The Sail Operator is a community project launched by Red Hat to build a modern operator for Istio. First announced in August 2024, we are pleased to announce Sail Operator is now GA with a clear mission: to simplify and streamline Istio management in your cluster. Simplified deployment & management The Sail Operator is engineered to cut down the complexity of installing and running Istio. It automates manual tasks, ensuring a consistent, reliable, and uncomplicated experience from initial ins...| Istio Blog
With the recent announcement of the In-Cluster IstioOperator deprecation in Istio 1.23 and its subsequent deletion for Istio 1.24, we want to build awareness of a new operator that the team at Red Hat have been developing to manage Istio as part of the istio-ecosystem organization. The Sail Operator manages the lifecycle of Istio control planes, making it easier and more efficient for cluster administrators to deploy, configure and upgrade Istio in large scale production environments. Instead...| Istio Blog
Istio’s In-Cluster Operator has been deprecated in Istio 1.23. Users leveraging the operator — which we estimate to be fewer than 10% of our user base — will need to migrate to other install and upgrade mechanisms in order to upgrade to Istio 1.24 or above. Read on to learn why we are making this change, and what operator users need to do. Does this affect you? This deprecation only affects users of the In-Cluster Operator. Users who install Istio with the istioctl install command and a...| Istio Blog
Originally posted on the Solo.io blog As organizations adopt Envoy-based infrastructure like Istio to help solve challenges with microservices communication, they inevitably find themselves needing to customize some part of that infrastructure to fit within their organization’s constraints. WebAssembly (Wasm) has emerged as a safe, secure, and dynamic environment for platform extension. In the recent announcement of Istio 1.5, the Istio project lays the foundation for bringing WebAssembly t...| Istio Blog
Configuring Wasm extensions for Envoy and Istio declaratively.| Istio
While working on SQL/PGQ patch I wanted to find an equality operator for given left and right argument types to construct a condition to match an edge with its adjacent vertexes. It would look as simple as calling C function oper() with operator as "=" and required left and right data types. But soon it turned out to be a walk in PostgreSQL's operator labyrinth, which held my equality operator at the center instead of Minotaur.| Walking with the Elephants
OpenAI has introduced Operator, an AI agent capable of autonomously performing tasks via a web browser. Initially available to U.S. users on ChatGPT's Pro plan, Operator automates tasks like booking travel and shopping. While promising, Operator has limitations and requires user supervision for sensitive tasks.| Shelly Palmer
Threat Actors like the Typhoon Crews from China, are using simple techniques to penetrate networks. Do not ignore.| SENKI
Energy authorities in SA use new solar switch-off powers for the first time, remotely cutting output from thousands of rooftop units during "near-record minimum demand" to maintain the stability of the grid.| www.abc.net.au
Cloud-native AI/ML workloads push storage to the limit with many small files. AIStor combines metadata and data to optimize small file operations.| MinIO Blog
We often talk about how good, fast and reliable access to data is paramount if you want to have an upper hand in your AI/ML game. Why is this the case? This is because hardware failures happen at different levels.| MinIO Blog
No, most ASEAN countries are not ready for “serious cybersecurity.” Cybersecurity requires a persistent and consistent rhythm of action that fixes known security risks. Public benefit—non-profit cyber civil defense organizations like the Shadowserver Foundation, CyberGreen, and other organizations deliver actionable cyber-risk reporting as a public benefit. Yes, these reports are free to organizations seeking to Read More| SENKI
The French Government sees the massive number of PlugX infections as a national threat. PlugX is malware used by Nation State threat actors to get inside networks. Sekoia was part of a sinkholing action that uncovered thousands of locations where PlugX is deployed. Should you be concerned? How do you discover if you have a Read More| SENKI
Originally posted on the Solo.io blog As organizations adopt Envoy-based infrastructure like Istio to help solve challenges with microservices communication, they inevitably find themselves needing to customize some part of that infrastructure to fit within their organization’s constraints. WebAssembly (Wasm) has emerged as a safe, secure, and dynamic environment for platform extension. In the recent announcement of Istio 1.5, the Istio project lays the foundation for bringing WebAssembly t...| Istio Blog
Microservices are a great pattern when they map services to disparate teams that deliver them, or when the value of independent rollout and the value of independent scale are greater than the cost of orchestration. We regularly talk to customers and teams running Istio in the real world, and they told us that none of these were the case for the Istio control plane. So, in Istio 1.5, we’ve changed how Istio is packaged, consolidating the control plane functionality into a single binary calle...| Istio Blog
As outlined in the Istio 2020 trade winds blog and more recently announced with Istio 1.5, WebAssembly (Wasm) is now an (alpha) option for extending the functionality of the Istio service proxy (Envoy proxy). With Wasm, users can build support for new protocols, custom metrics, loggers, and other filters. Working closely with Google, we in the community (Solo.io) have focused on the user experience of building, socializing, and deploying Wasm extensions to Istio. We’ve announced WebAssembly...| Istio Blog
The future of Istio extensibility using WASM.| Istio
Istio solves real problems that people encounter running microservices. Even very early pre-release versions helped users debug the latency in their architecture, increase the reliability of services, and transparently secure traffic behind the firewall. Last year, the Istio project experienced major growth. After a 9-month gestation before the 1.1 release in Q1, we set a goal of having a quarterly release cadence. We knew it was important to deliver value consistently and predictably. With t...| Istio Blog
Kubernetes operators provide a pattern for encoding human operational knowledge in software and are a popular way to simplify the administration of software infrastructure components. Istio is a natural candidate for an automated operator as it is challenging to administer. Up until now, Helm has been the primary tool to install and upgrade Istio. Istio 1.4 introduces a new method of installation using istioctl. This new installation method builds on the strengths of Helm with the addition of...| Istio Blog
Generic programming is style of programming that is typeless, as in the type of data to be used is not determined at the time the code was written. In C++ this is achieved with templating. I know of two ways to perform generic programming in C. One way is to use pointer typecasting. It's important to understand that when you typecast a pointer no data is modified within the pointer; how the data the pointer points to is interpreted is changed. This can be utilized to create generic algorith...| Randy Gaul's Game Programming Blog
From the viewpoint of your board, there are founders, operators, investors, and employees. How can you use this to help your career plan?| Kellblog
Key points from the 2018 industry consultation on our anti-DDoS strategy. This is the trust peer community who daily battles DDoS.| SENKI
Leverage Shadowserver's Cyber Civil Defence reporting to protect your network from risk.| SENKI