Both PRs address NVMe device discovery challenges but for different cloud providers with fundamentally different approaches.
| Aspect | PR #396 (AWS) | PR #402 (Azure) |
|---|---|---|
| URL | cloudfoundry/bosh-agent#396 | cloudfoundry/bosh-agent#402 |
| Cloud Provider | AWS | Azure |
Both PRs address NVMe device discovery challenges but for different cloud providers with fundamentally different approaches.
| Aspect | PR #396 (AWS) | PR #402 (Azure) |
|---|---|---|
| URL | cloudfoundry/bosh-agent#396 | cloudfoundry/bosh-agent#402 |
| Cloud Provider | AWS | Azure |
This document describes the current state of Envoy proxy integration in Diego and outlines what would be needed to implement full mutual TLS (mTLS) for container-to-container (C2C) traffic, enabling apps to both authenticate themselves and verify the identity of connecting apps.
The proposed approach introduces a new HTTP-based listener on port 62443 that runs alongside the existing TCP-based C2C port (61443), providing a dual opt-in model for both operators and app authors.
| use nix |
| https://packages.ubuntu.com/xenial/linux-aws-source-4.4.0 ixgbevf 2.12.1-k | |
| ❯ diff ubuntu/linux-4.4/drivers/net/ethernet/intel/ixgbevf upstream/ixgbevf-2.12.1/src | wc -l | |
| 3424 | |
| ❯ diff ubuntu/linux-4.4/drivers/net/ethernet/intel/ixgbevf upstream/ixgbevf-4.1.2/src | wc -l | |
| 3897 | |
| ❯ diff ubuntu/linux-4.4/drivers/net/ethernet/intel/ixgbevf upstream/ixgbevf-4.6.3/src | wc -l | |
| 5348 | |
| ❯ diff ubuntu/linux-4.4/drivers/net/ethernet/intel/ixgbevf upstream/ixgbevf-4.8.1/src | wc -l | |
| 5475 |
| Verifying my Blockstack ID is secured with the address 1NVzvRRTvvoQ6UgngVVarthwGkpqLNy3uM https://explorer.blockstack.org/address/1NVzvRRTvvoQ6UgngVVarthwGkpqLNy3uM |
| Verifying my Blockstack ID is secured with the address 1NVzvRRTvvoQ6UgngVVarthwGkpqLNy3uM https://explorer.blockstack.org/address/1NVzvRRTvvoQ6UgngVVarthwGkpqLNy3uM |
| { | |
| "receiver": "default-receiver", | |
| "status": "resolved", | |
| "alerts": [ | |
| { | |
| "status": "resolved", | |
| "labels": { | |
| "alertname": "BOSHJobProcessUnhealthy", | |
| "bosh_deployment": "cf", | |
| "bosh_job_index": "0", |
Usage:
fly -t ${target} set-pipeline -n -p docker-broker \
-c <(bosh int docker-broker-pipeline.yml --vars-file vars.yml)
I hereby claim:
To claim this, I am signing this object:
| #! /usr/bin/env ruby | |
| # coding: utf-8 | |
| require 'yaml' | |
| jobs = Dir['jobs/*'].map { |j| File.basename(j) } | |
| print "∑ | Job | Property | Description\n --- | --- | --- | ---\n" | |
| jobs.map! do |job| | |
| spec = YAML.load_file(File.join("jobs", job, "spec")) |