Operations | Monitoring | ITSM | DevOps | Cloud

Linux

What's the deal with edge computing?

With over 41 billion IoT devices expected to be active by 2027 — that’s at least 5 devices for every person on the planet — edge computing has emerged as a tenable solution to prevent the impending snowballing of network traffic. Allow me to lift the veil on this buzzword and explain why it’s been gaining attention in tech circles lately.

Multus: how to escape the Kubernetes eth0 prison

Kubernetes has been successful for a number of reasons, not the least of which is that it takes care of things that application developers may not want to bother with – such as, for example, networking. Multus is a feature that can be used on top of Kubernetes to enable complex networking use cases.

Hybrid cloud and multi-cloud: what is the difference?

Hybrid cloud and multi-cloud are two exclusive terms that are often confused. While the hybrid cloud represents a model for extending private cloud infrastructure with one of the existing public clouds, a multi-cloud refers to an environment where multiple clouds are used at the same time, regardless of their type. Thus, while the hybrid cloud represents a very specific use case, multi-cloud is a more generic term and usually better reflects reality.

Ubuntu on WSL 2 Is Generally Available

Today Microsoft announced the general availability of Windows Subsystem for Linux 2 in the Windows 10 May 2020 update. WSL 2 is based on a new architecture that provides full Linux binary application compatibility and improved performance. WSL 2 is powered by a real Linux kernel in a lightweight virtual machine that boots in under two seconds. WSL 2 is the best way to experience Ubuntu on WSL.

How to Monitor for Unauthorized Changes to Your Linux Packages With SCM

Packages keep your Linux servers up to date and running smoothly. Yet if someone tampers with the packages getting deployed to your server, you could have serious performance issues, expose your organization to harmful viruses, or open it up a new vulnerability. Keeping an eye out for what packages are deployed, the package sources, and how they're changed could help prevent or alert you to an issue. In this video, we'll show you how to gain visibility into your Linux packages and track how they're changing over time.

ZFS focus on Ubuntu 20.04 LTS: what's new?

Ubuntu has supported ZFS as an option for some time. In 19.10, we introduced experimental support on the desktop. As explained, having a ZFS on root option on our desktop was only a first step in what we want to achieve by adopting this combined file system and logical volume manager. I strongly suggest you read the 2 blog posts, linked above, as introductions to this blog series we are starting. Here we cover what’s new compared to 19.10 in term of installation and general features.

Kubernetes on Windows with MicroK8s and WSL 2

Kubernetes has enjoyed an unparalleled 5-year growth that has revolutionised the IT industry. It has become a key factor for organisations to be successful and have a competitive advantage. In order to optimise these benefits, organisations look for new ways to reduce Kubernetes complexity and get interoperability with other systems. See how combining MicroK8s and WSL 2 brings a low-ops, fully conformant Kubernetes through a single-command install within Windows.

Kubernetes GitOps with Azure Arc and Charmed Kubernetes

This week, Canonical announced the integration of Charmed Kubernetes with Microsoft Azure Arc. This integration provides businesses with a centralised place to manage their Kubernetes clusters and deploy their applications at scale, from cloud to the edge. The Azure Arc dashboard enables management and governance of any Kubernetes, across any substrate.

Ubuntu 20.04 LTS to enforce stronger TLS v1.2 encryption by default

In Ubuntu 20.04 LTS, the OpenSSL 1.1.1f library has been modified to use Security Level 2 by default (previous versions of Ubuntu use Security Level 1). Security Level 2 guarantees that protocols, key exchange mechanisms, cipher suites, signature algorithms, certificates and key sizes provide a minimum of 112 bits of message secrecy. In practice, it means that RSA keys are required to be at least 2048 bits long and ECC keys at least 224 bits using the SHA256 certificate signature algorithm.