Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Top Technology Trends To Watch In 2021 (Part 1)

The way we all work fundamentally changed during 2020. The global pandemic has accelerated the pace of digital evolution for many businesses, while prompting others to pivot or change course completely. The response to the crisis will continue well into 2021, but as we edge closer to the end of the year, many organisations will already be thinking about the longer term impact of the pandemic and how to realign their business for growth.

Leveraging Multi-Tenancy For Your Team

Remote teams that work on dependent products face resource crunches and delays. When several teams work on interrelated projects, the chances are high that they will soon end up meeting at some point where they have to wait for resource release from another team or teams. For instance, when team A wants an update to an app currently maintained by Team B, they would want to automatically access the latest version of the app whenever a new bug is fixed and an update is made.

Why choose the Connect license for SquaredUp 5.0?

Every enterprise has its arsenal of tech tools to tackle an array of different challenges. Useful, and necessary, but often a pain to monitor. Whatever your data sources, being able to bring all these metrics into a unified dashboard provides valuable context, which in turn helps you identify and correlate problems more quickly, resulting in improved reaction time and decision making.

Route SSH Connections with HAProxy

Route SSH connections through HAProxy using the SSH ProxyCommand feature and SNI. Did you know that you can proxy SSH connections through HAProxy and route based on hostname? The advantage is that you can relay all SSH traffic through one public-facing server instead of needing to grant users direct access to potentially hundreds of internal servers from outside the network.

Using Hybrid and Multi-Cloud Service Mesh Based Applications for Distributed Deployments

Service Mesh is an emerging architecture pattern gaining traction today. Along with Kubernetes, Service Mesh can form a powerful platform which addresses the technical requirements that arise in a highly distributed environment typically found on a microservices cluster and/or service infrastructure. A Service Mesh is a dedicated infrastructure layer for facilitating service-to-service communications between microservices.

Set up K3s in High Availability using k3d

Have you ever wanted to try K3s high availability cluster “mode,” and you either did not have the minimum three “spare nodes” or the time required to set up the same amount of VMs? Then you are in for a good treat: meet k3d! If you’re not familiar with k3d, its name gives you a hint to what it’s all about: K3s in Docker.

Where does the tech sector go in 2021?

Like every industry sector, 2020 has been a tough year in tech. The pandemic has changed the way we work, it’s changed the way our customers work, and it’s been a rollercoaster ride. In August 2020, IDC’s Global ICT Spending Forecast 2020 – 2023 predicted 2020 revenue in the sector would fall to $4.8 trillion compared to its original estimate of $5.2 trillion.

Install JFrog Platform on Kubernetes in Under 20 Minutes

We get it, installing Artifactory and the JFrog DevOps Platform on Kubernetes can be daunting. As easy as we’ve sought to make it with our official JFrog installation Helm charts, there are a lot of decisions to be made. That’s meant to give you the widest possible choice for how to best fit your JFrog installation to your infrastructure. But choice can be overwhelming, too.

If the best of the best can be bested, what chance do the rest of us have?

This is a very relevant question as news of the FireEye and SolarWinds breaches aired. FireEye is a major player in the cybersecurity world. They are one of the top choices to be brought in to respond to a data breach. If they can be hit how can the average company hope to stay safe? The reality is, none of us are safe. No amount of technology, personnel or caliber of skills in the world can guarantee you will never have a data breach or be the victim of ransomware.