The latest News and Information on DevOps, CI/CD, Automation and related technologies.
As a fast-moving startup, you don’t have the luxury of spending days figuring out exactly what you need in a Kubernetes cluster. We’ve been there. To help out, we wrote a whole ebook on the blueprint we followed as we built and deployed our own web app in Kubernetes.
As we discussed in our previous post on cloud cost analysis and optimization, with over 60% of all cloud costs attributable to compute, focusing on compute infrastructure spend should be of the utmost priority. In this post we will focus on the public cloud vendors’ pricing models and how to best leverage them all for maximum cost optimization.
Every Puppet practitioner can appreciate the wealth of information stored inside PuppetDB. Although Puppet Enterprise console offers some insights into the data, we sometimes need rich dashboards, possibilities to correlate data about facts, nodes and reports and drill-down features. In short, we wish there were a way to unleash the full power of PuppetDB data to create situational awareness about our estate. This article will show that PowerBI is a very powerful companion to PuppetDB.
The financial services industry has built in more capital buffers to prevent market shocks from bringing another economic collapse. In addition to these financial controls, many banks and personal trading platforms have begun building resiliency into information technology shocks. Despite these new precautions, we’re still seeing outages today, preventing customers from depositing and withdrawing their money, completing transactions, and executing trades during key events.
Learning about the Icinga API can be an eye opening moment for some, and lead to a path of automation and configuration management. But where to start? Well, you can always check out the Icinga API documentation for that. But today, I have an idea for you – I’ll show you how to create a host through the Icinga 2 API.
Over the years there have been a bunch of great talks on site reliability and incident response. Below are a few we thought stood out(in no specific order) and is defintely worth a peek.
Do you have a big data center? Do you have terabytes of confidential data stored in that data center? Are you worried that your data might be exposed to malicious attacks? One of the most prominent security features of storage solutions is encryption at rest. This blog will explain this in more detail and how it is implemented in Charmed Ceph, Canonical’s software-defined storage solution.