Skip to content

Commit

Permalink
Add another Jaeger project (#893)
Browse files Browse the repository at this point in the history
Signed-off-by: Yuri Shkuro <github@ysh.us>
  • Loading branch information
yurishkuro authored and aliok committed Mar 28, 2023
1 parent b70b375 commit 81af1cd
Showing 1 changed file with 20 additions and 4 deletions.
24 changes: 20 additions & 4 deletions programs/summerofcode/2023.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ If you are a project maintainer and consider mentoring during the GSoC 2023 cycl
+ [Improve in-toto's test setup](#improve-in-totos-test-setup)
* [Jaeger](#jaeger)
+ [Implement ClickHouse support](#implement-clickhouse-support)
+ [Implement Critical Path analysis](#implement-critical-path-analysis)
* [Keptn](#keptn)
+ [Keptn Plugin for Backstage](#keptn-plugin-for-backstage)
+ [Build Standard KeptnTaskDefinition Library](#build-standard-keptntaskdefinition-library)
Expand Down Expand Up @@ -109,7 +110,7 @@ If you are a project maintainer and consider mentoring during the GSoC 2023 cycl
- With an interface, mocking and testing becomes much easier as you can implement mocks for the DB access. Currently we require a postgres DB for unit testing.
- Test coverage could increase
- Recommend Skills: Go, SQL
- Mentor(s):
- Mentor(s):
- Kevin Hannon, @kannon92, kannon1992@gmail.com
- Geoffrey Wilson, @suprjinx, geoff@gr-oss.com
- Expected project size: 350 Hours
Expand Down Expand Up @@ -157,7 +158,7 @@ If you are a project maintainer and consider mentoring during the GSoC 2023 cycl

#### Add additional log drivers to conmon-rs

- Description: conmon-rs is a container monitor written in Rust, used by CRI-O to monitor a container's lifecycle. Part of its responsibilities is log forwarding--taking the output of the container and writing that output to various places. Currently, conmon-rs supports one format: the one required by the Kubernetes CRI. The goal of this proposal is to add new log formats from the list of standardized ones, like JSON, Splunk, Journald.
- Description: conmon-rs is a container monitor written in Rust, used by CRI-O to monitor a container's lifecycle. Part of its responsibilities is log forwarding--taking the output of the container and writing that output to various places. Currently, conmon-rs supports one format: the one required by the Kubernetes CRI. The goal of this proposal is to add new log formats from the list of standardized ones, like JSON, Splunk, Journald.
- Expected outcome: A JSON log driver and Journald log driver are added to conmon-rs. A stretch goal of adding a Splunk log driver is also within scope.
- Recommended Skills: Rust, familiarity with containers
- Mentor(s): Peter Hunt, haircommander, pehunt@redhat.com; Sascha Grunert, saschagrunert, sgrunert@redhat.com
Expand Down Expand Up @@ -260,6 +261,22 @@ If you are a project maintainer and consider mentoring during the GSoC 2023 cycl
- Difficulty: Medium
- Upstream Issue (URL): https://github.com/jaegertracing/jaeger/issues/4196

#### Implement Critical Path analysis

- Description: Jaeger (https://jaegertracing.io) is a popular platform for distributed tracing. Critical path analysis is an important tool in the latency investigations. This project aims to add support for critical path analysis to Jaeger UI.
- Expected outcomes:
- Implement critical path determination algorithm
- Enhance Trace Timeline view to overlay critical path on top of the trace.
- Add relevant documentation to the Jaeger website
- Author a blog post on Jaeger blog explaining the new feature
- Stretch goals:
- Add critical path visualization to other trace views (graph, table, flamechart)
- Recommended Skills: Javascript, Typescript
- Mentor(s): Yuri Shkuro, @yurishkuro
- Expected project size: 175 Hours
- Difficulty: Medium
- Upstream Issue (URL): https://github.com/jaegertracing/jaeger-ui/issues/1288

### Keptn

#### Keptn Plugin for Backstage
Expand Down Expand Up @@ -398,7 +415,7 @@ The action should be able to generate a summary using baseline benchmark and th
#### Store KubeArmor policies in OCI registry

- Description: Store KubeArmor policies & host policies as OCI Artifacts.
OCI Artifacts are a set of conventions that allows us to store assets other than the container images, like Helm Charts, inside an OCI registry.
OCI Artifacts are a set of conventions that allows us to store assets other than the container images, like Helm Charts, inside an OCI registry.
[Artifact Hub](https://artifacthub.io/) is a website where users can find, install, and publish packages and configurations for CNCF projects. The idea is to use Artifact Hub for pushing, pulling and verifying the authenticity of KubeArmor policies using [cosign](https://github.com/sigstore/cosign).
- Expected outcome: The contributor is expected to create subcommand for `karmor` to interact with OCI registries for pushing, pulling and verifying policies based on OCI Artifacts specification.
- Mentor(s): Ankur Kothiwal(Ankurk99, ankur DOT kothiwal99 AT gmail DOT com), Anurag Kumar(kranurag7, contact DOT anurag7 AT gmail DOT com), Barun Acharya(daemon1024, barun1024 AT gmail DOT com)
Expand Down Expand Up @@ -564,4 +581,3 @@ OCI Artifacts are a set of conventions that allows us to store assets other than
- Expected project size: 350h
- Difficulty: Hard
- Upstream Issue (URL): https://github.com/WasmEdge/WasmEdge/issues/2244

0 comments on commit 81af1cd

Please sign in to comment.