Hacker News new | past | comments | ask | show | jobs | submit | talboren's comments login

actually alert fatigue started from healthcare initially where doctors become desensitized to safety alerts, and as a result ignore or fail to respond appropriately to such warnings - it is the same problem in tech companies where you get all these muted Slack channels. It’s a problem almost every company faces at some point of its life

are you referring to the product or the toggle in our marketing website?

the toggle on the website


thanks for the clarification, sorry if it sounded like we’re thinking your comment is not legitimate. It absolutely makes sense.

providers are usually driven by the community! happy to collaborate on that provider if you’d like.

actually, it’s 100 workflows, 20 providers and 10 users. important to note that it’s per deduplicated alert and not every event ingested by keep. what got you surprised about this pricing model?

I work in e-commerce at a large marketplace.

In surprised because 500 deduplicated alerts requiring human attention is a normal day for my company. If something goes really wrong it'd start to get very expensive.


one of our goals is to help you better manage those alerts and reduce the total number. I would have loved to hear more about those 500 alerts use case, im sure checking up Keep would be a super interested use case

thank you for that! fixed in https://github.com/keephq/keep/issues/2681

Damn, answering feedback with a pr link is fireeee

trying to keep that high pace!

I love me some worfklows. Please keep this typo…pretty please? :)

haha! gotta fix those for my ocd: https://github.com/keephq/keep/pull/2684 ^^'

At least it will be preserved in the PR title.

it's definitely relevant for early-stage products who deeply care about realiability. are you already handling some amount of alerts today? there's a bunch of stuff you can do with workflows to automate processes and help your users.

we do integrate with AWS Cloudwatch but not yet with Vercel's observability, but can add that if you want to give it try


We will check the Cloudwatch integration, thanks!

How does this differ from Traceloop’s Openllmetry? https://github.com/traceloop/openllmetry


From what I can see, Openllmetry asks you to manually call tracer for non-default OpenAI libraries (i.e. not Python/Node.js) [1]

OpenLIT might be easier to integrate with any language that supports OTEL for HTTP clients — you just trace your HTTP calls to OpenAI.

[1] https://www.traceloop.com/docs/openllmetry/getting-started-r...


How does it do that for ruby for example? (which is in the link you provided). OTEL instrumentation for HTTP doesn’t instrument the body so you won’t be able to see token usage, prompts and completions. Or am I missing something?


check out the "Choose an open source license" website [1]

[1] https://choosealicense.com/


This is MIT[1] licensed, if anybody finds _that_ interesting :P Also, by github[2]

See tl;drLegal[3] by FOSSA, though that site stinks -- go to the blog.

nit: Why the heck can't I swipe select the text on top??

I'm also going to use this opportunity to not say anything about the EPL or MPL. Bye!

[1] https://github.com/github/choosealicense.com/blob/gh-pages/L... [2] https://github.com/github/choosealicense.com [3] https://www.tldrlegal.com/


That website only covers a small subset of free licenses though.


why just now? there are many known attacks (SSRF[1] for example) that are based on IMDSv1. maybe i'm missing something but feels like this should have been done a long ago?

[1] https://www.cyberbit.com/uncategorized/aws-imds-v2-secures-s...


The migration isn't transparent, IMDSv2 has been available for a while and they have been pushing for it using warning notifications in the console. AWS deprecates things very slowly and usually avoid breaking changes. For instance, EC2 Classic stayed alive a very long time after they stopped selling it.

Over years, they moved from alerting to changing the default and will later remove IMDSv1 for new instances. Even then, they will not remove it for the previous generations and those may stay for years, the current oldest is M4 which I think is from 2015.


IMDSv2 was initially introduced after the capital one attack. but aws users will have to explicitly enable it and its not enabled by default.

now they are changing the default modes for instances launched from aws console using quick start process. and sometime in 2024 they will give an option to customers to control the default value for all run instances API calls from an account


IMDSv2 has been enabled by default since launch, and was made the default in the AWS SDKs at the same time. What's changing now is that IMDSv1 will be disabled by default. Until now customers had to disable it intentionally, either at the instance level, or by using IAM policies / SCPs to block calls still using IMDSv1 issued credentials.


I think we mean different things, it is enabled by default but I'm saying thats not the default IMDS version that metadata endpoint points to for `/latest/`

for example if you run below curl request on ec2 instances launched from aws console before nov 6th then you will get a response

```sh

curl http://169.254.169.254/latest/meta-data/profile

```

but if you run the same command on ec2 instances launched from aws console after nov 6th, then you will get an error that auth token is missing


IMDSv2 doesn't change the URLs, the "/latest/" in that URL is referring to the meta-data profile, rather than the IMDS version. IMDS is a lower level change in the authentication workflow to use a token (which is retrieved using a PUT request).

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance... has a good example.


Because unlike some other providers, AWS understands the value of backward compatibility. They were the first to make the concept of simultaneously deployed versioned public HTTP APIs work seamlessly at scale, and the number of actually impactful API deprecations they have done is tiny. This is one of them.

Prior to this change, IMDSv2 could be enforced on an account, machine image, and launch API call level.

If you're interested in this topic, you might enjoy reading https://steve-yegge.medium.com/dear-google-cloud-your-deprec...


i assumed it's due to bc but does that mean that bc > security? question is how hard do they push/expose the risks of using soon-to-be deprecated tech


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: