Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

HAProxyConf 2019 - Building a Service Mesh at Criteo with Consul and HAProxy by Pierre Souchay

At Criteo, we have been working on building a tight integration between HashiCorp Consul and HAProxy. In this talk, we will explain how we provision our HAProxy instances dynamically using Consul Connect, a new service mesh technology that allows HAProxy to talk to its peers from machine-to-machine without a traditional load balancer. We will detail how we are able to create a service with DNS, add load balancing, and configure SSL certificates in mere seconds. Since Criteo is working actively on enabling HAProxy with Consul Connect, we will explain the challenges of scaling Service Mesh architectures for large infrastructures.

Episode 10: Installing Redis from Ansible Galaxy

A pre-built playbook from Ansible Galaxy lets us easily install Redis. (Even we don't re-invent the wheel every time.) The Request Metrics application will use Redis as its main data store. We need to install Redis on our servers to find out if this is a good plan. Ansible provides a repeatable way of doing this configuration work.

Edge AI in a 5G world - part 3: Why 'smart cell towers' matter to AI

In part 1 we talked about the industrial applications and benefits that 5G and fast compute at the edge will bring to AI products. In part 2 we went deeper into how you can benefit from this new opportunity. In this part we will focus on the key technical barriers that 5G and Edge compute remove for AI applications.

The Anatomy of a Secure Serverless Platform, pt. I --- Design

A good software design tool enables rapid visualization of application architectures, much like a virtual whiteboard. A great design tool validates service architectures, their communication flows and the infrastructure required to execute them—and builds a scaffold that can be seamlessly taken forward into development. Security is a vital component of that scaffolding, starting at the design stage and extending through the application lifecycle.

The art of shipping and monitoring software with speed and confidence

Software teams are under increasing pressure to ship code faster than ever before, but without the right workflow and tools in place, this can introduce unnecessary risk and headache. We wanted to share how to configure deployments, identify issues, and track performance gains using tools and process to get the best results and enable you to ship software with speed and confidence. The tools we will be using in today’s example include Jenkins, Octopus, and Raygun.

FIPS 140-2: Stay compliant and secure with Canonical

FIPS 140-2 is a set of publicly announced cryptographic standards developed by the National Institute of Standards and Technology. It is an essential part of FEDRamp requirements for many governmental agencies in the US and Canada, as well as their business partners from all around the world. Furthermore, as a well established and verified security standard, an increasing number of large companies and financial institutions are asking for FIPS compliance.