INTRODUCING CONTAINER OBSERVABILITY WITH EBPF AND SYSDIG.

Today we’ve announced that we’ve officially added eBPF instrumentation to extend container observability with Sysdig monitoring, security and forensics solutions. eBPF – extended Berkeley Packet Filter – is a Linux-native in-kernel virtual machine that enables secure, low-overhead tracing for application performance and event observability and analysis. Don’t let the name fool you – eBPF delivers a lot more than network packet information (more on that below).

Read more

HOW TO AUTOMATICALLY GENERATE A NEW METRIC AND A NEW LOG STREAM IN SERVICE MESH

One of the advantage of deploying a microservice-based application in an Istio service mesh is to allow one to externally control service monitoring, tracing, request (version) routing, resiliency testing, security and policy enforcement, etc., in a consistent way across those services, for the application as a whole. In this blog we will focus on the in-depth telemetry side of the house and see how can we configure mixer to collect a uniform set of metrics across all services. At the end of this blog our goal will be to have a new metric and a new log stream enabled for calls to services within our mesh.

Read more

GRAFANA V6.0 RELEASED

Grafana v6.0 brings many new and exciting features and enhancements and at the same time includes a new React platform and architecture for panels & plugins that will fundamentally change Grafana’s future as a platform. Grafana’s dashboard UI is all about building dashboards for visualization. Explore strips away all the dashboard and panel options so that you can focus on the query & metric exploration. Iterate until you have a working query and then think about building a dashboard. You can also jump from a dashboard panel into Explore and from there do some ad-hoc query exporation with the panel queries as a starting point. For infrastructure monitoring and incident response, you no longer need to switch to other tools to debug what went wrong.

Read more

PODMAN AND BUILDAH FOR DOCKER USERS

I was asked recently on Twitter to better explain Podman and Buildah for someone familiar with Docker. Though there are many blogs and tutorials out there, which I will list later, we in the community have not centralized an explanation of how Docker users move from Docker to Podman and Buildah. Also what role does Buildah play? Is Podman deficient in some way that we need both Podman and Buildah to replace Docker?

Read more

INFRASTRUCTURE MONITORING: DEFENSE AGAINST SURPRISE DOWNTIME

Infrastructure monitoring is an integral part of infrastructure management. It is an IT manager’s first line of defense against surprise downtime. Severe issues can inject considerable downtime to live infrastructure, sometimes causing heavy loss of money and material. Source: opensource.com

INTRO TO REDIS CLUSTER SHARDING – ADVANTAGES, LIMITATIONS, DEPLOYING & CLIENT CONNECTIONS

Redis Clusteris the native sharding implementation available within Redis that allows you to automatically distribute your data across multiple nodes without having to rely on external tools and utilities. At ScaleGrid, werecently added support forRedis Clusterson our platform through our fully managedRedis hostingplans. In this post, we’re going to introduce you to the advanced Redis Cluster sharding opportunities, discussits advantages and limitations, when you should deploy, and how to connect to your Redis Cluster.

Read more

CILIUM 1.4: MULTI-CLUSTER SERVICE ROUTING, DNS AUTHORIZATION

We are excited to announce the Cilium 1.4 release. The release introduces several new features as well as optimization and scalability work. The highlights include the addition of global services to provide Kubernetes service routing across multiple clusters, DNS request/response aware authorization and visibility, transparent encryption (beta), IPVLAN support for better performance and latency (beta), integration with Flannel, GKE on COS support, AWS metadata based policy enforcement (alpha) as well as significant efforts into optimizing memory and CPU usage.

Read more

INTRODUCING LUDWIG, A CODE-FREE DEEP LEARNING TOOLBOX

Over the last decade, deep learning models have proven highly effective at performing a wide variety of machine learning tasks in vision, speech, and language. At Uber we are using these models for a variety of tasks, including customer support, object detection, improving maps, streamlining chat communications, forecasting, and preventing fraud. Many open source libraries, including TensorFlow, PyTorch, CNTK, MXNET, and Chainer, among others, have implemented the building blocks needed to build such models, allowing for faster and less error-prone development.

Read more

KUBERNETES NETWORK DEEP DIVE: DID YOU MAKE THE RIGHT CHOICE?

Kubernetes networking design can be intimidating, especially when you are the one to make decisions for cluster-level network choices. In this session, we will discuss how these choices will affect cluster routing and load balancing, focusing on KubeProxy modes(iptables vs IPVS) and network solutions. The main purpose of this blog is to help Kubernetes users to get comfortable with K8S major network components, common usage patterns, and corresponding troubleshooting tools.

Read more

CHINA’S CRISPR TWINS MIGHT HAVE HAD THEIR BRAINS INADVERTENTLY ENHANCED

The brains of two genetically edited girls born in China last year may have been changed in ways that enhance cognition and memory, scientists say. The twins, called Lulu and Nana, reportedlyhad their genes modified before birth by a Chinese scientific team using the new editing tool CRISPR. The goal was to make the girls immune to infection by HIV, the virus that causes AIDS.

Read more