A new vulnerability, CVE-2020-8557, has been detected in kubelet. It can be exploited by writing into /etc/hosts to cause a denial of service. The source of the issue is that the /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager, so it’s not taken into account when calculating ephemeral storage usage by a pod.
Cortex and Thanos are two brilliant solutions to scale out Prometheus, and many companies are now running them in production at scale. These two projects, both in the CNCF Sandbox, initially started with different technical approaches and philosophies: Cortex has been designed for scalability and high performances since day zero, while Thanos was originally focused on operational simplicity and cost-effectiveness.
Strategic changes and new deployments in all growing businesses are expected. So by design, businesses need to be adaptive to new changes. When such transformations are being undertaken, organizations need to continue preserving their infrastructures while complying with pre-defined timelines. To efficiently manage such deployments, organizations make use of ITIL concepts like change and release management.
Rancher has helped thousands of organizations manage their transitions to containerized applications and Kubernetes. With its innovative distribution and suite of services, Rancher has given IT and DevOps teams the roadmap they needed to drive Kubernetes success. Given the complexity of Kubernetes and the shortage of engineers with Kubernetes-specific skills, Rancher’s offerings meet a critical and growing market need.
We’re excited to announce the third annual Chaos Conf! Given the events with Covid-19 this year, we will be holding this event fully online for the health and safety of attendees. The unforeseen impact of this virus on our lives, our businesses, and our software highlights the importance of preparing for the unexpected. Our theme for this year highlights this: Prepare for moments that matter. Chaos Conf will take place over the course of three days: October 6–8.
Nobody wants to spend hours configuring a product. It should just work. Flowmon’s customers, partners, and distributors are fortunate in having a number of presets at their disposal for speedy configuration, whether during initial deployment, adjusting the product to new circumstances, or a quick product demonstration. There is no laborious setup; the user just chooses a use case, follows a few guided steps, and lets the system set everything up.
Many attempts to simplify programming lead to visual interfaces that provide approachable settings for common tasks. These simplifications may appeal to non-developers, but they send experienced coders running for the command line. Yet, no code tools are rapidly expanding. Zapier, Integromat, and Workato are becoming more popular options and some believe developers won’t be needed for most integrations in the future.
My colleague Greg Zweig recently wrote a blog “Forget Videobombing – Worry About What You Can’t See” in which he outlined how Unified Communications (UC) assets are all too often left unsecured, making them an easy target.