TiDB Operator Source Code Reading (Part 4): Implementing a Component Control Loop

In our last article, we introduced how TiDB Operator orchestrates control loop events to manage the lifecycles of TiDB components. The TidbCluster controller manages TiDB components' lifecycles, and the member manager of each TiDB component encapsulates that component's specific management logic.

In this post, I'll explain in detail how we implement a component control loop by taking PD as an example. You'll learn about the PD member manager and its lifecycle management operations. I'll also compare other components with PD and show their differences.

Practicing Nebula Operator on Cloud

Hi, everybody! As you know, Nebula Operator has been open-source, and we published an introduction to it. Today, I would like to introduce my practice on Nebula Operator on the Cloud.

About Nebula Operator

What is Nebula Operator? You can refer to Nebula Operator Overview: Automated Operation on Kubernetes. Today, this article will focus on the practicing Nebula Operator. I hope it could help you get started with it soon and enjoy Nebula Graph.

Prometheus Definitive Guide: Prometheus Operator

In this blog post, we will focus on how we can install and manage Prometheus on the Kubernetes cluster using the Prometheus Operator and Helm in an easy way. Let’s get started!

What Is an Operator?

Before moving directly to the installation of the Prometheus using the Prometheus Operator, let’s first understand some of the key concepts needed to understand the Prometheus Operator.

Analyze Monolith Java Applications in Multiple CodeReady Workspaces With MTA (Migration Toolkit for Applications)

Introduction

Transforming monolithic Java applications into distributed, cloud-native microservices is never easy, but Red Hat’s migration toolkit for applications helps you understand and evaluate the migration path. As a developer, you can apply the following features to a broad range of transformation use cases:

  • Planning and work estimation.
  • Identifying migration issues and providing solutions.
  • Detailed reporting.
  • Built-in rules and migration paths.
  • Rule extensibility and customization.
  • Source code or application archive analysis.

This article guides you through configuring Red Hat’s migration toolkit for applications to analyze an existing monolithic Java application. We will set up our development environment in Red Hat CodeReady Workspaces. After that, I’ll show you how to use the toolkit to analyze migration issues and generate potential solutions.

How to Build a Kubernetes Operator

This is the second part of our series focusing on Kubernetes Operators, and it shows how you can build a Kubernetes Operator based on the Bitnami Apache Helm chart. Note that you can refer to the steps in this tutorial to build an operator for your own applications.

Prerequisites

  1. We assume you followed the first part of the series. Thus, you should have a Kubernetes cluster (v1.7 or newer) with a control plane and two workers running on your computer. Also, the Operator Lifecycle Manager should be installed on your system. You can enter the following command to verify that everything is set up:
Shell


Red Hat Data Grid 8 for Beginners

What Is Data Grid ?

Data Grid is a high-performance, distributed in-memory data store. It stores all info in memory rather than on Disk or file that makes it faster. It is built from Infinispan open-source Software project and is available to deploy as an embedded library or as a standalone server.

Data Grid 8.0 Server

Data Grid 8.0 Server is isolated from Red Hat JBoss Enterprise Application Platform (EAP) and is re-designed to be lightweight and more secure with much faster start times. It is designed to create a running Data Grid cluster within few minutes with negligible configuration changes.

Securing Hazelcast With Cert-Manager

Cert-Manager became a standard way of issuing and rotating certificates in Kubernetes and OpenShift environments. Simple to install. Simple to use. Well integrated with Vault and other secret managers. No surprise it's the way to go if you want to set up secure communication between your applications!

In this blog post, I show how to secure Hazelcast communication using keys provisioned with cert-manager. I focus on all necessary steps, from installing cert-manager and issuing certificates, to using them for the Hazelcast member-to-member and client-to-member communication.