The Civo 2022 roadmap so far...
At Civo we are always committed to listening to our customers and community. In this post, I would like to highlight some of the great work the team has done to make Civo Kubernetes a go-to choice for enterprises.
At Civo we are always committed to listening to our customers and community. In this post, I would like to highlight some of the great work the team has done to make Civo Kubernetes a go-to choice for enterprises.
The beauty of Shipa is that no matter how the surrounding ecosystem changes e.g your Continuous Delivery or Infrastructure-as-Code stacks, the Shipa API stays the same. If you are curious about interacting with this mystical API, there are a lot of surrounding integrations that do that for you. Though, if you want to directly interact with the API, you can send out HTTP requests to the Shipa API itself to create any sort of integration you require.
When you are dealing with a situation that fires a bevy of alerts, do you instinctively know which alerts are the most pressing? Severity levels are an important concept in alerting to aid you and your team in properly assessing which notifications should be prioritized. You can use these levels to focus on the issues deemed most critical for your operations and triage through the noise.
For businesses utilising public clouds, choosing an open source platform offers considerable advantages. Open source solutions can help reduce costs, provide access to the most leading-edge enterprise-grade features, and eliminate risks such as vendor lock-in, lack of support, or long-term security maintenance.
The world is moving towards a data-driven society, resulting in businesses gathering more data to leverage for profit. This data is either in structured forms like JSON/CSV/XML or unstructured forms like text written on a notepad or typed texts. Regardless of the data’s formatting, the important thing is the information it contains. Various tools in the market extract data from different agents and platforms that will improve your metric monitoring system.
Grafana Labs and New Relic have a long history of working together to drive cross-functionality so joint customers can benefit from using Grafana and New Relic together. The New Relic data source plugin for Grafana — which is available to users with a Grafana Cloud account or with a Grafana Enterprise license — is no exception. In this quick tutorial video, we’ll not only show you how easy it is to configure the New Relic data source plugin in Grafana.
When is the last time you updated your CI/CD workflow? A year ago? Never? You are not alone, my friends. Reconfiguring workflows can be one of the most daunting tasks for DevOps practitioners. But with new opportunities to benefit from CircleCI plans, there’s one simple and effective place to start: understanding concurrency and parallelism. Using concurrency and parallelism can cut your build times significantly. But you need to know what they are and how to find them in your config file.
Site Reliability Engineering (SRE) teams and Platform Engineering teams share similar goals -- like maximizing automation and reducing toil -- and similar methodologies. But they have different priorities, and use somewhat different tools to achieve them. What are SREs, what are platform engineers and how is each role similar and different? This article explains.
Sometimes heritage is better than new. Some people favor Coca-Cola Classic over New Coke, and heirloom tomatoes over regular tomatoes. Some Luddites might say the same thing about cloud computing. “I won’t put my (app/data) in the cloud! It will be more (secure | reliable | cheaper) if I run it myself in my own data center.”
rxdirs has provided a convenient default when setting permissions recursively. When enabled (the default prior to version 3.20.0) a promise to grant read access on a directory is extended to also include execution since quite commonly if you want to read a directory you also want to be able to list the files in the directory. However, the convenience comes with the cost of complicating security reviews since the state requested on the surface is more strict than what is actually granted.