Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

HTTP Keep-Alive, Pipelining, Multiplexing and Connection Pooling

Persistent connections allow HAProxy to optimize resource usage, lower latency on both the client and server side, and support connection pooling. HTTP is a layer 7 protocol that’s transmitted over a TCP connection. It works in a client-server model and follows the request-response paradigm, which means that a client sends a request to a server, which then replies with a response. From this statement, you can infer two different ways of operating.

Tapping Native Controls in Kubernetes to Protect Your Cloud-Native Apps

As companies adopt container technologies, they face a significant challenge - how do we secure this new attack surface? It’s an issue that you often see backlogged in favor of solving storage, networking and monitoring issues. Add on the challenge of educating the workforce on one of the fastest-growing open source projects to date, and it’s no wonder security has lagged as the primary focus for teams.

How to Remediate Unencrypted S3 buckets

Cloud environments are always susceptible to security issues. A significant contributor to this problem is misconfigured resources. Traditional IT Infrastructure was somewhat static; server hardware only changed every few years. With few changes occurring, security was also more static. The modern cloud environment is a much different challenge. In cloud environments, servers, services, and storage are created with automation, resulting in a dynamic and potentially ever-changing server environment.

Raspberry Pi and Ubuntu: 2020 roundup

We’re almost there, 2021 is just around the corner. Like many others, we at Canonical have a deep appreciation for all things Raspberry Pi. We see the good they do and the joy they bring and can’t help but be impressed. This year marks the beginning of a stronger collaboration between the folks at Raspberry Pi and us at Canonical. We are by no means done and still have a long way to go. But we have made strides in the right direction.

How to Expose and protect Logic App using Azure API Management (Part 4) - Delete a Logic Apps expose as an API or operation

You may be thinking, hey Sandro, what the hell? That is basic information and a straightforward task. Why do you want to write about that? Indeed it is, and you are right that it is an effortless and straightforward operation, at least at first glance. But like most things, nothing is that simple if you look closer. But let me explain better. Let’s imagine that we have an API call MoniorBizTalkPorts.