How to Teach Old Apps New Tricks with Ansible-based Operators (Parts 1 & 2)

At Red Hat Summit this year, I had the task of explaining Kubernetes Operators with Ansible in two, fifteen-minute talks, separated by three hours, in the middle of the busy Red Hat booth to anyone that walked up. I had to explain Kubernetes, the difference stateful and stateless apps, what a Kubernetes Operator is, how to write an operator with Ansible, and then demonstrate this capability. Use of video and sound was discouraged. [Read More]

Upstream vs Downstream

I was working on things for work (as one does) when it dawned on me. Very few folks understand the difference between upstream and downstream as it relates to open source software. I used Red Hat projects as a pointer. Here is the output of that effort (which was scratching the surface). Upstream vs. Downstream Upstream vs. Downstream is confusing at times. But, for the bigger Red Hat projects this holds true: [Read More]

The Secret to Kubernetes Secrets

I made an innocent comment on Twitter last week that led to WAY more feedback than I was expecting. The Kubernetes community showed me there are a lot of options when creating Kubernetes Secrets. I made the statement: Every single time I have to create a secret, I have to read the docs. I should have this figured out by now.” Years ago, a colleague asked Albert Einstein if he knew his phone number. [Read More]

Verify @ashleymcnamara

认证 @ashleymcnamara is a form of peaceful protest to have Ashley McNamara verified on Twitter. Please consider doing something similar with your own Twitter profile. The how and the why follows. The Blue Check Twitter’s verified account program is rife with poor choices and questionable decisions. From verifying Nazis and folks that build brands on hate to not verifying respected people, verification is a problem for Twitter. Make no mistake, I know this is not an easy problem. [Read More]