Home New Trending Search
About Privacy Terms
#
#namespaces
Posts tagged #namespaces on Bluesky
Original post on fosstodon.org

RE: https://social.jvns.ca/@b0rk_reruns/116211974384398125

This is like the best thing since sliced bread, at least to a networking geek like me! I have this little script called `use.sh` that I use (x2) to put a couples of NICs into a network namespace just so I can test routing performance or […]

0 0 0 0

🗂️ Managing 100s of Kubernetes namespaces? Meet HNC: Hierarchical Namespace Controller.

Inherit policies, quotas & RBAC across namespace trees — like folders for K8s.

#Kubernetes #Namespaces #MultiTenant #PlatformEngineering #DevOps
🔗 devopstales.github.io/kubernetes/h...

1 0 0 0

#Package Management #Namespaces

https://nesbitt.io/2026/

0 0 0 0
Preview
Linux Namespaces: Cómo Funcionan los Contenedores por Dentro | | CIBERED Aprende qué son los Linux Namespaces, cómo funcionan y cómo crear contenedores desde cero sin Docker. Guía técnica paso a paso para principiantes.

📦 Linux Namespaces: Cómo Funcionan los Contenedores por Dentro cibered.com/tutoriales/l...

#Linux #Namespaces #Contenedores #Docker #DevOps #Seguridad #Cibered

0 0 0 0
Namespace Manipulation and Data Extraction // APL Programming // NEW in Dyalog v20.0
Namespace Manipulation and Data Extraction // APL Programming // NEW in Dyalog v20.0 YouTube video by Dyalog

New with Dyalog v20.0: Namespace manipulation and data extraction has been made easier with the addition of ⎕VGET and ⎕VSET, and extensions to ⎕NS. Discover more at www.youtube.com/watch?v=KR8v... #Dyalog #APL #DataExtraction #Namespaces

0 0 0 0
Preview
Performance Testing Namespaces ⋆ LiteSpeed Blog Performance testing namespaces and bubblewrap in OpenLiteSpeed. Both tools meet the needs of a safe sandbox environment.

Let's look at Namespaces and Bubblewrap performance in an OpenLiteSpeed sandbox environment: blog.litespeedtech.com/2024/02/21/p... #litespeed #openlitespeed #namespaces

0 0 0 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

0 0 0 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

0 0 0 0
Post image

Docker изнутри: исчерпывающее руководство. Механизмы контейнеризации + примеры, эксперименты и реализация Docker...

#docker #контейнеризация #namespaces #cgroups #linux #kernel #виртуализация #runc #golang #linux

Origin | Interest | Match

0 1 0 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

0 0 0 0
Preview
Building Your Own Program in C# C# is a powerful and versatile programming language developed by Microsoft. In this tutorial, we will guide you through the steps to build a simple console application in C#....

Building Your Own Program in C# #C# #Programming #Tutorial #Console #Application #Code #Compile #Run #Variables #Methods #Classes #Namespaces #Loops #Conditionals #Development

1 0 0 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

0 0 0 0
Preview
Working with TypeScript Namespaces TypeScript namespaces provide a way to organize and manage code within a single global scope. Namespaces help in grouping related code together, preventing naming conflicts, ...

Working with TypeScript Namespaces #Typescript #Namespaces #Code #Organization #Functions #Classes #Variables #Scope #Management #Encapsulation #Collisions #Maintenance #Access #Usage

0 0 0 0
Matz presenting a first draft for Ruby namespaces

Matz presenting a first draft for Ruby namespaces

Uuuh, #Ruby will likely get #Namespaces although the syntax will change because #GitLab already uses `Namespace` a lot and @matz doesn't want to break it for them.

But that is indeed a feature that I was missing from #rubylang.

#balticruby #balticruby2025 #riga @balticruby

1 1 0 0
Post image

От неймспейсов к тенантам: как dBrain обеспечивает изол...

habr.com/ru/companies/dbraincloud...

#dbrain #kubernetes #keycloak #tenancy #мультитенантность #capsule #grafana #k8s #namespaces #тенанты

Result Details

1 0 0 0
Post image

От неймспейсов к тенантам: история разработки собств...

habr.com/ru/companies/dbraincloud...

#dbrain #kubernetes #keycloak #tenancy #мультитенантность #capsule #grafana #k8s #namespaces #тенанты

Result Details

1 0 0 0
Video thumbnail

Layered Architecture in C# Tip #33 #CSharp #CSharpTutorial #ProgrammingBasics #dotnet #CodeOrganization #visualstudiocode #softwaredeveloper #softwareengineering #CodingForBeginners #dotnetdeveloper #vscode #csharp #visualstudio #Namespaces #VisualStudio #coding

1 0 0 0
Video thumbnail

Nested Namespaces in C# Tip #32 #CSharpTutorial #VisualStudio #CSharp #Namespaces #ProgrammingBasics #dotnet #CodeOrganization #visualstudiocode #visualstudio #softwaredeveloper #CodingForBeginners #softwareengineering #csharp #vscode #dotnetdeveloper #coding

0 0 0 0
Video thumbnail

Block vs File Scoped Namespaces in C# Tip #31 #Namespaces #CSharp #VisualStudio #CSharpTutorial #dotnet #ProgrammingBasics #CodeOrganization #visualstudiocode #visualstudio #softwaredeveloper #CodingForBeginners #softwareengineering #csharp #vscode #dotnetdeveloper

0 0 0 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

1 0 0 0
Post image

Namespaces In Python: Complete Overview For Beginners Namespaces in Python are used to map the ob...

pwskills.com/blog/namespaces-in-pytho...

#Python #namespaces #in #python #python #namespaces

Result Details

0 0 0 0
Preview
Kubernetes Agent Blind to New Mounts? Demystifying Mount Propagation ## How `mountPropagation: HostToContainer` leverages Linux namespaces to solve a common agent problem Ever run into this frustrating scenario? You deploy a Kubernetes agent (like an I/O limiter, monitoring tool, or operator) that needs to interact with PersistentVolumes mounted by Kubelet for other pods. It works fine initially, seeing all existing mounts. But then, a _new_ pod gets scheduled, its PV gets mounted by Kubelet... and your agent is completely blind to it! 😠 Restarting the agent fixes it, but that's just a workaround, not a solution. I recently wrestled with this exact issue while building an I/O limiter that needed device `MAJOR:MINOR` numbers from pod mounts. Let's dive into why this happens and how to fix it properly using Kubernetes `mountPropagation`. ### The Root Cause: Linux Mount Namespaces The core of the issue lies in **Linux mount namespaces**. By default, each container in Kubernetes gets its own isolated mount namespace. Think of it as a private view of the system's mount points. When a container starts, it gets a _copy_ of the host's mount table at that moment. Crucially, subsequent mount events happening on the host (like Kubelet mounting a new PV under `/var/lib/kubelet/pods/`) are _not_ automatically reflected inside the container's isolated namespace. This default behavior corresponds to `private` propagation in Linux terminology. In Kubernetes, this default isolation is represented by: mountPropagation: None # (Default if not specified) This isolation is great for security and preventing containers from interfering with each other or the host, but it causes the "blind agent" problem. ### The Solution: Kubernetes `mountPropagation` Kubernetes provides the `mountPropagation` field within a `volumeMount` definition to control how mount events are shared between the host and the container's namespace. It bridges the isolation gap when needed. There are three modes: 1. **`None` (Default):** Complete isolation. No mount events propagate in either direction. (Linux: `private`) 2. **`HostToContainer`:** One-way street! Mount events from the host **propagate into** the container. Mounts created _inside_ the container do **not** propagate back to the host. (Linux: `rslave` - recursive slave). **This is exactly what we need for our agent!** 👍 3. **`Bidirectional`:** Two-way street. Mounts propagate from host to container AND from container back to the host (and other containers in the pod using `Bidirectional`). (Linux: `rshared` - recursive shared). **Use with extreme caution!** This can affect the host system and requires the container to be privileged or have `CAP_SYS_ADMIN`. ### The Recipe: Fixing the Blind Agent To allow our agent container to see new PVs mounted by Kubelet under `/var/lib/kubelet/pods` _after_ the agent has started, we need to mount that host directory into the agent and set `mountPropagation: HostToContainer`: # Example Pod spec for the agent spec: containers: - name: my-observing-agent image: my-agent-image:latest # Optional: If your agent needs to *do* something with mounts, # it might need privileges beyond just seeing them. # Bidirectional *requires* privileged or CAP_SYS_ADMIN. # HostToContainer itself doesn't require extra privileges just to see mounts. # securityContext: # privileged: false # capabilities: # add: ["SYS_ADMIN"] # Example if needed for other operations volumeMounts: - name: kubelet-pods-dir # The path inside the container where the host dir will be mounted mountPath: /mnt/kubelet-pods # The magic setting! mountPropagation: HostToContainer volumes: - name: kubelet-pods-dir hostPath: # The directory on the host we want to observe path: /var/lib/kubelet/pods # Ensures the path exists on the host type: DirectoryOrCreate With this configuration, any new directory or mount point created by Kubelet under `/var/lib/kubelet/pods` on the host will automatically appear under `/mnt/kubelet-pods` inside the `my-observing-agent` container, without requiring a restart. Problem solved! ✅ ### Under the Hood: How It Works What happens when you set `HostToContainer`? 1. **Kubelet:** Sees `mountPropagation: HostToContainer` in the Pod spec. 2. **CRI Request:** Kubelet translates this to the corresponding enum (`PROPAGATION_HOST_TO_CONTAINER`) in its request to the Container Runtime Interface (CRI). 3. **Container Runtime (containerd, CRI-O):** Receives the request and uses Linux system calls (specifically the `mount` syscall with flags like `MS_SLAVE | MS_REC`) to configure the container's mount point (`/mnt/kubelet-pods` in our example) as a **recursive slave** (`rslave`) of the corresponding host mount point (`/var/lib/kubelet/pods`). 4. **Propagation:** Because the container's mount is now a slave of the host's mount, any mount events occurring under the host path are automatically propagated by the Linux kernel into the container's mount namespace at the slave mount point. ### Important Considerations * **Security (`Bidirectional`):** Seriously, be careful with `Bidirectional`. A container mount propagating back to the host can have significant security implications, especially in multi-tenant clusters. It generally requires the container to run as privileged or have `CAP_SYS_ADMIN`. * **Privileges (`HostToContainer`):** Simply _observing_ mounts with `HostToContainer` doesn't inherently require extra privileges. However, if your agent needs to _perform actions_ within those propagated mounts (like modifying files owned by root, mounting things itself), it might need appropriate capabilities (`CAP_SYS_ADMIN`) or run as privileged, independent of the `mountPropagation` setting itself. * **Debugging:** If things aren't working, check the mount table inside the container (`findmnt` or `cat /proc/self/mountinfo`) and compare it to the host's. Look for the `master:` entries or propagation flags (`shared`, `slave`) associated with your mount point. * **Historical Note:** For a brief period around Kubernetes 1.10, the default was accidentally changed to `HostToContainer` before being reverted. If you're managing a very old cluster, be aware of this possibility (#62462). ### Conclusion Kubernetes `mountPropagation` is a powerful mechanism rooted in Linux mount namespaces that allows you to selectively break container isolation for specific use cases. Understanding the `HostToContainer` mode (`rslave`) is key to solving the common problem of agents needing visibility into dynamically created host mounts, like those managed by Kubelet. By applying it correctly, you can build more robust and reliable agents and operators without resorting to restarting them. Connect with me on LinkedIn!
0 0 0 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

0 0 0 0

Concerning decentralization, namespaces could be registered using a distributed ledger or a community-governed system.

Thoughts?

#atproto #bluesky #namespaces

1 0 1 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

0 0 0 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

1 0 0 0
Preview
What Was Added To C# 10 Note: This post was originally posted on the Telerik blog

ICYMI: (12/03/2021): "What Was Added To C# 10." RPs and feedback are always appreciated! https://jjg.me/2ZUtUPm #Articles #.NET #Namespaces #Interpolation #CallerArgumentExpression #Pattern Matching #dotnet #csharp

0 0 0 0