ContentPosts from @dsathwik77..
Link
@faun shared a link, 11 hours ago

v1.34: Pod Replacement Policy for Jobs Goes GA

ThePod replacement policyin Kubernetes v1.34 just hit GA. Jobs can now hold off on spinning up new Pods until the old ones arefullygone. No more duplicates per index. No more blowing through quotas or stalling schedulers—big win for workloads like ML training. System shift:This rewires how Jobs hand..

Link
@faun shared a link, 11 hours ago

v1.34: PSI Metrics for Graduates to Beta

Kubernetes v1.34 bumpsPressure Stall Information (PSI) metricsto Beta. Now kubelets expose kernel-level resource pressure—CPU, memory, and I/O—through the Summary API and Prometheus. Instead of just tracking how much a resource gets used, PSI shows how often workloads get throttled or blocked. That ..

 Activity
@nataliamartin1990 started using tool Google Web Server , 14 hours, 29 minutes ago.
 Activity
@nataliamartin1990 started using tool AD EBiS , 14 hours, 29 minutes ago.
Link
@anjali shared a link, 3 days, 9 hours ago
Customer Marketing Manager, Last9

Kubernetes Monitoring Metrics That Improve Cluster Reliability

Understand Kubernetes monitoring metrics that help detect issues early, improve reliability, and keep your cluster performing at its best.

kubernetes_metrics
Story Trending
@laura_garcia shared a post, 3 days, 10 hours ago
Software Developer, RELIANOID

🚀 Strengthening Europe’s Cybersecurity in Space

Just in case you missed it last month: The European Space Agency (ESA) has launched its brand-new Cybersecurity Operations Center (C-SOC) to safeguard satellites, mission control systems, and digital assets against growing cyber threats. 🌍 In today’s space-driven world, initiatives like this — suppo..

ESA_Cybersecurity Operations Center
 Activity
@atmosly0 started using tool Azure Pipelines , 3 days, 11 hours ago.
Story Trending
@laura_garcia shared a post, 4 days, 10 hours ago
Software Developer, RELIANOID

🔐 Cybersecurity Fundamentals: Defensive, Offensive & Hybrid Approaches 🔐

Cybersecurity isn’t just about deploying tools — it’s about knowing how and when to use the right strategies. Defensive security focuses on prevention with technologies like firewalls, antivirus, access control, and system hardening to reduce exposure. Offensive security takes the attacker’s perspec..

Cibersecurity concepts diagram RELIANOID
Link
@anjali shared a link, 4 days, 16 hours ago
Customer Marketing Manager, Last9

What is APM Tracing?

Understand APM tracing to see how a request moves through services, helping you spot delays, errors, and bottlenecks quickly.

apm tracing
Story Trending
@laura_garcia shared a post, 5 days, 9 hours ago
Software Developer, RELIANOID

✨ In case you missed it ✨

DDoS attacks in 2025 are bigger, smarter, and easier to launch than ever before. From AI-driven attack strategies to IoT-based botnets, the threat landscape is evolving fast. Our latest blog explains what’s happening now — and how RELIANOID helps organizations stay resilient. 🔗 https://www.relianoid..

Blog DDoS Trends RELIANOID