Sebastián Pizarro (@nutseba) 's Twitter Profile
Sebastián Pizarro

@nutseba

Adventurer, nutritional sciences, Greece, Chile, Drupal, RoR, new age, trekking. Sometimes vegetarian. MSc Nutrition & Food @INTA_UChile.

ID: 1891739941

linkhttp://about.me/sebastianpizarrocortes calendar_today21-09-2013 22:41:05

23,23K Tweet

510 Followers

3,3K Following

TechOps Examples (@techopsexamples) 's Twitter Profile Photo

Cloud Disaster Recovery Strategies 👇 Cloud DR strategies need not be complex. Here, I’ve broken it down to help you better understand. 55K+ read my DevOps and Cloud newsletter: techopsexamples.com/subscribe Sign up to get 'The Practical Linux Guide for DevOps Engineers' What do

Cloud Disaster Recovery Strategies 👇

Cloud DR strategies need not be complex.

Here, I’ve broken it down to help you better understand.

55K+ read my DevOps and Cloud newsletter: techopsexamples.com/subscribe

Sign up to get 'The Practical Linux Guide for DevOps Engineers'

What do
Anupam (@gooner__14) 's Twitter Profile Photo

CI/CD suddenly failing? It’s rarely random. Most pipeline failures follow the same patterns: • Expired secrets • Upstream dependency changes • Flaky tests • Base image updates • Environment variable mismatches • Runner disk filling up The trick isn’t just fixing the

CI/CD suddenly failing?
It’s rarely random.

Most pipeline failures follow the same patterns:

• Expired secrets
• Upstream dependency changes
• Flaky tests
• Base image updates
• Environment variable mismatches
• Runner disk filling up

The trick isn’t just fixing the
DevopsCube (@devopscube) 's Twitter Profile Photo

GPU scheduling in Kubernetes is becoming an important skill now. Here is why 👇 Most organizations are either experimenting or running ML workloads in Kubernetes. As Devops engineers you should know how to set up and manage GPU resources. We have created a simple guide on

GPU scheduling in Kubernetes is becoming an important skill now.

Here is why 👇 

Most organizations are either experimenting or running ML workloads in Kubernetes.

As Devops engineers you should know how to set up and manage GPU resources.

We have created a simple guide on
Darryl Ruggles (@rdarrylr) 's Twitter Profile Photo

#DNS resolution in #Kubernetes has a quiet default that most teams never think to question. The #ndots:5 setting means every external domain lookup from a pod fires off multiple unnecessary queries before reaching the right answer, adding latency that won't show up in your traces

OSO (@osodevops) 's Twitter Profile Photo

How to Monitor Kubernetes Pods with Prometheus and Grafana (Using kube-prometheus-stack) medium.com/@vinoji2005/ho…

Abdel SGHIOUAR (@boredabdel) 's Twitter Profile Photo

It’s official: llm-d is now a Christine Sandbox project! 🏗️✨ Developed by Google Cloud, IBM Research, Red Hat, NVIDIA, and CoreWeave, llm-d is bringing "well-lit paths" to AI inference on Kubernetes. 🔹 Any model. Any accelerator. Any cloud. 🔹 35%+ reduction in TTFT

It’s official: <a href="/_llm_d_/">llm-d</a>  is now a <a href="/CNCF/">Christine</a> Sandbox project! 🏗️✨

Developed by <a href="/GoogleCloud/">Google Cloud</a>, <a href="/IBMResearch/">IBM Research</a>, <a href="/RedHat/">Red Hat</a>, <a href="/NVIDIA/">NVIDIA</a>, and <a href="/CoreWeave/">CoreWeave</a>, llm-d is bringing "well-lit paths" to AI inference on Kubernetes.

🔹 Any model. Any accelerator. Any cloud. 
🔹 35%+ reduction in TTFT
K3sDaily (@k3sdaily) 's Twitter Profile Photo

IncidentFox automates incident investigation with AI agents using 178+ tools for Kubernetes, AWS, and Grafana, featuring RAPTOR knowledge base for runbooks, alert correlation reducing noise by 85-95%, and Slack/GitHub/PagerDuty integrations ➜ ku.bz/wTP3Kbtjs

Aurimas Griciūnas (@aurimas_gr) 's Twitter Profile Photo

𝗔𝗜 𝗢𝗯𝘀𝗲𝗿𝘃𝗮𝗯𝗶𝗹𝗶𝘁𝘆 is a must have in your tool belt as an AI Engineer. 𝗧𝗿𝗮𝗰𝗶𝗻𝗴 sits at the core of it, why is it important? Tracing and instrumentation of software have been around for decades now. With AI systems resembling regular software even more, we are

𝗔𝗜 𝗢𝗯𝘀𝗲𝗿𝘃𝗮𝗯𝗶𝗹𝗶𝘁𝘆 is a must have in your tool belt as an AI Engineer. 𝗧𝗿𝗮𝗰𝗶𝗻𝗴 sits at the core of it, why is it important?

Tracing and instrumentation of software have been around for decades now. With AI systems resembling regular software even more, we are
Ivan Kuleshov (@merocle) 's Twitter Profile Photo

I think today is a great day to announce JetBrains Hardware And by the way, this is no joke github.com/JetBrains-Hard… I’ve asked for a separate GitHub organization to be created for our initiative. To address some potential questions: Generally speaking, don’t expect a JetBrains

I think today is a great day to announce

JetBrains Hardware
And by the way, this is no joke
github.com/JetBrains-Hard…

I’ve asked for a separate GitHub organization to be created for our initiative. 
To address some potential questions:
Generally speaking, don’t expect a JetBrains
Dhiraj (@dkare1009) 's Twitter Profile Photo

Claude Code Project Structure (Quick Guide) Most projects start with just CLAUDE.md. That’s why they stay basic. Here’s the structure that turns Claude into an engineering partner 👇 📌 Core Files • CLAUDE.md → project rules & context • CLAUDE.local.md → personal overrides

Matthew Slipper 🔴✨ (@mslipper) 's Twitter Profile Photo

We're open-sourcing more of our stack: iron-proxy, a default-deny egress proxy for untrusted workloads. It's been a bad month for supply chain security. Trivy, KICS, LiteLLM, and Axios all followed the same playbook: compromise a package, harvest env vars, exfiltrate secrets to

DevopsCube (@devopscube) 's Twitter Profile Photo

Everyone monitors pods, but nobody watches this critical component. But the moment a Kubernetes cluster breaks, Suddenly, etcd becomes the most important thing in your setup. That is because etcd is the brain of Kubernetes. Every deployment, secret, configmap, and node

Everyone monitors pods, but nobody watches this critical component.

But the moment a Kubernetes cluster breaks, 

Suddenly, etcd becomes the most important thing in your setup.

That is because etcd is the brain of Kubernetes. 

Every deployment, secret, configmap, and node
Dhanian 🗯️ (@e_opore) 's Twitter Profile Photo

KUBERNETES POD SECURITY POLICIES Kubernetes Pod Security Policies (PSP) were designed to control the security settings of Pods at the cluster level. They define what a Pod is allowed to do and enforce rules to prevent insecure configurations. While PSP has been deprecated, its

KUBERNETES POD SECURITY POLICIES

Kubernetes Pod Security Policies (PSP) were designed to control the security settings of Pods at the cluster level. They define what a Pod is allowed to do and enforce rules to prevent insecure configurations. While PSP has been deprecated, its
VECERT Analyzer 🛰️📡 (@vecertradar) 's Twitter Profile Photo

🚨 CYBER THREAT ALERT: ALLEGED DATA EXFILTRATION - FREESAP.CL 🇨🇱 🌐 A critical compromise has been detected affecting the Chilean IT consultancy FreeSAP (freesap.cl). The attacker, identified as NormalLeVrai, claims to have taken control of the website

🚨 CYBER THREAT ALERT: ALLEGED DATA EXFILTRATION - FREESAP.CL 🇨🇱

🌐 A critical compromise has been detected affecting the Chilean IT consultancy FreeSAP (freesap.cl). The attacker, identified as NormalLeVrai, claims to have taken control of the website
TechOps Examples (@techopsexamples) 's Twitter Profile Photo

25 Blogs to Learn 25 Kubernetes Concepts: 1) Kubernetes Architecture: techopsexamples.com/p/kubernetes-a… 2) POD Lifecycle: techopsexamples.com/p/kubernetes-p… 3) etcd Setup: techopsexamples.com/p/how-to-setup… 4) etcd Locks: techopsexamples.com/p/understandin… 5) crashloopbackoff: techopsexamples.com/p/kubernetes-c… 6) OOMKilled:

25 Blogs to Learn 25 Kubernetes Concepts:

1) Kubernetes Architecture: techopsexamples.com/p/kubernetes-a…
2) POD Lifecycle: techopsexamples.com/p/kubernetes-p…
3) etcd Setup: techopsexamples.com/p/how-to-setup…
4) etcd Locks: techopsexamples.com/p/understandin…
5) crashloopbackoff: techopsexamples.com/p/kubernetes-c…
6) OOMKilled:
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

Chile 🇨🇱 - FreeSAP has allegedly suffered a data breach and extortion attack, resulting in the theft of its website source code and a database containing over 40,000 rows of user and admin information. dailydarkweb.net/chilean-it-fir…

Chile 🇨🇱 - FreeSAP has allegedly suffered a data breach and extortion attack, resulting in the theft of its website source code and a database containing over 40,000 rows of user and admin information. dailydarkweb.net/chilean-it-fir…
K3sDaily (@k3sdaily) 's Twitter Profile Photo

Radar provides Kubernetes cluster visibility through topology graphs, event timelines, and service traffic visualization running as a single binary that connects directly to the Kubernetes API without cluster-side installation ➤ ku.bz/MhXx4kyjB

Radar provides Kubernetes cluster visibility through topology graphs, event timelines, and service traffic visualization running as a single binary that connects directly to the Kubernetes API without cluster-side installation

➤ ku.bz/MhXx4kyjB
Kubesploit (@kubesploit) 's Twitter Profile Photo

This article solves automated certificate distribution for EAP-TLS WiFi authentication using nginx-proxy on Kubernetes with step-ca, avoiding traditional MDM by hosting mobileconfig files at an HTTPS endpoint with mTLS authentication ➤ ku.bz/spclMhjDz

This article solves automated certificate distribution for EAP-TLS WiFi authentication using nginx-proxy on Kubernetes with step-ca, avoiding traditional MDM by hosting mobileconfig files at an HTTPS endpoint with mTLS authentication

➤ ku.bz/spclMhjDz