ • He now has two fiber connections, two ISPs, and additional holes in his walls.
122
+ • The conversation focuses on the absurdity and dedication required for such an extreme case of yak shaving.
123
+ • Discussion of WAN connections and network setup
124
+ • Mention of budgeting and new equipment purchases
125
+ • Use of specific software tools, including Gitpod and Codefaces
126
+ • Reference to movie "Contact" and the phrase "you can never have too many"
127
+ • Humorous exchange about wanting multiple copies of a person (Gerhard's wife)
Kaizen! Five incidents later_summary.txt ADDED
@@ -0,0 +1,48 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Discussing the second Kaizen series, 2.5 months after episode 10
2
+ • Reviewing an incident involving DNSimple tokens and Cert Manager
3
+ • Using Incident.io for incident management and tracking
4
+ • Integrating Incident.io with Slack for easier access to past incidents
5
+ • Sharing knowledge and distributing incident information between team members
6
+ • Discussion of incident management and how the team uses an incident platform
7
+ • Explanation of how /inc command creates an incident in Slack
8
+ • Story about Oban, a background job processing library for Elixir, and its integration with the codebase
9
+ • Review of PR#378, which improved the use of Oban and reduced dependencies
10
+ • Discussion of the importance of testing system reliability and documentation of incidents
11
+ • Deployment process insufficiency led to a pod being put into service even though it was unhealthy
12
+ • The unhealthy pod caused the origin server to return 503 responses, resulting in a degraded experience for some users
13
+ • The incident affected only logged-in users who tried to access certain endpoints or pages
14
+ • The company took steps to improve redirects at the edge and reduce health check frequency after the incident
15
+ • The team implemented HTTPS everywhere and removed www redirects in favor of apex domain redirects
16
+ • Technical difficulties with www redirects
17
+ • Fastly configuration issues causing Safari redirect problems
18
+ • Testing in production and scripting requests to hit endpoints
19
+ • DNSimple findings and experimentation gone wrong
20
+ • Debugging as a detective who is also the murderer ( referencing a quote by Filipe Fortes)
21
+ • Discussion of extra domains used for testing
22
+ • Ping Pong domain reference to Erlang and infrastructure management
23
+ • Gerhard Lazu discusses his connection to Switzerland and the domain "lazu.ch"
24
+ • The discussion shifts to ClickOps and the importance of version control and GitOps for Fastly configuration
25
+ • Gerhard shares his experience with experimenting with Fastly and finding it difficult due to its ClickOps nature
26
+ • The conversation turns to recent incidents on Upbound Cloud, including Linode networking issues and LKE unavailability
27
+ • Gerhard discusses the reliability of backups and restores during networking issues, particularly with CockroachDB and Fly PostgreSQL
28
+ • Discussing network downtime and reliability
29
+ • Using Fly to run multiple instances of an app in different regions
30
+ • Limitations of local storage (block storage) vs S3-compatible APIs
31
+ • Planning for multi-region deployments
32
+ • Switching from Arc to Waffle for file uploads
33
+ • Errors in Sentry related to Erlang 24 upgrade
34
+ • Discussion of Erlang version upgrades and potential improvements
35
+ • Twitter Auth issues and consideration to remove or fix feature
36
+ • Ecto.Query.CastError errors, specifically related to podcast unsubscription route
37
+ • Analysis of error data in Getsentry and discussion of its features
38
+ • Proposal for handling robot-generated unsubscribe requests
39
+ • The team is having trouble receiving emails for new issues with Sentry
40
+ • Ownership rules in Sentry may be a solution to automatically assign new issues to the right people
41
+ • Weekday vs weekend error patterns are being discussed, with an interesting anomaly of high errors on weekends instead of weekdays
42
+ • Plans for episode 30, including exploring alternatives to their current infrastructure setup (Fly.io and Elixir)
43
+ • Integrating Honeycomb is mentioned as a priority, with Jerod Santo suggesting testing its integration and reporting back
44
+ • NGINX performance metrics discussed, including 90th and 95th percentile times
45
+ • Long tail requests taking over a minute to service
46
+ • Importance of reliability and robustness in software, particularly for Changelog app
47
+ • Goal of continuous improvement (Kaizen) for infrastructure and business progress
48
+ • Upcoming T-shirt design featuring Japanese characters representing Kaizen
Kaizen! The day half the internet went down_summary.txt ADDED
@@ -0,0 +1,59 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Kaizen: a concept of continuous self-improvement
2
+ • Reflecting on improvements for the show's application and setup every 10 episodes
3
+ • Importance of retroactive feedback loops in improving infrastructure
4
+ • Past improvement process: sharing changes once per year, but now aiming to improve more frequently
5
+ • Recent issues with Fastly CDN, including a global outage affecting multiple services (BBC, emojis, etc.)
6
+ • Reviewing the impact of the outage on Changelog's performance and plans for future improvements
7
+ • Discussion about Grafana and internet downtime
8
+ • Incident where Fastly had an outage during the release of a popular episode of The Changelog
9
+ • Importance of redundancy and double-monitoring systems (e.g. using Pingdom as backup)
10
+ • Debate on whether to rely on Fastly for stats or have a redundant system
11
+ • Exploring options for multi-cloud and service-level solutions
12
+ • Gerhard's idea to use Cloudflare AND Fastly, decouple assets from local storage, and run multiple instances of Changelog across different services (e.g. Linode, Render, Fly)
13
+ • Discussion on the costs and benefits of implementing redundancy
14
+ • Discussion of using MaxMind or GeoIP database for geolocation data
15
+ • Review of Cloudflare's analytics capabilities and potential benefits of multi-CDN setup
16
+ • Long-term direction for the platform, potentially including multi-CDN and improved analytics
17
+ • Immediate tasks to be done on the platform, including managing incidents and creating a plan for incident response
18
+ • Current incident: deleted DNS token causing certificate issues, requiring immediate attention
19
+ • Discussion of activity logs and importance for services with multiple users, with a need for more than 30 days of history
20
+ • Incidents: Token deletion on June 19th was suspected to be an anomaly due to unusual time.
21
+ • Investigation: Discussion on how to investigate and identify who deleted the token.
22
+ • Incident Management: Exploring ways to improve incident management, including consensus-based deletion of access tokens.
23
+ • DNSimple Configuration: Reviewing DNSimple configuration and considering using Kubernetes to manage tokens.
24
+ • Monitoring and Alerts: Discussing the need for proactive monitoring and alerts to catch issues before they cause problems.
25
+ • Incident management and its elements
26
+ • Runbooks as a way to codify incident response steps
27
+ • Importance of automation vs ROI for small teams
28
+ • Use of incident management platforms such as FireHydrant and Incident.io
29
+ • Creating runbooks retrospectively after incidents occur
30
+ • Benefits of using incident management platforms to store and retrieve runbooks
31
+ • Creating backup plans in case of catastrophic failures
32
+ • The hosts discuss their testing process for backups and restoration
33
+ • Importance of pursuing knowledge and sharing content over ensuring uptime at all costs
34
+ • Exploring different platforms (Incident.io, FireHydrant, Render, Fly) for running Changelog and potential benefits/disadvantages
35
+ • Discussing the importance of trying new things and innovating, even if some ideas may fail
36
+ • Mention of setting up incident management and Fastly logging integration for improved visibility and monitoring
37
+ • Difficulty in setting up Fastly logging due to lack of direct integration with Grafana Cloud
38
+ • Discussion of integrating Honeycomb with Fastly and Grafana Cloud
39
+ • Goal to visualize and reduce deployment time from git push to production
40
+ • Analysis of current pipeline inefficiencies and potential for smartening it up
41
+ • Cache invalidation problems associated with optimizing deployment processes
42
+ • Mention of Charity Majors' "15 minutes or bust" goal for code deployment time
43
+ • Reducing complexity in software development
44
+ • Optimizing performance for slow tasks (15-minute delays)
45
+ • Visualizing and understanding the steps involved in these tasks using Honeycomb
46
+ • Migrating from local disk storage to a managed PostgreSQL database or alternative solutions like CockroachDB
47
+ • Moving media assets to an S3 object store to improve restore times and scalability
48
+ • Simplifying the app by making it stateless and leveraging cloud capabilities
49
+ • Potential for unlocking new features with S3 and unmanaged database
50
+ • Chaptering functionality in podcast episodes, including ID3v2 support and FFmpeg integration
51
+ • Motivation to "bite off" chaptering feature as a win, along with stateless capability
52
+ • Pre-processing chapters locally vs. relying on FFmpeg
53
+ • Comparison of YouTube video segments and desired Changelog audio features
54
+ • Client-side compatibility and benefits for indie podcast app developers
55
+ • Automatic file upload and drag-and-drop functionality for blog posts
56
+ • Discussion of pushing podcast boundaries
57
+ • Importance of collaboration on improvement ideas
58
+ • Proposing to implement improvements and revisit in 10 episodes
59
+ • Reference to the concept of "kaizen" (continuous improvement)
Learning from incidents_summary.txt ADDED
@@ -0,0 +1,47 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Incident.io: a platform for whole organizations to get involved in incident response
2
+ • Importance of incident response due to increased customer expectations and choice
3
+ • Current tooling has not kept pace with how people operate, leading to poor incident response solutions
4
+ • Incident.io's goal is to provide a structured, automated way to manage incidents, allowing teams to focus on the problem rather than the process
5
+ • Ideal incident workflow involves core defaults with customizable features for each company's specific needs
6
+ • Key principles of good incident response include:
7
+ + Keeping context all in one place
8
+ + Clear roles and responsibilities
9
+ + Structured coordination and communication
10
+ + Good internal and external communication
11
+ • Incident.io's goal is to provide an opinionated tool for incident response, building on core principles rather than being highly customizable.
12
+ • The company aims to create a scalable solution by focusing on essential features while allowing for extensions and integrations.
13
+ • The product has its roots in the experiences of Chris Evans, who worked on a basic solution at Monzo to simplify on-call processes.
14
+ • Incident.io was inspired by the limitations of existing tools, which often have "rough edges" due to no one owning or maintaining them.
15
+ • The company's founders drew from their experience working with complex systems and incidents in finance and e-commerce.
16
+ • The simplicity of Incident.io is intentional and reflects the company's focus on ease of use.
17
+ • The product's core feature allows users to create incidents with minimal onboarding, using one slash command or message shortcut in Slack.
18
+ • Incident.io uses an "osmosis" approach, where users are encouraged to learn by doing, and are given pointers and nudges as they progress.
19
+ • The company has a unique advantage in building the product because its founders knew what features they wanted from experience with similar problems at Monzo.
20
+ • Incident.io is used within the company for various use cases, including service outages, complicated bugs, and low-severity incidents to leave a trail of thought process and understanding.
21
+ • Using Incident.io for these types of incidents has benefits such as leaving a good trail for others to follow and acting as a structured way to hand over work.
22
+ • Discussion of using Incident.io for incident management and response
23
+ • Importance of having a low-cost entry point for reporting incidents
24
+ • Benefits of using a structured approach to handling incidents, including ease of escalation and communication with customers
25
+ • Statistics on the number of incidents reported and severity levels (91 total incidents, 8 major severity incidents over a year)
26
+ • Explanation of incident severity levels (critical, major, minor) and how they are used in Incident.io
27
+ • Discussion of organizational change and acceptance of incidents as opportunities for team assembly and problem-solving
28
+ • Overview of Incident.io's production setup, including use of Go app on Heroku and cloud providers for infrastructure management
29
+ • Monolithic Go binary architecture
30
+ • Service-based internal structure
31
+ • Asset handling through Go binary and Netlify
32
+ • Image serving complexity with Slack
33
+ • Feature flag management for testing new features
34
+ • Public product roadmap and community engagement for customer feedback
35
+ • Prioritization of feature development based on customer input
36
+ • Consideration of runbooks as a future feature
37
+ • Clarifying the concept of runbooks and their relationship to incident management
38
+ • Discussing the idea of capturing steps taken during incidents as knowledge to be reused
39
+ • Exploring how Incident.io's structure for storing information can help with incident analysis and recommendations
40
+ • Considering the integration of monitoring tools and data into Incident.io's system
41
+ • Emphasizing the importance of simplicity in product development and focusing on the 80% use case
42
+ • Sharing favorite blog posts, including one about learning from incidents in Formula 1 and another called "Incidents are for everyone"
43
+ • Current tooling is focused on engineers, not other teams such as customer support or executives
44
+ • Incidents involve multiple teams beyond engineering and require a more comprehensive approach
45
+ • Incident.io aims to build a tool that caters to the needs of non-engineering teams
46
+ • Simplifying and condensing complex information to facilitate communication between teams
47
+ • Learning from failure is key, and embracing incidents as opportunities for growth and improvement
Let's Ship It!_summary.txt ADDED
@@ -0,0 +1,5 @@
 
 
 
 
 
 
1
+ • The show Ship It aims to get ideas into the world through experimentation
2
+ • Great teams make great engineers, not the other way around
3
+ • Dave Farley's approach of assuming one is wrong and testing ideas is effective
4
+ • Experimentation is demonstrated on the show's open source podcasting platform
5
+ • A hammer analogy illustrates the value of learning from failure
Money flows rule everything_summary.txt ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Gerhard Lazu recalls being fascinated by Docker when it first came out in 2014
2
+ • Ian Miell remembers giving a talk about Docker at OpenBet and realizing its transformative potential for engineers
3
+ • Ian used Docker to containerize a 15-year-old monolith, saving time and making it easier for engineers to work on different applications
4
+ • The two met at a meetup or conference related to DevOps and containers in London
5
+ • They exchanged emails after the meetup but lost touch until years later when they met again and discovered new common interests and projects
6
+ • The speaker shares their experience of using Docker in a previous company, resulting in significant time savings for developers.
7
+ • Ian Miell discusses the importance of feeling uncomfortable or challenged at work (about 30% of the time) as a sign of growth and learning.
8
+ • He elaborates on his transition from a narrow domain to working in infrastructure at Barclays, where he faced new challenges and opportunities for development.
9
+ • The speaker reflects on writing the Docker in Practice book and subsequent editions, as well as creating self-published books like Git the Hard Way.
10
+ • The speaker's experience with Git repositories and explaining complex concepts to others led to the creation of a course and book on Git.
11
+ • The speaker has self-published several books using the "Hard Way" method inspired by Zed Shaw's writing style.
12
+ • The benefits of self-publishing include greater control and higher royalty rates, but also require discipline and organization.
13
+ • The speaker's career goals are shifting towards management and consulting, and they see book writing as a way to increase their credibility.
14
+ • The topic for the episode "Follow the money" refers not to personal wealth, but rather the flow of money within organizations and how it relates to technology and organizational structure.
15
+ • The importance of team organization and agility in software development
16
+ • Marxist ideas on the material base determining the superstructure (culture)
17
+ • Different ways organizations think about investment and maintenance
18
+ • Connection between accounting practices and organizational structure
19
+ • "Follow the money" approach to understanding organizational issues
20
+ • Agile accounting as an alternative to traditional yearly cycle
21
+ • Conway's Law and its implications for organization structure
22
+ • Importance of communication between engineers, accountants, and management in understanding financial flows.
23
+ • Opaqueness in business: lack of transparency about financial metrics
24
+ • Measuring value generated by teams and justifying revenue
25
+ • Agile methodology vs. actual change: companies think adopting Agile solves problems without addressing underlying issues
26
+ • Importance of practical thinking and hands-on approach to address company's money flows and value creation
27
+ • Need for a holistic approach in business, considering multiple factors beyond individual areas of expertise
28
+ • Holistic thinking is crucial for software development success
29
+ • Traditional "front-loaded" platforms require significant upfront investment
30
+ • Non-financial metrics, such as reduced bugs and improved rollback processes, are essential to consider alongside financial metrics
31
+ • Sales teams need to think in terms of delivering value to customers, not just completing transactions
32
+ • Focusing solely on technology and process can lead to missed business considerations and failure to adapt to changing needs
33
+ • Engineers must learn to think more widely and consider the broader business implications of their work.
34
+ • Importance of awareness and connection in business
35
+ • Concept of Container Solutions as a consultancy for cloud-native adoption
36
+ • Approach to problem-solving: analysis over blueprint or quick fixes
37
+ • Value of honesty and telling the truth in business, even if it's not in one's own interest
38
+ • Benefits of flexible thinking and learning from diverse perspectives
39
+ • Transitioning conferences and events to online format due to pandemic
40
+ • Launch of WTF (What's The Fork) series for explaining complex tech concepts in simple terms
41
+ • Importance of humanizing tech discussions and avoiding jargon
42
+ • Value of humility and assuming one is wrong, double-checking and learning from others
43
+ • Managing biases and preconceptions in professional settings
44
+ • Need for teamwork and improving as a group to achieve success
45
+ • Importance of ongoing conversation between Ian and Gerhard
46
+ • High-level analysis work and presenting information effectively
47
+ • Balancing honesty and transparency in helping others change or move forward
48
+ • Evolution of relationships and conversations in the industry (from one-off meetings to building blocks and journeys)
49
+ • The importance of learning from past experiences and refining concepts over time
50
+ • Changes brought about by 2020 and looking towards the future
OODA for operational excellence_summary.txt ADDED
@@ -0,0 +1,38 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Complexity in development and operations
2
+ • Agile and its limitations in handling rapid change
3
+ • The concept of the OODA loop (Observe, Orient, Decide, Act) and its application to complexity and decision-making
4
+ • Ben Ford's background and how he came to understand the importance of the OODA loop in both military and business contexts
5
+ • The idea that the OODA loop is a fundamental abstraction that can be applied universally, like functional programming concepts
6
+ • The concept of nested OODA loops (OODA loops within OODA loops) as a way to handle complex systems and decision-making.
7
+ • The OODA loop (Observe-Orient-Decision-Act) as a unifying concept for operational excellence and agility
8
+ • Digital transformation as a top-down approach that often fails due to lack of bottom-up implementation
9
+ • Importance of adaptation over transformation in organizations
10
+ • Need for external perspective and detachment from within the system to address complex problems
11
+ • Operational excellence as an emergent property resulting from combining principles and making them relevant to the organization
12
+ • Entropy and chaos in systems, highlighting the need for interaction and communication between top and bottom levels
13
+ • Discussion of martial arts analogy for learning and applying principles
14
+ • Explanation of OODA loop (Observation, Orientation, Decision, Action) and its relevance to martial arts and other fields
15
+ • Breakdown of business and management hierarchy into strategic, operational, and tactical levels
16
+ • Relationship between OODA loop components and different levels of business decision-making
17
+ • Explanation of how OODA loops operate at various levels within an organization
18
+ • Discussion of importance of taking action in the OODA loop process
19
+ • Analysis of why it's beneficial to "start with the action" rather than observation
20
+ • The OODA loop requires interaction with the environment through action to initiate cognition
21
+ • John Boyd's original diagram of the OODA loop was limited by its static nature and medium at the time
22
+ • Modern tools allow for more nuanced and dynamic visualizations of the OODA loop
23
+ • Event-driven architectures and data visualization can enable a real-time, 3D picture of an organization's internal workings
24
+ • The OODA loop is an abstraction that combines observations, orientation, decision-making, and action
25
+ • Pipelines, event sourcing, and functional programming concepts can be used to visualize and understand the relationships between different parts of an organization's processes.
26
+ • The importance of considering the organization's impact on the environment as a cohesive system
27
+ • The OODA loop (Observe, Orient, Decide, Act) concept and its application to understanding an organization's interactions with its environment
28
+ • The need for developers to think beyond shipping code and consider the broader implications of their work
29
+ • The value of experimentation and exploring different perspectives in understanding complex systems
30
+ • The limitations of book learning compared to real-world conversations and experiences
31
+ • Recommendations for books, such as "Team of Teams" by Gen. Stanley McChrystal and "Extreme Ownership" by Jocko Willink, that can help deepen one's understanding of OODA Loop concepts
32
+ • Ben Ford's proposed book on the subject, "The OODA Loop according to Ben Ford"
33
+ • The creation of a YouTube playlist featuring conversations about OODA Loop concepts with various experts and perspectives
34
+ • The importance of hands-on experience and building mental models to understand complex systems.
35
+ • Starting the implementation process with becoming aware of principles and trying them out through iteration and refinement.
36
+ • The need for contextual expertise that adapts to changing environments, rather than blindly applying established methods.
37
+ • The OODA loop (Observe-Orient-Decide-Act) as a constant cycle of optimization in complex systems.
38
+ • The limitations of transplanting ideas or teams from one context to another, and the importance of building internal fluency through continuous learning.
OpenTelemetry in your CICD_summary.txt ADDED
@@ -0,0 +1,45 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Presentation on Jenkins CI agents and monitoring with OpenTelemetry
2
+ • Importance of observability in distributed systems like Jenkins
3
+ • Akihiro Kiuchi's project on OpenTelemetry for Jenkins agents as part of Google Summer of Code
4
+ • Use of OpenTelemetry to provide visibility into job execution, agent allocation, and communication
5
+ • CI/CD system architecture and the blurring of lines between CI and CD
6
+ • Importance of using open standards like OpenTelemetry for monitoring and observability in cloud-native deployment
7
+ • Benefits of using OpenTelemetry for distributed tracing, audit, supply chain security, and cost accounting
8
+ • Discussion on the importance of a unified view of CI/CD processes and systems
9
+ • Dimensions in pipeline data collection and abstraction for unified vision
10
+ • Ideal pipeline flow with OpenTelemetry integration
11
+ • Challenges in instrumenting pipelines, such as capturing correct spans and attributes
12
+ • Role of OpenTelemetry in helping CI/CD administrators troubleshoot complex issues
13
+ • Importance of observability in identifying problems impacting multiple teams or organizations
14
+ • Administrator challenges in understanding and debugging complex CI/CD pipelines
15
+ • Caching issues in CI/CD systems and difficulties in identifying dependencies
16
+ • Flaky tests in distributed systems and need for observability to improve confidence in changes
17
+ • OpenTelemetry's role in providing visibility into CI/CD pipeline events, dependencies, and performance
18
+ • Integrating OpenTelemetry with existing tools such as Jenkins and Concourse CI
19
+ • Using Otel CLI as a wrapper for Maven builds or makefiles to gain more granularity in pipeline execution
20
+ • Deploying Jenkins in production using Kubernetes and Helm charts or Operators
21
+ • Configuring pipelines and agents as code, storing them in the same repository as the project code
22
+ • Importance of testing locally on development cycle and having fragments that can be tested locally
23
+ • Jenkins pipeline can be defined in Groovy DSL or Yaml format
24
+ • Declarative syntax vs scripted pipelines, pros and cons of each
25
+ • Configuring Jenkins using Kubernetes API or targeting the master node directly
26
+ • Separating CI from CD concerns, benefits and implementation details
27
+ • Using separate tools for CI (e.g. GitHub Actions) and CD (e.g. Argo CD)
28
+ • GitOps approach connecting CI and CD processes
29
+ • Decoupling deployment from integration concerns using tooling like Keelsh
30
+ • Developing CI/CD pipelines locally with minimal code and business logic
31
+ • Creating pipeline libraries to reuse common steps and reduce complexity
32
+ • Standardization of CI/CD processes
33
+ • Supply chain security in CI/CD space
34
+ • Importance of capturing right information in bill of materials
35
+ • OpenTelemetry instrumentation for observability and audit trails
36
+ • Captain Obvious project for quality gate management and compliance
37
+ • Oleg Nenashev's move to Switzerland and his work with CloudBees
38
+ • OpenTelemetry helps improve developer velocity, reduce costs, and shorten delivery cycles by providing essential data.
39
+ • The same view can be achieved across different systems as long as they emit OpenTelemetry events.
40
+ • Standardization of events is needed for efficient collaboration between systems.
41
+ • Oleg Nenashev wants to lay foundations for working groups to standardize OpenTelemetry events.
42
+ • Continuous Delivery Foundation is already working on standardizing CD events.
43
+ • Adoption of OpenTelemetry has been massive, and it's likely to become incubating soon in CNCF.
44
+ • Cyrille Le Clerc shares updates on donated OpenTelemetry Maven integration and Ansible integration.
45
+ • Oleg Nenashev announces his job change but promises continued involvement in open source and observability.
OpenTelemetry in your CI⧸CD_summary.txt ADDED
@@ -0,0 +1,134 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Introduction to Ship It podcast and its focus on code, ops, infrastructure, and people
2
+ • Guests Cyril Leclerc (Product Manager at Elastic) and Oleg Dinashev (Principal Engineer at Cloudbeast)
3
+ • Akihiro Kiuchi's project on Jenkins Monitoring with OpenTelemetry in the context of Google's Summer of Code
4
+ • Importance of open telemetry in CI environments for visibility, monitoring, and cost-effectiveness
5
+ • Discussion of tracing agents, not just the Jenkins master, to gain visibility into job execution and agent availability
6
+ • Breakdown of job duration and tracking time spent on build allocation
7
+ • Visibility in CI/CD steps and allocation of build agents was limited
8
+ • AkiHero aimed to complement existing traces with detailed visibility on agent allocation and communication
9
+ • Importance of open telemetry in CI/CD systems for unified observability
10
+ • Blurred lines between CI and CD, with other automation use cases needing accessibility
11
+ • Open telemetry helps glue information from multiple tools in CI/CD pipelines
12
+ • Need for data to verify pipeline performance and security in audit and supply chain security
13
+ • Data structure for modeling CI and CD pipelines
14
+ • Exposing data of CD processes as a goldmine for troubleshooting and maintenance
15
+ • Benefits of sizing platforms and shortening build cycles
16
+ • Interest in cost accounting, process optimization, and digital transformation
17
+ • Capturing data on distributed traces using open telemetry
18
+ • Unified view of CI and CD processes
19
+ • Debate over standardizing tools or implementing different ones
20
+ • Distributed trace culture providing overall visibility across phases
21
+ • Dimensions of data collection and culture of abstraction
22
+ • Requirements for a good CI-CD system with open telemetry integration
23
+ • Perfect flow of a system with good open telemetry in the software development pipeline
24
+ • Steps involved in processing code, including invocation of external services and tools like Maven or Gradle
25
+ • Need for observability at each level of the pipeline
26
+ • Distributed tracing and passing context through levels of systems
27
+ • Understanding the beginning of a pipeline and its end result
28
+ • Debate on whether deployment should be the last step in a CI or CD pipeline
29
+ • Importance of reporting, post-processing, and accounting work after deployment
30
+ • Use of external tools for various tasks in the pipeline
31
+ • Discussion of instrumenting pipelines with Jenkins, Maven, and Ansible
32
+ • Need to understand what spans to capture during pipeline execution to measure time taken for specific steps.
33
+ • Understanding the importance of attribute extraction from pipeline execution
34
+ • Capturing relevant attributes for troubleshooting and use cases
35
+ • Associating attributes with teams for cost accounting and performance analysis
36
+ • Using stages (CI build, QA, security) to group pipeline constructs for organizational grouping and data usefulness
37
+ • Attributes for velocity and team performance in software delivery process
38
+ • Inviting entire listener base to move latency sensitive workloads to the edge with compute at edge free for three months and up to $100,000 in credit
39
+ • Overview of Fastly's edge cloud network and modern approach to serverless computing
40
+ • Benefits of deploying complex logic at the edge, including unparalleled security, blazing fast computational speed, and real-time observability
41
+ • Calculation or "spans" being worked out incorrectly when it comes to job allocation in agents, and how open telemetry can help CICD administrators solve this problem
42
+ • Role of open telemetry in helping CICD administrators, who may be a shared role among many people
43
+ • Security scanners and deployment
44
+ • Complicated systems and scalability problems
45
+ • CI/CD pipeline maintenance and troubleshooting difficulties
46
+ • Limited observability of data in distributed systems
47
+ • Need for assistance to quickly understand problem impact and scope
48
+ • Importance of observability for slicing and dicing data in any dimension
49
+ • Docker registry issues and their impact on CI/CD administrators
50
+ • Provision of tools to help notify CI/CD administrators early of problems
51
+ • Observability and its benefits in microservices architecture
52
+ • Automated anomaly detection through machine learning and statistics
53
+ • Benefits of observability for CI/CD administrators
54
+ • Comparison of modern CI/CD systems as a mesh of asynchronous processes
55
+ • Complexity of pipeline dependencies and interactions
56
+ • Agent provisioning and synchronization issues
57
+ • Caching in CI/CD systems and its impact on pipeline performance
58
+ • Difficulty in tracing events and understanding pipeline flow
59
+ • Managing outages and issues across multiple pipelines
60
+ • Difficulty in caching system interaction
61
+ • Complexity of pipeline systems and debugging challenges
62
+ • Importance of caching for reducing costs
63
+ • Simplifying complex systems for better throughput
64
+ • Visibility and monitoring of cicd pipelines
65
+ • Divergence between dev and ops teams' goals (stability vs. new features)
66
+ • Need for observability to build confidence in change
67
+ • Flaky tests in distributed systems
68
+ • Challenges with testing distributed systems, including race conditions
69
+ • Open Telemetry's potential to help with flaky tests
70
+ • Existing solution for Go test using Open Telemetry
71
+ • Opportunity to create a backbone for unit test results through Open Telemetry channels
72
+ • Potential for dev/ops team to implement their own tool to process and share flaky test reports
73
+ • Community-driven open source solution leveraging the flexibility of Open Telemetry
74
+ • Expecting an emerging standard for open telemetry in CI/CD systems
75
+ • Currently, almost no tools have built-in serial open telemetry instrumentation
76
+ • Jenkins and Concourse CI are two platforms that provide native open telemetry instrumentation
77
+ • Integrating open telemetry in Jenkins requires installing the Jenkins Open Telemetry plugin and connecting to an open telemetry endpoint backend (e.g. Elastic or Jaeger)
78
+ • Auto CLI from Equinix Labs can be used to collect open telemetry data for systems without built-in support
79
+ • Capturing health metrics and tracing pipeline execution using open telemetry
80
+ • Two initiatives that came to mind for instrumenting CI/CD pipelines were using Honeycomb's small cli tool and Hotel CLI as a wrapper.
81
+ • Hotel CLI can be used with tools like GitHub Actions, GitLab CI, and Jenkins, even if the platform itself is not instrumented.
82
+ • A hackish method was mentioned of replacing the shell on agents with one that has Hotel CLI enabled by default.
83
+ • An example of using Open Telemetry to create a shell wrapper that sends commands to Open Telemetry was discussed.
84
+ • Running Jenkins in production was touched upon, and it was noted that elastic uses Kubernetes for their modern Jenkins platform.
85
+ • Leverage flexibility of Docker containers to let development teams customize their build environment was recommended.
86
+ • Modern Jenkins management and the elimination of "Jenkins Plugin Hell"
87
+ • Running Jenkins and Kubernetes in production
88
+ • Deploying Jenkins using configurations, code, and infrastructure as code
89
+ • Packaging Jenkins into containers using tools like Helm charts
90
+ • Local development and testing of CI pipelines
91
+ • Deployment options for Jenkins in production, including use of Kubernetes and Helm charts
92
+ • Jenkins configuration as code
93
+ • Pipelines stored in repository with project
94
+ • Agent definitions stored in repository
95
+ • Entire Jenkins combination (server, login, config) as a single deliverable
96
+ • Configuring Jenkins using Kubernetes API or targeting Jenkins master directly
97
+ • Flexibility of deploying Jenkins and retrieving configurations without redeploying system
98
+ • Fire Hydrant platform and its features
99
+ • Incident response automation
100
+ • Separating CI (Continuous Integration) from CD (Continuous Deployment) pipelines
101
+ • Implementation of separate CI and CD tools (e.g. GetHub Actions, ArgoCD)
102
+ • Discussion on automating deployment processes and supply chain security
103
+ • KeylessH is currently used to watch images and automatically update when changes occur
104
+ • A desire to decouple deployment and integration concerns, allowing for multiple copies of production environments
105
+ • The use of CI/CD systems, with a focus on scalability concerns
106
+ • Jenkins is commonly used for pipeline development, along with GitHub Actions
107
+ • Pipeline libraries are created to implement common steps, such as deploying to Docker Hub or building Maven projects
108
+ • Test frameworks can be built for these pipelines to ensure they function correctly
109
+ • Jenkins plugin development and maintenance process
110
+ • Importance of standardizing CI/CD processes, managing them as a "kettle" rather than individual "pets"
111
+ • Security considerations for build systems and production environments
112
+ • Supply chain security within the CICD space and importance of dependency updates and scanning
113
+ • Open telemetry instrumentation for continuous delivery pipelines
114
+ • Audit trails and logs management for release and build processes
115
+ • Importance of capturing accurate information in the bill of material
116
+ • Verification and trust requirements for Jenkins and CI systems
117
+ • Incremental journey of verifying captured data and metadata on builds
118
+ • Integration of Captain Obvious with OpenTelemetry and Jenkins
119
+ • Exposure of quality gate information to enable verification
120
+ • Plans for integrating Captain with other tools and systems
121
+ • Update on the status of Captain Obvious project, including its integration into Cloud Native Computing Foundation
122
+ • Discussion of the vibrant community surrounding Captain Obvious
123
+ • Discussion about living in Switzerland
124
+ • Open source standard "open telemetry" for observing CICD pipelines
125
+ • Importance of exposing data from CICD processes
126
+ • Data analysis for optimizing pipelines and decision-making
127
+ • Standardization of open telemetry events
128
+ • Adoption and growth of the open telemetry ecosystem
129
+ • Future plans for donating code to the open telemetry community
130
+ • Progress on open telemetry Ansible integration
131
+ • Donating Ansible integration to the community
132
+ • Iterating and rolling out inside Elastic
133
+ • Jenkins evolution roadmap to be published soon
134
+ • Future projects in observability and open source
Optimize for smoothness not speed_summary.txt ADDED
@@ -0,0 +1,40 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Slinging code vs getting it right: the difference between shipping quickly and doing it correctly
2
+ • The importance of psychological safety, autonomy, and alignment in software development teams
3
+ • Velocity vs fluidity: optimizing for speed or smoothness in delivery processes
4
+ • Consistency over time: maintaining a healthy pace across years rather than just short-term goals
5
+ • Knowing where to point teams: the importance of shared understanding and business value in successful projects
6
+ • Disconnect between developers and product owners leads to a lack of understanding of "why" and ultimately facilitates negative externalities
7
+ • Building software for business value or customer outcomes requires understanding the equivalent "why" and correlating points to business value
8
+ • Complexity in technical solutions makes it difficult to answer the question of "why"
9
+ • Detachment from the "why" can lead to a lack of excitement, creativity, and innovation among developers
10
+ • A sustainable and healthy development pace is one that allows for asynchronous chewing and deliberate pacing, allowing for forward progress and hope despite blockers and complexity.
11
+ • The importance of understanding human productivity and creativity as influenced by brain function and social interaction
12
+ • Justin Searls' Twitter poll on whether DevOps has sped up or slowed down teams' ability to deliver software, with 44.5% voting "Sped up"
13
+ • Critique of the term "DevOps" for becoming a buzzword that overemphasized automation and neglected core desires such as ease of use and minimal complexity
14
+ • Justin's experience with Heroku as a prime example of what he wants in terms of simplicity and ease of deployment, but notes that this is not the market trend
15
+ • Discussion on how DevOps has led to teams hiring "DevOps people" to manage cloud computing, rather than simplifying operations
16
+ • Shared understanding of "DevOps" being a point of contention among respondents, with Justin arguing that typical DevOps activities do not truly automate problems
17
+ • Git push as the foundation for a resilient system
18
+ • Critique of overemphasis on new technologies and ignoring fundamental principles in DevOps
19
+ • Parallels between test-driven development and infrastructure/DevOps
20
+ • Importance of total cost of ownership and return on investment when considering testing and automation
21
+ • Criticism of generic, context-free advice on testing and DevOps tools
22
+ • Need for operational knowledge and understanding of how systems integrate and fail
23
+ • Value of automation in detecting and notifying issues, but not replacing human expertise
24
+ • The burden of knowledge and experience required for complex systems and infrastructure
25
+ • Transitioning from commodity services to self-managed infrastructure and the difficulties involved
26
+ • Recognizing inflection points where teams must adapt and learn new skills, such as testing and DevOps
27
+ • The importance of building in confidence and consistency through testing and automated pipelines
28
+ • Strategies for addressing flaky tests and achieving consistent builds
29
+ • Understanding the nuances of scaling systems and making informed decisions about infrastructure choices
30
+ • The importance of distinguishing between actual system failures and flaky implementation problems in test results
31
+ • Limiting the scope of integration tests due to complexity and resource constraints
32
+ • Relying on different types of testing, such as property-based testing and contract testing, to reduce reliance on integration tests
33
+ • Avoiding over-organization of tests into a single bucket, instead organizing by constraints and using multiple test suites
34
+ • Maximizing isolated units that can be tested in isolation for fast feedback, while also having locally integrated tests and some number of contract tests
35
+ • Olympic event in Tokyo
36
+ • Japanese news and media coverage
37
+ • 13-year-old female gold medal winner in skateboarding
38
+ • Excitement generated by the achievement
39
+ • Show notes with additional content
40
+ • Future episode planning
Real-world implications of shipping many times a day_summary.txt ADDED
@@ -0,0 +1,49 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Traefik was created to solve a problem with automating reverse proxy configuration in microservices
2
+ • Emile Vauge started working on Traefik as a side project 6 years ago to automate the rooting and networking aspects of 2,000 microservices
3
+ • The project's success was unexpected, becoming popular after being featured on Hacker News
4
+ • Early versions of Traefik supported Mesos, Docker, Consul, Etcd, and Marathon, with Kubernetes support added later
5
+ • Service discovery in Traefik is designed to handle the complexity of large-scale deployments like the original 2,000 microservices project
6
+ • Building a strong community around Traefik was crucial to its success, but also complex to manage
7
+ • The project's approachable documentation and graphics were well-received by users
8
+ • Traefik has a high volume of alphas and betas due to its use of continuous deployment and automated release generation
9
+ • Discussion of CI/CD pipeline evolution and adoption by Traefik
10
+ • Challenge of sustaining a large community with an internal team moving quickly
11
+ • Gap between 1.x and 2 branch versions of Traefik, including lessons learned from revamping the project architecture
12
+ • Importance of connecting company goals to community needs and values
13
+ • Strategies for reconciling differences between Traefik the company, product, and community, including:
14
+ + Creating a private group for active contributors (ambassadors)
15
+ + Developing a process for handling community input and contributions daily
16
+ • Importance of shipping being only the beginning of a long process
17
+ • Use of GitHub as the main source of truth for tracking issues and PRs
18
+ • Implementation of GitHub Actions for automating processes
19
+ • Mymirca ant colony concept used to map tools to tasks
20
+ • Automation of documentation and versioning using custom tools
21
+ • Release cycle with 3-4 minor releases per year, following semver versioning system
22
+ • Fast pipeline for bug fixes and vulnerability patches
23
+ • Priority zero fix has to ship today in two versions
24
+ • Minor releases focus on latest version for backward compatibility
25
+ • No new features added in patch releases, only bug fixes
26
+ • Support for minor releases is until next minor release plus a few months
27
+ • Release calendar not used due to external contributions and potential changes
28
+ • Major version bump requires significant architecture changes or backward-incompatible features
29
+ • Semantic versioning applied to API, config, and plugins with additions allowed but no changes
30
+ • Behavior of internal components can change, but must be intentional or have flag options
31
+ • Plugins integration is new to Traefik and lacks strong versioning mechanism
32
+ • Two ways to use plugins: published on marketplace with hash-based versioning or private plugins without version checks
33
+ • Traefik exposes APIs that plugins can use, which are part of public API subject to backwards-compatibility requirements
34
+ • Long-tail latencies in proxy requests, potentially due to TLS issues or specific ciphers
35
+ • Traefik can help understand request slowness through distributed tracing and real-time metrics export
36
+ • Using Traefik as a reverse proxy and also for services themselves, not just apps
37
+ • CRDs (Custom Resource Definitions) needed to configure Traefik in Kubernetes context, but specifics depend on use case
38
+ • Future pain point: automation of all networking space due to microservices growth, beyond just reverse proxy automation
39
+ • Kubernetes cluster management and scalability challenges
40
+ • Need for orchestration of multiple Kubernetes clusters
41
+ • Traefik Labs' vision for handling distributed systems with complex networking
42
+ • Kubernetes federation as a solution for managing multiple clusters
43
+ • Challenges in implementing high availability, blue/green deployments, and end-to-end security across multiple clusters
44
+ • Traefik's features and capabilities, including LetsEncrypt integration and auto-discovery
45
+ • Comparison of Traefik to other tools like Ingress NGINX and Cert Manager
46
+ • Importance of community engagement and feedback in product development and success
47
+ • Discussion of a past meeting or conversation
48
+ • Plans for a future meeting or discussion
49
+ • Appreciation and gratitude expressed by both parties
Shipping KubeCon EU 2021_summary.txt ADDED
@@ -0,0 +1,49 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • KubeCon/CloudNativeCon events
2
+ • Stephen Augustus' experience with recording podcasts from conferences
3
+ • Los Angeles event planning (in-person component)
4
+ • Keynote ideas (game show concept with Bob)
5
+ • Adding a "show" element to keynotes
6
+ • Promotional videos and content impact on the keynote
7
+ • Co-chairs' roles and conference involvement
8
+ • Conference structure and transition of co-chairs
9
+ • The importance of considering the end-user perspective in cloud-native solutions
10
+ • The roles of team members Jasmine, Constance, Stephen, and Gerhard in their respective positions at Twitter and KubeCon EU
11
+ • Constance's role as "the question master" and her approach to observability through questioning
12
+ • Discussion about changes and challenges faced by the team, including personal emergencies and deadlines
13
+ • The creation of a promotional video for KubeCon EU that played on the theme of misinformation in the world
14
+ • Appreciation for the hard work of program chairs and track chairs who review conference talks
15
+ • Challenges of reviewing talks at KubeCon
16
+ • Importance of considering external factors in review process
17
+ • Need for balance when accepting similar talks
18
+ • Observability as a topic example with various takes
19
+ • 101 track focus on beginner content
20
+ • Balance between reviewer feedback and program structure
21
+ • Volume and complexity of the review process
22
+ • Comparison of talk acceptance numbers across different KubeCon events
23
+ • Tips for submitting talks, including differentiation and takeaway identification
24
+ • Importance of reviewing abstracts from multiple perspectives
25
+ • The importance of playing to one's strengths when presenting or sharing information
26
+ • Different learning and communication styles among individuals
27
+ • Benefits of recording oneself and refining presentation skills through internal demos and feedback
28
+ • Various formats for sharing knowledge, such as blog posts, podcasts, and workshops, rather than just talks
29
+ • Recognition and appreciation in the community can come from multiple forms of contribution, not just public speaking
30
+ • Importance of acknowledging and highlighting other types of contributions to a project, beyond public speaking or presentations
31
+ • Hallway track at KubeCon allows attendees to meet others with similar interests and form connections
32
+ • The hallway track is not just about attending talks, but also about networking and having conversations with others
33
+ • Replicating the hallway track experience virtually can be done through Zoom breakout rooms
34
+ • Meeting people in person vs online is a key difference, allowing for more personal connections and deeper discussions
35
+ • The "PacMan rule" suggests expanding social circles to allow new people to join and participate
36
+ • Reiterating community guidelines and rules will be important when transitioning back to in-person events
37
+ • Encouraging community ownership and participation, rather than relying on others to provide updates
38
+ • Responsibility falls on individuals to seek information and updates from communities they participate in.
39
+ • Kubernetes community resources are available on github.com/community for learning about governance, SIGs, and working groups.
40
+ • It's not possible for speakers or organizers to provide all necessary information; attendees should generate their own questions and seek further knowledge.
41
+ • Be kind and respectful when engaging with content, considering the effort and dedication of speakers and organizers.
42
+ • Use official channels for feedback, such as talk surveys, conference surveys, and transparency reports.
43
+ • Constructive criticism is essential for growth and improvement in communities.
44
+ • Assume good intent from others, but also acknowledge historical power imbalances and do your own work to be thoughtful in communication.
45
+ • The importance of community in building and maintaining KubeCon
46
+ • Everyone is responsible for creating a positive and inclusive environment at KubeCon
47
+ • Conducting oneself appropriately according to codes of conduct
48
+ • Recognizing the need to acknowledge and manage negative behaviors within the community
49
+ • Celebrating the unique attitude and inclusivity of the cloud-native landscape and CNCF
The foundations of Continuous Delivery_summary.txt ADDED
@@ -0,0 +1,58 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • The evolution of software deployment methods, from manual FTP and rsync to automated Git pushing.
2
+ • The concept of Continuous Delivery and its acceleration around 2012/2013.
3
+ • Dave Farley's personal experience and inspiration for writing the book "Continuous Delivery" with Jez Humble.
4
+ • Formative experiences that shaped Farley's understanding of software development, including working on complex projects and adopting agile methodologies.
5
+ • The importance of experimentation, learning from mistakes, and scientific rational thinking in software development.
6
+ • Continuous delivery as an approach to facilitate efficient progress and engineering practices.
7
+ • The impact of continuous delivery on teams and individuals, with Gerhard Lazu sharing his personal experience and gratitude.
8
+ • The challenge of changing people's habits and adopting new ways of working
9
+ • The importance of data-driven decision making in software development
10
+ • The difficulty of establishing and maintaining a positive culture within an organization
11
+ • The interplay between people and practices in driving the success of software development teams
12
+ • The potential for technology to amplify the talents and skills of developers, rather than being a heroic exercise carried out by geniuses
13
+ • The distinction between "software engineers" and "software developers", and the implications of this distinction
14
+ • Martin's focus on simplicity and separation of concerns is emphasized as an essential aspect of his design approach
15
+ • The importance of test-driven development (TDD) in enhancing the property of focusing on separation of concerns is discussed
16
+ • Dave Farley's background and experience with continuous delivery, agile methods, and extreme programming are highlighted
17
+ • The early 2000s technology stack used for continuous integration and delivery is described, including Java, CruiseControl, Ant files, and homegrown tooling
18
+ • Examples of innovative and sophisticated tooling developed by LMAX team members, such as a test distributor and a dynamically managed compute grid, are mentioned
19
+ • Performance demands and software development in the early 2000s
20
+ • Challenges of building tools and systems without existing frameworks or platforms (e.g. no open source software, no GitHub, etc.)
21
+ • Introduction of Agile principles and continuous delivery at ThoughtWorks
22
+ • Development of BDD, continuous delivery, and mocking concepts
23
+ • Legacy of earlier software development methods and the reaction to them that led to the Agile movement
24
+ • Emergence of cloud-native systems and projects (e.g. Argo CD, Event Sourcing)
25
+ • Evolution of CI/CD tools and systems over time (e.g. Jenkins, CircleCI, GitHub Actions)
26
+ • Cloud computing has changed the focus from storage economics to compute costs
27
+ • Normalizing data is no longer necessary due to cloud-based services and sharding
28
+ • The cloud allows for easy access to spin up resources, but also raises the bar of abstraction
29
+ • Continuous integration and delivery tooling needs improvement, particularly in terms of opinionated software that provides clear guidelines for deployment pipelines
30
+ • Build systems like Gradle are examples of opinionated software that make development easier
31
+ • A standardized pipeline concept is needed for CI/CD, similar to the Kubernetes API
32
+ • There is a need for a next building block or standardization in CI/CD tooling to simplify pipeline declaration and execution
33
+ • Minimum deployment pipeline requirements
34
+ • Importance of fast feedback and confidence in software releasability
35
+ • Key stages in a deployment pipeline (e.g. unit tests, acceptance tests)
36
+ • Template for pipelines with parallelized and scalable architecture
37
+ • Definition of a deployment pipeline as a process from commit to releasable outcome
38
+ • Goal of continuous delivery is to have software always in a releasable state
39
+ • Example of a deployment pipeline for an Erlang-based project
40
+ • Critique of a deployment pipeline that automatically deploys to production within 15 minutes
41
+ • Discussion of pipeline optimization and testing strategies
42
+ • Explanation of the concept of instruction pipelining in computer processors and its relation to deployment pipelines
43
+ • Criticism of conflating different types of tests in a deployment pipeline
44
+ • Importance of evaluating deployability and configuration of systems, especially in high-stakes environments
45
+ • Case study of a company's software engineering practices with Siemens Healthcare as an example
46
+ • Discussion of the impact of delays or errors on end-users and strategies for mitigating downtime
47
+ • Introduction to Dave Farley's YouTube channel "Continuous Delivery" and its purpose.
48
+ • Importance of experimentation and learning in software engineering
49
+ • Value of focusing on skills and techniques over prescriptive methodologies
50
+ • Dave Farley's YouTube channel as a resource for software engineering insights and experiences
51
+ • Benefits of continuous integration (CI) and single-branch development
52
+ • Inspirations from companies like SpaceX and Tesla, particularly their approach to innovation and experimentation
53
+ • Personal preferences and opinions on various software engineering topics
54
+ • Importance of minimizing time between code changes
55
+ • Value of finding simple explanations for complex ideas
56
+ • Inspiration from Martin Thompson on embracing imperfection and continuous improvement
57
+ • Recommendation to check out David's YouTube channel
58
+ • Discussion wrap-up and appreciation for the conversation
What does good DevOps look like_summary.txt ADDED
@@ -0,0 +1,38 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Recap of Gerhard Lazu's 2019 talk on making systems observable
2
+ • Discussion about DevOps Days Zurich 2021, including organization and logistics
3
+ • Overview of the event's format, with single-track sessions and a variety of talks
4
+ • Review of a specific talk by Jonathan Smart, "Better. Sooner. Happier", focusing on Agile transformation
5
+ • Upcoming plans for DevOps Days Zurich 2022, including an in-person event and call for papers
6
+ • Discussion about the importance of diversity in topics at the conference, beyond technology and process
7
+ • Romano Roth's background and involvement with DevOps
8
+ • Romano Roth's first CI/CD system was a command line script, later using Team Foundation Server
9
+ • Today, he uses TeamCity and Octopus Deploy, but sees a trend towards platforms like GitHub and GitLab
10
+ • He is the head of DevOps at Zühlke, with 31 team members in Switzerland and others globally
11
+ • His team works on various projects, including Agile and DevOps transformations for clients
12
+ • Common obstacles to successful DevOps transformation include middle management resistance and misalignment between units
13
+ • Key to success is bringing top management on board with clear vision and guidance.
14
+ • Dealing with individuals who resist change
15
+ • Importance of education and convincing in implementing change
16
+ • Agile and DevOps transformation as a process of transforming ideas into value for customers
17
+ • Hypothesis-driven approach to identifying minimal viable products and reducing batch sizes
18
+ • Need to optimize shipping cycles while maintaining a comfortable pace
19
+ • Emphasis on iterative learning and making small course adjustments
20
+ • Importance of recognizing when it's enough and not chasing unnecessary perfection
21
+ • Culture shift needed to allow for failures and learn from them
22
+ • Example of making mistakes as an opportunity to learn, rather than avoid
23
+ • Challenges with implementing new technologies
24
+ • Importance of learning from mistakes and sunk costs
25
+ • Role of technology in decision-making processes for teams
26
+ • How to deal with team members getting excited about specific technologies
27
+ • Decision-making process within a team regarding which technology to use
28
+ • DevOps trends for 2021 (automation, security, AIOps)
29
+ • Definition and implementation of AIOps (AIOps tools such as Dynatrace and Datadog)
30
+ • AIOps and automation trends
31
+ • Tools used in DevOps such as Octopus Deploy, Jenkins, TeamCity, ASH Devops, GitHub, and GitLab
32
+ • DevSecOps and supply chain security tools like SonarQube, Checkmarx, WhiteSource, and Splunk
33
+ • Hyper-automation trend and its relation to AIOps and observability
34
+ • Cyber-resilience topic, including dev sec ops and infrastructure security
35
+ • Participatory budgeting as a method for allocating budget effectively
36
+ • Importance of making decisions
37
+ • Learning from mistakes
38
+ • Constantly adapting to changing circumstances
What does good DevOps look like?_summary.txt ADDED
@@ -0,0 +1,70 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Interview with Romano Roth, head of DevOps at Zülke
2
+ • Overview of Zülke's business and services, including factory robots, AI assistants, and medical devices
3
+ • Romano's background as a .NET developer and his current role in leading 30 software engineers
4
+ • Discussion of recent DevOps challenges and wins across various companies
5
+ • Review of the DevOps Meetup group and events, including DevOps Days Zurich
6
+ • Details on organizing an in-person event during COVID-19 pandemic, including safety measures
7
+ • The speaker liked a particular talk that emphasized the importance of people over processes in IT transformation.
8
+ • The talk was about focusing on what really matters in an HL transformation, rather than just following frameworks such as scaled HL.
9
+ • The speaker compared this idea to the Agile Manifesto's principle of "people over processes".
10
+ • The upcoming DevOps Days conference will be held in person again next year, likely in May or June.
11
+ • The call for papers for the next conference is expected to open in December or January.
12
+ • There was discussion about diversity in topics and speakers at the conference, with a desire to include more talks on culture and UX in DevOps.
13
+ • People's tendency to chase shiny new things and the comfort of familiar tools
14
+ • Origins of DevOps and its connection to continuous integration and delivery pipelines
15
+ • First experiences with CI-CD systems (command line scripts, batch files)
16
+ • Current use of various CI-CD systems (TeamCity, Octopus Deploy, GitHub, GitLab)
17
+ • Shift towards platform-based solutions like GitHub and GitLab
18
+ • Role as head of DevOps at Zylke, leading a team of engineers and consultants
19
+ • Training and educating clients on DevOps practices
20
+ • Consulting on IT, HR, and DevOps transformations in client projects
21
+ • Team size: 31 DevOps engineers at Zylke in Switzerland
22
+ • Global presence: other people around the world doing DevOps
23
+ • Multiple customers and projects, with team members working on different responsibilities
24
+ • Successes and failures in projects, including a notable agile transformation project with a customer
25
+ • Key takeaway from the successful project: deliver directly to the customer, let them show how they use it
26
+ • Promotion for Fastly's Edge Cloud Network and serverless computing
27
+ • Biggest obstacles to driving DevOps transformations or successful DevOps projects: middle management and company structure
28
+ • Misalignment between business units and silos
29
+ • Challenges of HR transformation and DevOps in getting buy-in from leaders who lose power and control
30
+ • Importance of educating leaders on new roles and responsibilities in a transformed organization
31
+ • Need for top management to provide clear vision and guidance for transformation efforts
32
+ • Addressing resistance to change, including educating or replacing individuals who are resistant
33
+ • Agile and DevOps transformations focusing on connecting value stream to customer needs and iterating on product development
34
+ • Importance of identifying hypotheses behind ideas and testing them with minimal viable products and leading indicators.
35
+ • The importance of a comfortable pace when working on projects
36
+ • The scientific method and iterating quickly to validate assumptions
37
+ • Recognizing when it's enough and not chasing perfection
38
+ • Shipping code and features as soon as possible, even if they're not complete
39
+ • Failing and learning from mistakes as an essential part of the development process
40
+ • Allowing teams to make failures and learn from them, rather than trying to avoid failure altogether
41
+ • Old technology used in the beginning led to learning about customer needs.
42
+ • Addition of user experience was necessary but showed limitations with old tech.
43
+ • Switching to new technology required a willingness to change and adapt.
44
+ • The importance of server-side rendering, such as LiveView, was discussed for its efficiency and simplicity.
45
+ • Not being afraid to say "I was wrong" and course correct is crucial in decision-making.
46
+ • Sunk cost fallacy should not be ignored, and throwing more money at a bad idea is not beneficial.
47
+ • Focus on learning, not time spent, is essential when evaluating new technologies.
48
+ • Understanding the underlying problem being solved by technology is key to making informed decisions.
49
+ • Analysis of technology possibilities and their advantages/disadvantages
50
+ • Decision-making process for adopting technologies: team involvement vs external decisions
51
+ • Importance of prototypes in evaluating technology effectiveness
52
+ • Use cases for FireHydrant's reliability platform in incident response and automation
53
+ • DevOps trends mentioned: automation, security (DevSecOps), AIOps
54
+ • AIOps (Artificial Intelligence for IT Operations) discussed as a trend and its potential to solve complex problems
55
+ • AIOps tools mentioned: Dynatrace, Datadog, pattern matching capabilities
56
+ • Automation tools mentioned: Octopus Deploy, Jenkins, TeamCity, Azure DevOps, GitHub, GitLab
57
+ • DevSecOps (Supply Chain Security) discussed with a focus on application security and static code analysis
58
+ • Tools for static code analysis mentioned: SonarCube, Checkmarks, OWASP tool (name not specified)
59
+ • Importance of analyzing libraries and dependencies in addition to code itself
60
+ • Tool for vulnerability identification and licensing management mentioned: WhiteSource
61
+ • Trends in DevOps for 2021
62
+ • Hyperautomation as a major trend for 2022
63
+ • Importance of monitoring and maintaining systems with hyperautomation
64
+ • Need for observability with automated processes
65
+ • Cyber resilience topic, including DevSecOps and infrastructure protection
66
+ • Allocating budget through participatory budgeting
67
+ • Participatory budgeting as a more effective method than dividing budgets equally among stakeholders
68
+ • The benefits of participatory budgeting include entrepreneurial thinking, emotional attachment to decision-making, and better outcomes
69
+ • Key takeaway: don't be afraid to make decisions, learn from mistakes, and adapt constantly
70
+ • Importance of strategic alignment with OKRs or company strategy in decision-making
What is good release engineering_summary.txt ADDED
@@ -0,0 +1,36 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Release engineering importance for open source projects
2
+ • Relationship between developers and end users of open source software
3
+ • Core infrastructure components (RabbitMQ) and their reliance on stable releases
4
+ • Comparison of release engineering in RabbitMQ and FreeBSD operating system
5
+ • Examples of release engineering gone wrong (security bugs, breaking changes, delayed shipping)
6
+ • Consequences of poor release engineering (lost trust, reluctance to upgrade)
7
+ • Importance of user confidence in software releases
8
+ • Vicious cycle of developers struggling with updates leading to decreased user adoption
9
+ • Relationship between end-user happiness and release engineering
10
+ • Comparison of RabbitMQ and FreeBSD as core infrastructure components
11
+ • Discussion of specific use cases where one or the other is more critical
12
+ • Overview of the FreeBSD release engineering process, including a fixed interval between major releases and flexible planning
13
+ • The FreeBSD development process involves a detailed calendar for planning and communication
14
+ • The community can plan and test new versions in advance, with Netflix being one example
15
+ • The release engineering timeline depends on whether it's a minor or major release
16
+ • Minor releases typically take weeks to months, while major releases take 2-3 months or more
17
+ • Major releases do not follow semantic versioning, but aim for compatibility between releases
18
+ • Contributors can find tasks in the Bugzilla bug tracker and solve problems they encounter with FreeBSD to contribute
19
+ • The community can participate by submitting patches through GitHub pull requests, mailing lists, or Bugzilla
20
+ • Release engineering in FreeBSD
21
+ • Calendar-based release cycles for major and minor releases
22
+ • Communication and organization improvements through fixed intervals and advance announcements
23
+ • Other open-source projects (Darktable, Mesa library) that implement similar release engineering strategies
24
+ • Balance between shipping stable software and incorporating new features/drivers
25
+ • Difficulty of testing complex graphics drivers and finding the right balance in shipping updates
26
+ • Use of Erlang for web development and its benefits
27
+ • Hot code reloading feature of Erlang and its challenges
28
+ • RabbitMQ not using hot code reloading due to complexity
29
+ • Packaging and configuration management issues with Erlang-based systems
30
+ • Challenges of packaging and distributing complex distributed stateful systems like RabbitMQ
31
+ • Benefits of containerization and Kubernetes in managing such systems
32
+ • Challenges with databases in containerized environments
33
+ • Limitations of RabbitMQ's current functionality compared to traditional systems
34
+ • Discussion of implementing hot code reloading in RabbitMQ
35
+ • Potential benefits and feasibility of implementing hot code reloading only for bug fixes
36
+ • Release engineering practices and experiences shared by users of open-source projects
What is good release engineering?_summary.txt ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Importance of good release engineering for core infrastructure
2
+ • Jean-Sébastien Padron's experience as a contributor to RabbitMQ and FreeBSD
3
+ • Challenges of debugging complex systems with multiple software versions
4
+ • The role of communication in release engineering, especially for open-source projects
5
+ • Benefits of good release engineering, including improved user satisfaction and feedback
6
+ • Importance of making money in open-source projects
7
+ • Challenges and risks associated with release engineering for RabbitMQ
8
+ • Definition and characteristics of core infrastructure components (RabbitMQ as an example)
9
+ • Comparison between RabbitMQ and FreePSD (operating system) regarding release engineering
10
+ • Examples of failed release engineering efforts (RabbitMQ security bug fix/ break-in change, FreeBSD 5.0 release cycle)
11
+ • Trade-offs between shipping a new version quickly vs. taking time to stabilize the code base
12
+ • Importance of timely software releases and updates
13
+ • Impact on user confidence and willingness to consume future changes
14
+ • Relationship between release engineering and user happiness
15
+ • Comparison of RabbitMQ and FreeBSD as core infrastructure
16
+ • Considerations for companies using these systems (e.g. cars, gaming, streaming)
17
+ • Real-life example of a customer issue with RabbitMQ in Paris
18
+ • RabbitMQ is involved in message exchange between car and key
19
+ • Importance of core infrastructure, such as RabbitMQ, being transparent but often overlooked
20
+ • Teleport Access Plane for unified access to computing resources
21
+ • Release engineering process for FreePST, including fixed interval between major releases and minor releases
22
+ • Use of a calendar tool for release planning, including code freeze, beta releases, and final release dates
23
+ • Importance of communication and flexibility in the release process
24
+ • The FreeBSD release engineering process was introduced after FreeBSD 5 and has undergone changes to adjust the timeframe between releases for easier user understanding.
25
+ • The FreeBSD calendar is published on the FreeBSD.org website and announced on mailing lists, providing a clear schedule of upcoming releases.
26
+ • The development process takes place in an internal Git repository hosted by FreeBSD, with read-only mirrors available on GitHub; there are discussions about introducing alternative tools like GitLab.
27
+ • The community can communicate with developers through various mailing lists focused on specific topics or branches.
28
+ • Users can participate in FreeBSD development by finding tasks on the Bugzilla bug tracker or solving problems they encounter while using FreeBSD.
29
+ • Submissions for patches can be made through pull requests on GitHub, mailing lists, or Bugzilla after opening an issue.
30
+ • Release cycle and timeline for FreeBSD
31
+ • Differences in versioning between FreeBSD and other operating systems
32
+ • Principles of Least Astonishment (POLA) in FreeBSD release engineering
33
+ • Importance of compatibility and deprecation in major releases
34
+ • Timeline for major and minor releases in FreeBSD
35
+ • Comparison to RabbitMQ's current release engineering process
36
+ • Inspiration from other open-source projects, including Darktable and Mesa library
37
+ • Distributed team meetings and challenges with graphics drivers
38
+ • Discussion of FreeBSD and its stability in comparison to other systems
39
+ • Importance of balancing shipping updates quickly with ensuring software stability
40
+ • Challenges of testing graphics drivers on various hardware configurations
41
+ • Shift from including graphics drivers in the core FreeBSD source code to packaging them separately
42
+ • Software development process involving testing, feedback, and updates
43
+ • Importance of communication with contributors and users in release engineering
44
+ • Limiting the impact of mistakes and being honest about them
45
+ • AirLong (Yoz) web server used for a previous project
46
+ • Hot code reloading feature of AirLong
47
+ • Packaging Debian packages for the service
48
+ • RabbitMQ software development process, lack of hot code reloading
49
+ • RabbitMQ code changes can be problematic if not handled correctly
50
+ • Migration from state V1 to V2 requires careful handling
51
+ • Clustered systems make this process even more complicated
52
+ • Packaging AirLong VM with configuration management tools is challenging
53
+ • RabbitMQ's plugin system and microservices architecture contribute to complexity
54
+ • Containerization has helped simplify packaging and deployment
55
+ • Kubernetes cluster operators can help manage complex deployments
56
+ • Kubernetes' challenges with stateful distributed systems
57
+ • Limitations of RabbitMQ in containers and Kubernetes environments
58
+ • Hot code reloading feature not available in RabbitMQ, but potentially achievable through bug-fix only patch releases
59
+ • Benefits of hot code reloading for users and developers
60
+ • Open discussion on release engineering practices and user experience
61
+ • Goodbyes spoken multiple times
62
+ • Timing and duration of goodbyes vary
63
+ • No other conversation or topics discussed
Why Kubernetes_summary.txt ADDED
@@ -0,0 +1,42 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Lars Wikman helped improve Changelog.com's codebase
2
+ • He and Alex had differing approaches to improving performance
3
+ • Lars worked on various projects for The Changelog, including email functionality and the meta-costs feature
4
+ • Jerod has not implemented the meta-costs feature yet
5
+ • Lars is deeply invested in the BEAM ecosystem (Erlang/Elixir)
6
+ • His top favorite features of BEAM are concurrency/parallelism, resiliency, and dynamic typing
7
+ • Shipping Elixir apps and their dependencies
8
+ • Releases and packaging options for Elixir/Erlang
9
+ • Docker and Docker Compose use cases and benefits
10
+ • Database management with PostgreSQL, MySQL, SQLite, and Litestream
11
+ • Stateful vs stateless systems and implications for deployment
12
+ • The importance of simplicity and avoiding radical changes to existing software
13
+ • Critique of Mnesia, a distributed database included with the BEAM ecosystem, citing scalability issues and conflict resolution problems
14
+ • Use of SQLite as a caching solution for Elixir projects, leveraging standard tooling and compatibility with Ecto
15
+ • Discussion of WhatsApp's use of Mnesia, employing it in a limited capacity due to concerns over consistency and performance
16
+ • Evaluation of CockroachDB as a distributed database solution, highlighting its Postgres compatibility and scalability features
17
+ • Concerns about using Kubernetes as an abstraction layer, arguing that developers should still be aware of underlying details such as Linux installations
18
+ • Decision to use PostgreSQL instead of SQLite in a recent project due to the reliability and community support behind the former
19
+ • Discussion of maintaining confidence in deployed software, including considerations for updates, CVEs, and backup strategies
20
+ • Difficulty in taking small steps to improve systems as they become more complex
21
+ • Importance of sticking with defaults and common paths for reliability and upgradability
22
+ • Dangers of "chasing shiny" new technologies and frameworks without need or justification
23
+ • Need to question the assumption that a product must be scalable, and to consider whether it's necessary
24
+ • Value of writing retrospective posts to document lessons learned from past projects
25
+ • Trade-offs between microservices and monolith architecture, and importance of knowing when to use each approach
26
+ • Lars Wikman's skepticism towards using Kubernetes for small-scale systems
27
+ • Gerhard Lazu's explanation of why Changelog chose to use Kubernetes (maturity, managed service offered by Linode)
28
+ • Challenges with managing DNS updates and certificates in a Kubernetes environment
29
+ • Discussion on using Ansible, Terraform, Concourse CI, and Docker Swarm before settling on Kubernetes
30
+ • Benefits of using Kubernetes for complex systems with multiple concerns and integrations
31
+ • Discussion around using proprietary cloud services for file serving
32
+ • Comparison between using NGINX and Kubernetes for load balancing and infrastructure management
33
+ • Difficulty in understanding the value proposition and benefits of using Kubernetes
34
+ • Critique of Kubernetes as being overly complex, generalized, and "over-engineered"
35
+ • Alternative approach to using a runtime environment like the BEAM (Erlang/Elixir) that provides high-availability and observability features out of the box
36
+ • The discussion centers around the simplicity and complexity of Kubernetes
37
+ • Gerhard Lazu defends Kubernetes as a complex but simple system with a clear interface and API
38
+ • He compares it to other deployment tools like Chef and Ansible, stating that Kubernetes is a more comprehensive solution
39
+ • Lars Wikman shares his experience with Kubernetes and notes its ability to simplify operations, but also paves over details
40
+ • The conversation touches on the trade-off between simplicity and explicitness, with Gerhard arguing for a more declarative approach in certain situations
41
+ • Lars likens Kubernetes to Electron, suggesting that it makes operations simpler but obscures underlying complexities
42
+ • Both discussants agree that abstraction layers can be beneficial, but also highlight their potential drawbacks when applied incorrectly.
Why Kubernetes?_summary.txt ADDED
@@ -0,0 +1,66 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • The importance of a simple approach to shipping software
2
+ • Kubernetes and its complexities
3
+ • A discussion on the value of simplicity in application development
4
+ • Performance improvements made to changelog.com's codebase
5
+ • An introduction to Render, a zero DevOps cloud platform
6
+ • Meta costs feature and its potential benefits
7
+ • The Beam ecosystem (Erlang and Elixir) has its own virtual machine and benefits from Erlang technology
8
+ • The speaker writes in Elixir, not Erlang, but is invested in the Beam ecosystem
9
+ • Concurrency and parallelism are built-in features of the Beam that make it easy to use
10
+ • Resiliency is also a key feature, allowing components to fail without affecting the entire system
11
+ • The speaker prefers dynamic languages over typed ones, citing ease of development as a benefit
12
+ • The speaker discusses the challenges of shipping a lightweight application with minimal dependencies.
13
+ • OpenSSL is mentioned as a tricky dependency to manage.
14
+ • The conversation turns to on-prem deployments and the use of Docker to set up infrastructure.
15
+ • The speaker explains their plan to provide a Docker Compose file, credentials, and let someone else set up the database (Postgres) using Docker.
16
+ • Discussion around configuration management, especially with Postgres, including versioning, SSL enabling, and tuning.
17
+ • The speaker suggests shipping a binary or executable for simple use cases, but notes that this is not feasible for more complex scenarios like on-prem deployments.
18
+ • Stateless systems are mentioned as an alternative to stateful ones, where no data needs to be moved with the service.
19
+ • The speaker shares their own experience with building stateless systems and using SQLite for simpler operational requirements.
20
+ • A project called Lightstream is mentioned as a solution for replicating SQLite databases and ensuring high availability.
21
+ • Discussing the use of SQLite in small-scale SaaS applications
22
+ • Mention of Lightstream and its author Ben Johnson (also known as Ben B. Johnson) and his experience with database systems
23
+ • Importance of simplicity and effectiveness over complexity in software development
24
+ • Discussion on adapting to existing infrastructure for clients, including using SQLite if necessary
25
+ • Amnesia and Beam ecosystems, their challenges, and limitations at scale
26
+ • Example of WhatsApp's use of Amnesia for metadata storage, but not for heavy writes or reads
27
+ • Mention of RabbitMQ as a project that has issues with Amnesia at scale
28
+ • Explanation of Amnesia's design limitations and its suitability for tightly coupled machines in telecom applications
29
+ • Replicating Postgres and its complexities
30
+ • Concerns of using CockroachDB vs Postgres
31
+ • Kubernetes as an abstraction layer simplifying everything, but still requiring attention to details
32
+ • Choosing PostgreSQL over SQLite for a recent project due to concerns about adapter reliability and maintaining support
33
+ • Importance of choosing widely supported and documented solutions for maintainability and future-proofing
34
+ • Importance of carefulness in choosing technology and architecture
35
+ • Value of scalability and reliability in certain situations
36
+ • Dangers of "chasing shiny new frameworks" without considering needs
37
+ • Need to ask enough questions (e.g. "why") before making decisions
38
+ • Lessons learned from past mistakes and successes
39
+ • Microservices vs monoliths, importance of choosing wisely
40
+ • Kubernetes, potential overcomplication
41
+ • Discussion of the benefits and drawbacks of using Kubernetes
42
+ • Experiences with other containerization tools, including K3S
43
+ • Reasons for choosing Kubernetes, including maturity and managed services offered by Linode
44
+ • Challenges in implementing Kubernetes, such as DNS updates, certificate management, and secret storage
45
+ • Concerns around automation, monitoring, and scalability
46
+ • Managing infrastructure upgrades without worrying about versions
47
+ • Current infrastructure setup using Terraform, Ansible, Docker Compose, and Concourse CI
48
+ • Considering a control plane to continuously apply configs and improve management
49
+ • Evaluating Kubernetes for large-scale deployment and scalability concerns
50
+ • Alternative solutions like K3S, GitOps, and proprietary cloud services for file serving and load balancing
51
+ • Discussion of a project's database setup, including PostgreSQL and CockroachDB
52
+ • Complexity of getting started with Kubernetes and its value proposition
53
+ • Comparison between Kubernetes and other frameworks or runtimes, such as Erlang Elixir and the Beam
54
+ • Critique of Kubernetes for being over-engineered and trying to solve everything
55
+ • Alternative approach to using a more specialized runtime that handles infrastructure concerns
56
+ • The speaker suggests that Kubernetes is often used too early in projects and can be overwhelming due to its complexity
57
+ • Kubernetes provides simplicity by abstracting away many details, but this abstraction can also obscure understanding of the underlying system
58
+ • The speaker notes that Kubernetes is a powerful tool for automating operations, but it requires a significant learning curve
59
+ • Comparison is made to other tools like Chef, Ansible, and Heroku, highlighting Kubernetes' unique features and benefits
60
+ • The speaker suggests that Kubernetes can make operations simpler, but at the cost of understanding the underlying details
61
+ • Abstraction layers are seen as a double-edged sword: providing convenience, but also obscuring knowledge of the system.
62
+ • The power of imperative code and its ability to clearly show what is happening in a system
63
+ • Criticism of declarative approaches, such as Kubernetes, for adding unnecessary complexity to simple systems
64
+ • Importance of understanding the needs and context of different teams (dev and ops) when choosing tools and abstractions
65
+ • Need for collaboration and communication between dev and ops teams to create effective solutions
66
+ • Benefits of agreeing on abstractions and having a planned approach to problem-solving
🎄 Merry Shipmas 🎁_summary.txt ADDED
@@ -0,0 +1,68 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • Introduction to a CI/CD LEGO set used by Changelog.com for production
2
+ • New pipeline improves coding-to-prod time to at least twice as fast as before
3
+ • Use of Dagger and CUE language in the pipeline
4
+ • Discussion of the team's experience working on the project, including challenges and learning opportunities
5
+ • Explanation of the new pipeline workflow, including parallel dependency builds and caching mechanisms
6
+ • Plans for improving developer experience with BuildKit and CUE
7
+ • Demonstration of the new pipeline and its features, including actions and parallel dependency builds.
8
+ • BuildKit and Docker build features
9
+ • Steps as container-based actions with inputs and outputs
10
+ • Pipeline running in parallel with caching and speed improvements
11
+ • Dagger integration with GitHub Actions and local machines
12
+ • Open tracing feature for visualizing pipeline performance
13
+ • Fine-grained step relationships enabling parallel execution
14
+ • CI setup and environment variables configuration
15
+ • Secrets management using SOPS encryption
16
+ • Discussion of a pipeline's configuration and how it interacts with Docker and CUE (Configure, Unify, Execute)
17
+ • Explanation of CUE as a configuration language that aims to be better than JSON and YAML
18
+ • Benefits of using CUE for schema definition, data validation, and type-checking
19
+ • Example use case: deploying serverless functions on AWS using CUE
20
+ • Mention of future improvements with Europa, including improved DX (Developer Experience) and potential removal of hoops to jump through in the pipeline configuration
21
+ • Discussion of the value of profiling Kubernetes workloads
22
+ • Explanation of sampling profiling and its benefits over traditional profiling methods
23
+ • Introduction to Parka, a tool for recording and analyzing CPU profiles
24
+ • Demo of Parka's functionality, including visualizing CPU samples and Flame Graphs
25
+ • Discussion of how Parka can be used to optimize code and reduce CPU usage
26
+ • Discussion of performance spikes in Parka's profiling data
27
+ • Symbolization and ingestion of profiling data as potential causes for performance issues
28
+ • Optimizations to reduce performance impact, including buffer reuse and storage optimizations
29
+ • Displaying Flame Graphs in Parka, with the ability to view different profiles and machine-compiled binaries
30
+ • Explaining memory addresses in Flame Graphs due to stripped debug information in Postgres binary
31
+ • Introduction of Debuginfod project for on-demand debug symbol retrieval
32
+ • Discussion of Erlang VM's just-in-time compiler and perf.maps implementation
33
+ • Comparison view feature in Parka, with interpretation of results regarding CPU cycles and observations of stack traces.
34
+ • Discussion of color scheme for visual representation
35
+ • Attempt to diagnose an issue with Parka Agent symbolization, specifically a memory address that doesn't match any executable code
36
+ • Investigation into procfs and process maps to understand memory-mapping behavior
37
+ • Theoretical explanation of potential issues with stack trace snapshots in eBPF
38
+ • Decision to seek further expertise from Lukas Larsson on Erlang runtime behavior
39
+ • Discussion of using Crossplane to provision a Linode Kubernetes cluster for Changelog.com setup
40
+ • Discussion about an upcoming Easter Egg in a project
41
+ • Review of control plane and Kubernetes cluster versions (K 1.3.1 and patch updates to 1.3.3)
42
+ • Terrajet setup and requirements for Crossplane version (version 1.3 sufficient)
43
+ • Pairing session on setting up a new repository using the Provider Jet template
44
+ • Troubleshooting issues with Terraform provider source and Terraform download name in the Docker file
45
+ • Discussing a GitHub issue with a Linode Terraform provider
46
+ • Resolving an issue with the provider's version and import path
47
+ • Understanding how to set up credentials for the Linode provider in a Terraform configuration
48
+ • Introduction to Terrajet, a code generator that creates Crossplane providers from Terraform providers
49
+ • Explanation of how Terrajet was used to create a Linode provider for Crossplane
50
+ • Discussion of the number of providers generated with Terrajet and where they can be found
51
+ • List of new providers added to Crossplane, including Equinix, Exoscale, and Jet Linode
52
+ • Discussion on TerraJet's ability to handle large numbers of CRDs (custom resource definitions) with APIs
53
+ • Introduction of a new provider for AWS that has 765 CRDs
54
+ • Explanation of how a Crossplane provider was added in just 12 commits
55
+ • Announcement of upcoming changes for Terrajet, including stabilized API groups and commercial WebHooks
56
+ • Demonstration of how easy it is to create a new Crossplane provider using TerraJet
57
+ • Installation of Crossplane and the Linode provider in production
58
+ • Explanation of how small images can be used to pull larger images with metadata
59
+ • Crossplane used to provision a new Linode Kubernetes Engine (LKE) cluster
60
+ • The CRD (Custom Resource Definition) in Linode Jet Crossplane IO v1 Alpha 1 group is used for provisioning clusters
61
+ • Terrajet uses Terraform's tfstate and exports it as a secret, which is then decoded by Crossplane to generate the kubeconfig
62
+ • The goal is to create a self-updating, self-provisioning system where Crossplane can provision resources within the cluster without needing external kubeconfig
63
+ • If a resource (in this case, the cluster) is deleted, Crossplane will reconcile and try to recreate it after a 1-minute wait period
64
+ • Crossplane recreates a cluster and its nodes after it is accidentally deleted
65
+ • Composite resources allow for the creation of multiple resources in one composition
66
+ • The "batteries included" concept allows for installing base system components with a single composition
67
+ • Compositions can be used to define custom APIs and manage applications across multiple clusters
68
+ • Future plans include moving Crossplane from being hosted on a cluster to being hosted on Upbound cloud, allowing for centralized management of multiple clusters and other resources.
🎄 Merry Shipmas 🎁_summary.txt ADDED
@@ -0,0 +1,136 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ • CI/CD Lego set (PR395) for changelog.com
2
+ • Continuous CPU profiling (PR396)
3
+ • Auto-restoring Kubernetes clusters (PR399)
4
+ • Dagger, a universal deployment engine introduced in episode 23
5
+ • Implementation and challenges of integrating Dagger with changelog's infrastructure
6
+ • Benefits of using Dagger for CI/CD pipelines
7
+ • Interactions between Q and BuildKit and how they're applied to BuildKit states
8
+ • Improvements in the new pipeline for compiling dependencies and running tests in parallel
9
+ • Use of caching mechanisms and ephemeral databases
10
+ • Changes to the API to make it more explicit and intuitive
11
+ • Integration with GitHub Actions and its potential use in the pipeline
12
+ • Overview of Dagger's current state and improvements being made
13
+ • Pipeline execution in parallel
14
+ • Caching of steps to speed up pipeline execution
15
+ • Dagger's ability to use caching for faster builds
16
+ • Comparison of Dagger and Docker build times
17
+ • OpenTracing integration for visualization of pipeline execution
18
+ • Flexibility to run pipelines on any CI setup, including GitHub Actions and CircleCI
19
+ • Demonstration of Dagger's cached run and its performance
20
+ • Discussion on using BuildKit to enable parallel execution of fine-grained steps
21
+ • Explanation of how GitHub Actions integration works with Dagger
22
+ • Breakdown of a specific GitHub Actions config file, including environment variables, jobs, and actions used
23
+ • Description of using Tailscale Tunnel for remote Docker access
24
+ • Discussion on committing secrets and using SOPS for encryption
25
+ • Transitioning from "environment" to "plan" or "DAG"
26
+ • Using CI package for tasks and automation
27
+ • Docker-based workflow with encrypted credentials
28
+ • Providing inputs for environment/plan/DAG, including source code and dependencies
29
+ • Explanation of queue configuration language and its features (schema definition, data validation)
30
+ • DAG or pipeline stages (app image, test container, etc.)
31
+ • Depths compile as a way to describe and apply structures in other places
32
+ • Discussion of the advantages of Queue over other configuration management tools like YAML and Helm
33
+ • Explanation of how Queue's schema definition feature can define the shape of a particular configuration, including constraints on different fields
34
+ • Example use case for Kubernetes deployments with CPU field constraints
35
+ • Description of how Queue's compiler errors steer users in the right direction
36
+ • Discussion of potential future developments in the Queue community, including a language server
37
+ • Mention of upcoming changes with Europa that will simplify and improve the user experience
38
+ • Profiling has been a key tool for developers since software engineering began
39
+ • Traditional profiling was expensive and only done when necessary
40
+ • Sampling profiling introduced a more efficient method, recording stack traces at statistically significant intervals (e.g., 100 times per second)
41
+ • This allows for detailed analysis of CPU usage and optimization opportunities
42
+ • Parca is an implementation that provides near real-time flame graphs and comparative CPU profiles for Kubernetes workloads
43
+ • It uses EVPF technology to minimize overhead and record stack traces directly in the kernel
44
+ • Benefits include saving money, improving performance, and understanding system bottlenecks.
45
+ • The Parca agent sends CPU profiles to the Parca server for analysis and visualization.
46
+ • The PPF (Profiling Format) standard is used for profiling data, allowing integration with other tooling and workflows.
47
+ • The server ingests CPU profiles from the agent and allows downloading in PPF format for external use.
48
+ • The Parca UI displays flame graphs, showing cumulative values of CPU usage for each span.
49
+ • Garbage collection can be a significant contributor to CPU spikes due to memory allocation and deallocation.
50
+ • Continuous profiling and symbolization can contribute to garbage collection spikes.
51
+ • Optimizations such as buffer reuse can help reduce memory allocations.
52
+ • The discussion begins with examining a Postgres database and its compiled binary, observing that it only shows memory addresses due to debug information being intentionally removed for size optimization.
53
+ • A workaround is mentioned using Debug Info D, a project hosting servers for on-demand debug symbol retrieval.
54
+ • Parker doesn't currently support this feature, but the developers are working on implementing it.
55
+ • The discussion moves on to examining an Erlang VM and its interpreted code, noting that it has a just-in-time compiler.
56
+ • A comparison is made with other dynamic languages and virtual machines, highlighting the need for runtime-specific implementation in Parker.
57
+ • The use of perf maps in Erlang is mentioned as a potential solution for symbolizing memory addresses on the fly.
58
+ • There are issues with implementing this feature for Erlang, but support is expected to be added in the future.
59
+ • The discussion concludes with an overview of the compare view in Parker, which allows users to compare two profiles side by side.
60
+ • Observations of CPU cycles and stack traces
61
+ • Analysis of performance metrics using a diff function
62
+ • Discussion of memory address symbolization
63
+ • Investigation into a memory address with unknown origin
64
+ • Use of Linux procfs to inspect binary code memory mapping
65
+ • Attempt to identify the source of an unknown memory address
66
+ • Discussion of a table that shows executable code coming from the binary
67
+ • Explanation of how the stack can sometimes be too tall when retrieving stack trace snapshots from eBPF
68
+ • Theoretical possibility of executing code on the stack in Erlang VM
69
+ • Proposal to ask Lucas Larson for expertise on the matter
70
+ • Mention of pull request 396 and a plan to follow up on it
71
+ • Review of Parca discussion and agreement to fix issue R
72
+ • Plan to use cross-plane to provision Linode Kubernetes cluster using TerraJet tool
73
+ • Discussion of testing generated provider with cross-plane control plane or local kind cluster
74
+ • Proposal to start with production setup, including installing cross-plane in the production environment
75
+ • discussion about providing a kubeconfig to access a cluster
76
+ • mention of TerraJet and its use in generating providers for crossplane
77
+ • confirmation that version 1.3 of crossplane is sufficient for using TerraJet
78
+ • demonstration of connecting to a system using TerraJet
79
+ • discussion of the TerraJet generation process and collaboration with other team members
80
+ • introduction of ProviderJet, a template for creating new repositories
81
+ • instructions on how to use the ProviderJet template to create a new repository
82
+ • Specifying provider name lower and upper case in a command
83
+ • Replacing all instances of template with the specified commands
84
+ • Understanding Terraform provider source and download name in Docker files
85
+ • Clarifying that Terraform provider source and download name are not the same thing
86
+ • Identifying the correct URL for the Linode Terraform provider
87
+ • Finding the changelog for the Terraform provider Linode
88
+ • Examining GitHub as a potential example of the V4 version
89
+ • Discussion about determining if a Linode provider is using an old version
90
+ • Importance of checking the Git repo for the Terraform provider to confirm version
91
+ • Realization that the V4 version is available as a Go package and can be imported
92
+ • Identifying the line in the Go module that needs to be updated or replaced
93
+ • Understanding how to use replace statements in the Go module to update dependencies
94
+ • Setting up credentials for Linode using environment variables and CLI tokens
95
+ • Clarification on where the Linode token is obtained
96
+ • Key username and its origin
97
+ • Inv token and its use
98
+ • TerraJet, a tool for utilizing the Terraform community's work in Crossplane
99
+ • Creating a Linode provider using TerraJet and Terraform
100
+ • TerraJet's design and functionality as a code generator and controller
101
+ • The history of Marcus's involvement with Terraform and Linode
102
+ • The current state of providers generated with TerraJet, including AWS, Azure, GCP, and others.
103
+ • ProviderJet AWS has 765 custom resource definitions (CRDs), which is too many for the Kubernetes community
104
+ • Another provider was added in the last week, which generated a ProviderJet Linode with 12 commits to Crossplane Contrib
105
+ • The previous Linode provider in Crossplane had not been maintained and may not work with the latest versions of Crossplane
106
+ • A single resource (LKE cluster) is currently available for provisioning in TerraJet, but additional resources are needed
107
+ • Future plans include announcements about stabilized providers (AWS, Azure, GCP), versioned resources, and conversion webhooks
108
+ • Implementing a cross-plane provider using TerraJet
109
+ • Ease of use with TerraJet compared to other implementations
110
+ • Example of a community-written provider (Exoscale) in 6 hours
111
+ • Adding an instance resource to JetLinit provider as simple as 10-15 lines of code
112
+ • Step-by-step process for creating a Crossplane Linode provider
113
+ • Installing Crossplane and the Linode provider using Helm
114
+ • Discussion of crossplane RBAC manager and pods
115
+ • Using Canines as a CLI for quick tasks
116
+ • Creating new clusters with Linode jet crossplane IO V1 alpha 1 group
117
+ • Provisioning new clusters using crossplane LKE
118
+ • Overview of how crossplane continuously reconciles requests
119
+ • Creation of a new LKE instance and cluster in Linode and Kubernetes
120
+ • Obtaining kubeconfig for the newly created cluster
121
+ • Discussion of using Crossplane to target a Kubernetes cluster without exposing the kubeconfig
122
+ • Exploring self-automated system where Crossplane provisions resources and updates application
123
+ • Demonstration of deleting a cluster and observing the controller's behavior in reconciling the absence of the cluster
124
+ • Explanation of how the controller will try to create a new cluster if it detects that one is missing, with a wait period of up to 1 minute
125
+ • Discussion of a custom resource that triggers a Kubernetes event
126
+ • Cluster creation and reconciliation process
127
+ • Issue with Linode node pool being deleted when cluster was deleted from UI
128
+ • Introduction to composite resources and their benefits in managing multiple resources as one
129
+ • Explanation of how composite clusters can recreate nodes, installations, and other dependencies automatically
130
+ • Example scenario where accidental deletion of a cross-plane cluster led to discussion on the importance of automated recreation of dependent resources
131
+ • Idea of improving current functionality by installing base components and using two compositions with XRDs to define APIs for multiple resources.
132
+ • Clusterscoped does not have any namespaces
133
+ • Creating a composition with base system components for a cluster
134
+ • Using a central production cluster with its own claim, similar to PVC, and referencing it from other namespaces via XRD
135
+ • Publishing a new API instead of manually configuring cloud-specific fields
136
+ • Moving Crossplane from being hosted on the current cluster to a seed cluster on a cloud like AWS or GCP