Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Infrastructure as Code, part 2: build Docker images and deploy to Kubernetes with Terraform

This series shows you how to get started with infrastructure as code (IaC). The goal is to help developers build a strong understanding of IaC through tutorials and code examples. In this post, I will demonstrate how to how to create a Docker image for an application, then push that image to Docker Hub. I will also discuss how to create and deploy the Docker image to a Google Kubernetes Engine (GKE) cluster using HashiCorp’s Terraform.

Now you see me, now you don't: feature-flagging with LaunchDarkly at incident.io

At incident.io, we ship fast. We're talking multiple times a day, every day (yes, including Fridays). Once I merge a pull request (PR), my changes rocket their way into production without me lifting a finger. 💅 It's when we tackle larger projects that this becomes a bit more complicated. We recently launched Announcement Rules, which let you configure which channels incident announcements are posted in depending on criteria you define.

Unboxing BusyBox - 14 new vulnerabilities uncovered by Claroty and JFrog

Embedded devices with limited memory and storage resources are likely to leverage a tool such as BusyBox, which is marketed as the Swiss Army Knife of embedded Linux. BusyBox is a software suite of many useful Unix utilities, known as applets, that are packaged as a single executable file. Within BusyBox you can find a full-fledged shell, a DHCP client/server, and small utilities such as cp, ls, grep, and others.

Top Three Challenges in Building New Kubernetes Ecosystems: Public Sector Innovation

Worldwide container management revenue will grow strongly from a small base of $465.8 million in 2020, to reach $944 million in 2024, according to a new forecast from Gartner, Inc. Among the various subsegments, public cloud container orchestration and serverless container offerings will experience the most significant growth. The benefit of Kubernetes is that it makes it possible to manage and deploy modern applications with increased speed and efficiency.

Network Management Services: An Intro Guide With Examples

Connectivity is more valuable to today’s businesses than ever. Partly, this is because many business-critical operations are happening online. Employees are connecting using collaborative software. Customers are seeking support and placing orders online. At the same time, suppliers and partners are transmitting data online. All their success depends on network capacity and reliability.

Kubernetes Application-Level API

The Kubernetes API is the front end of the Kubernetes control plane and is how users can interact with their clusters. In essence, it’s the interface used to manage, create, and configure the cluster and the state of objects. Using a standard API, Kubernetes allowed teams to focus on constructs and consume infrastructure across different providers.

What do Top-Performing IT Organizations do Differently Than the Rest of Us?

The whole point of monitoring and managing your IT services is to ensure that they’re able to keep business services available and responsive to customer demands. But how do you actually quantify the return on investment you get from your IT performance management solutions? Digital Enterprise Journal set out to answer that question in its new research study, The Total Business Impact of IT Performance.

The Future of Private Addresses: Goodbye NAT, Hello IPv6

When the internet was first developed, the IP addressing scheme was IPv4. This addressing scheme worked really well for about 25 years. After all, it had about 4 billion host addresses. But as the internet grew, we started to see that this was just not going to be enough. Now we have an entire infrastructure that was built on IPv4. While IPv5 addresses have been exhausted, we’ve used band-aid solutions to keep the internet growing.

CIS-Harden your Ubuntu in Google Cloud

CIS Benchmarks are best practices for the secure configuration of a target system. The Center for Internet Security, Inc. (CIS®) is the authority backing CIS Benchmarks. Ubuntu Pro is entitled to be CIS compliant and packaged with CIS toolings from Canonical. Let’s SSH into your Ubuntu Pro virtual machine. If you haven’t yet upgrade your Ubuntu LTS to Ubuntu Pro, please follow this tutorial.

Canonical Transforms Linux on Mac

November 9th London, UK: On the heels of Apple’s announcement of a new line of game-changing M1 MacBooks, Canonical is bringing fast and easy Linux to the M1 platform. Multipass, the quickest way to run Linux cross-platform, received an update last week allowing M1 users to run Ubuntu VMs with minimal set-up. Multipass can download and launch a virtual machine image with one command, and developers on M1 can now get running on Linux in as little as 20 seconds.