cpressland

joined 1 year ago
MODERATOR OF
[–] [email protected] 5 points 1 year ago

Outstanding!! Bookmarked, thank you!

[–] [email protected] 7 points 1 year ago

With federation, you can have as many rimjob_steve’s as you like! 😁

[–] [email protected] 1 points 1 year ago

My pleasure! Thanks!

[–] [email protected] 17 points 1 year ago (2 children)

True, but discoverability on Reddit was much much easier, I’ve found this to be one of Lemmys weakest attributes so far. I’m sure it’ll improve over time or somebody will make a search engine based on the instance map over on GitHub.

Hmm, that’s not a bad idea. I might give that a try at some point.

[–] [email protected] 1 points 1 year ago

This’d usually be something a bot would do. I use one over on [email protected] to keep an eye on things but I don’t let it post/comment as I want to encourage the community to actively post and not just lurk.

But if posting news to all LTT communities is something the respective community members and moderators are happy to see, I could add that as a feature.

 

One of the key differences between traditional social media and the Fediverse is the existence of multiple communities that share the same topic. You should have a choice when it comes to your community preferences so I wanted to create a list of other LTT/LMG communities on the Fediverse to help us all grow.

If you’re aware of a community I’ve missed, please comment them below and I’ll update the post body.

 

One of the key differences between traditional social media and the Fediverse is the existence of multiple communities that share the same topic. You should have a choice when it comes to your community preferences so I wanted to create a list of other LTT/LMG communities on the Fediverse to help us all grow.

If you’re aware of a community I’ve missed, please comment them below and I’ll update the post body.

 

One of the key differences between traditional social media and the Fediverse is the existence of multiple communities that share the same topic. You should have a choice when it comes to your community preferences so I wanted to create a list of other LTT/LMG communities on the Fediverse to help us all grow.

If you’re aware of a community I’ve missed, please comment them below and I’ll update the post body.

[–] [email protected] 1 points 1 year ago

Okay, “media engine”. My mistake.

[–] [email protected] 2 points 1 year ago

Get minute by minute coverage as the situation changes on our Instagram.

 
[–] [email protected] 8 points 1 year ago (3 children)

Consider crossposting this to [email protected] for wider community engagement as that community currently has more subscribers than here. Hopefully the mod over there is reasonable this time and agrees this is fantastic progress in the right direction.

1
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

This release introduces direct pod-to-pod multicluster service mirroring. When clusters are deployed on a flat network, Linkerd can export multicluster services in a way where cross-cluster traffic does not need to go through the gateway. This enhances multicluster authentication and can reduce the need for provisioning public load balancers.

In addition, this release adds support for the Gateway API HTTPRoute resource (in the gateway.networking.k8s.io api group). This improves compatibility with other tools that use these resources such as Flagger and Argo Rollouts. The release also includes a large number of features and improvements to HTTPRoute including the ability to set timeouts and the ability to define consumer-namespace HTTPRoutes.

Finally, this release includes a number of bugfixes, performance improvements, and other smaller additions.

Upgrade notes: Please see the upgrade instructions.

  • Multicluster
    • Remove namespace field from cluster scoped resources to fix pruning
    • Added -o json flag for the linkerd multicluster gateways command (thanks @hiteshwani29)
    • Introduced logFormat value to the multicluster Link Helm Chart (thanks @bunnybilou!)
    • Added leader-election capabilities to the service-mirror controller
    • Added high-availability (HA) mode for the multicluster service-mirror
    • Added a new remoteDiscoverySelector field to the multicluster Link CRD, which enables a service mirroring mode where the control plane performs discovery for the mirrored service from the remote cluster, rather than creating Endpoints for the mirrored service in the source cluster
  • HTTPRoute
    • Fixed linkerd uninstall issue for HTTPRoute Added support for gateway.networking.k8s.io HTTPRoutes in the policy controller
    • Added support for RequestHeaderModifier and RequestRedirect HTTP filters in outbound policy; filters may be added at the route or backend level
    • Added support for the ResponseHeaderModifier HTTPRoute filter
    • Added support for HTTPRoutes defined in the consumer namespace
    • Added support for HTTPRoute parent_refs that do not specify a port
  • CRDs
    • Patched the MeshTLSAuthentication CRD to force providing at least one identity/identityRef
  • Control Plane
    • Send Opaque protocol hint for opaque ports in destination controller
    • Replaced deprecated failure-domain.beta.kubernetes.io/zone labels in Helm charts with topology.kubernetes.io/zone labels (thanks @piyushsingariya!)
    • Replaced server_port_subscribers Destination controller gauge metric with server_port_subscribes and server_port_unsubscribes counter metrics
  • Proxy
    • Handle Opaque protocol hints on endpoints
    • Added outbound_http_balancer_endpoints metric
    • Fixed missing route_ metrics for requests with * ServiceProfiles
    • Fixed proxy startup failure when using the config.linkerd.io/admin-port annotation (thanks @jclegras!)
    • Added distinguishable version information to proxy logs and metrics
  • CLI
    • The linkerd diagnostics policy command now displays outbound policy when the target resource is a Service
    • A fix for HA validation checks when Linkerd is installed with Helm. Thanks @mikutas!!
  • Viz
    • Add the kubelet NetworkAuthentication back since it is used by the linkerd viz allow-scrapes subcommand.
    • Fixed the linkerd viz check command so that it will wait until the viz extension becomes ready
    • Fixed an issue where specifying a remote_write config would cause the Prometheus config to be invalid (thanks @hiteshwani29)
    • Improved validation of the --to and --from flags for the linkerd viz stat command (thanks @pranoyk)
    • Added -o jsonpath flag to linkerd viz tap to allow filtering output fields (thanks @hiteshwani29!)
    • Fixed a Grafana error caused by an incorrect datasource (thanks @albundy83!)
    • Fixed missing "Services" menu item in the Spanish localization for the linkerd-viz web dashboard (thanks @mclavel!)
  • Extensions
    • Added missing label linkerd.io/extension to certain resources to ensure they pruned when appropriate (thanks @ClementRepo)
    • Added tolerations and nodeSelector support in extensions namespace-metadata Jobs (thanks @pssalman!)
  • Init Containers
    • Added an option for disabling the network validator's security context for environments that provide their own
  • CNI
    • Added --set flag to install-cni plugin (thanks @amit-62!)
    • Fixed missing resource-cni labels on linkerd-cni, this blocked the linkerd-cni pods from coming up when the injector was broken (thanks @migueleliasweb!)
  • Build
    • Build improvements for multi-arch build artifacts. Thanks @MarkSRobinson!!
3
Release 2023.8.4 - 2023/08/24 (www.home-assistant.io)
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
[–] [email protected] 2 points 1 year ago (2 children)

Can you give some more context around what this is? Happy to try and replicate if you can provide some steps.

[–] [email protected] 5 points 1 year ago (1 children)

Fedora is a tough one for me, on one hand I like the design principles of the OS, Systemd heavy unlike Debian / Ubuntu that still uses some old school init scripts etc. On the other hand, the association with Red Hat makes me want to steer well clear of it.

Asahi Fedora Linux is likely the thing that’ll force me down this fedora shaped rabbit hole.

2
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

This release introduces direct pod-to-pod multicluster service mirroring. When clusters are deployed on a flat network, Linkerd can export multicluster services in a way where cross-cluster traffic does not need to go through the gateway. This enhances multicluster authentication and can reduce the need for provisioning public load balancers.

In addition, this release adds support for the Gateway API HTTPRoute resource (in the gateway.networking.k8s.io api group). This improves compatibility with other tools that use these resources such as Flagger and Argo Rollouts. The release also includes a large number of features and improvements to HTTPRoute including the ability to set timeouts and the ability to define consumer-namespace HTTPRoutes.

Finally, this release includes a number of bugfixes, performance improvements, and other smaller additions.

Upgrade notes: Please see the upgrade instructions.

  • Multicluster
    • Remove namespace field from cluster scoped resources to fix pruning
    • Added -o json flag for the linkerd multicluster gateways command (thanks @hiteshwani29)
    • Introduced logFormat value to the multicluster Link Helm Chart (thanks @bunnybilou!)
    • Added leader-election capabilities to the service-mirror controller
    • Added high-availability (HA) mode for the multicluster service-mirror
    • Added a new remoteDiscoverySelector field to the multicluster Link CRD, which enables a service mirroring mode where the control plane performs discovery for the mirrored service from the remote cluster, rather than creating Endpoints for the mirrored service in the source cluster
  • HTTPRoute
    • Fixed linkerd uninstall issue for HTTPRoute Added support for gateway.networking.k8s.io HTTPRoutes in the policy controller
    • Added support for RequestHeaderModifier and RequestRedirect HTTP filters in outbound policy; filters may be added at the route or backend level
    • Added support for the ResponseHeaderModifier HTTPRoute filter
    • Added support for HTTPRoutes defined in the consumer namespace
    • Added support for HTTPRoute parent_refs that do not specify a port
  • CRDs
    • Patched the MeshTLSAuthentication CRD to force providing at least one identity/identityRef
  • Control Plane
    • Send Opaque protocol hint for opaque ports in destination controller
    • Replaced deprecated failure-domain.beta.kubernetes.io/zone labels in Helm charts with topology.kubernetes.io/zone labels (thanks @piyushsingariya!)
    • Replaced server_port_subscribers Destination controller gauge metric with server_port_subscribes and server_port_unsubscribes counter metrics
  • Proxy
    • Handle Opaque protocol hints on endpoints
    • Added outbound_http_balancer_endpoints metric
    • Fixed missing route_ metrics for requests with * ServiceProfiles
    • Fixed proxy startup failure when using the config.linkerd.io/admin-port annotation (thanks @jclegras!)
    • Added distinguishable version information to proxy logs and metrics
  • CLI
    • The linkerd diagnostics policy command now displays outbound policy when the target resource is a Service
    • A fix for HA validation checks when Linkerd is installed with Helm. Thanks @mikutas!!
  • Viz
    • Add the kubelet NetworkAuthentication back since it is used by the linkerd viz allow-scrapes subcommand.
    • Fixed the linkerd viz check command so that it will wait until the viz extension becomes ready
    • Fixed an issue where specifying a remote_write config would cause the Prometheus config to be invalid (thanks @hiteshwani29)
    • Improved validation of the --to and --from flags for the linkerd viz stat command (thanks @pranoyk)
    • Added -o jsonpath flag to linkerd viz tap to allow filtering output fields (thanks @hiteshwani29!)
    • Fixed a Grafana error caused by an incorrect datasource (thanks @albundy83!)
    • Fixed missing "Services" menu item in the Spanish localization for the linkerd-viz web dashboard (thanks @mclavel!)
  • Extensions
    • Added missing label linkerd.io/extension to certain resources to ensure they pruned when appropriate (thanks @ClementRepo)
    • Added tolerations and nodeSelector support in extensions namespace-metadata Jobs (thanks @pssalman!)
  • Init Containers
    • Added an option for disabling the network validator's security context for environments that provide their own
  • CNI
    • Added --set flag to install-cni plugin (thanks @amit-62!)
    • Fixed missing resource-cni labels on linkerd-cni, this blocked the linkerd-cni pods from coming up when the injector was broken (thanks @migueleliasweb!)
  • Build
    • Build improvements for multi-arch build artifacts. Thanks @MarkSRobinson!!
[–] [email protected] 1 points 1 year ago

Personally, I prefer k3s over microk8s purely for the lack of Snap Packages. But happy to see this out so quickly.

[–] [email protected] 2 points 1 year ago

Thanks for this, I'll merge this into the main post soon.

view more: ‹ prev next ›