Operations | Monitoring | ITSM | DevOps | Cloud

Linux

How to secure your database

Cybersecurity threats are increasing in volume, complexity and impact. Yet, organisations struggle to counter these growing threats. Cyber attacks often intend to steal, damage, hijack or alter value-generating data. In this article around database security, we use the NIST framework to lay out the common controls that you can implement to secure your databases. Let’s start by discussing the potential impact of unsecured databases.

How to Effortlessly Deploy Cribl Edge on Windows, Linux, and Kubernetes

Collecting and processing logs, metrics, and application data from endpoints have caused many ITOps and SecOps engineers to go gray sooner than they would have liked. Delivering observability data to its proper destination from Linux and Windows machines, apps, or microservices is way more difficult than it needs to be. We created Cribl Edge to save the rest of that beautiful head of hair of yours.

Canonical Kubernetes 1.28 is now generally available

Following the release of upstream Kubernetes on 15th of August, Canonical Kubernetes 1.28 is generally available in the form of MicroK8s, with Charmed Kubernetes expected to follow shortly. We consistently follow the upstream release cadence to provide our users and customers with the latest improvements and fixes, together with security maintenance and enterprise support for Kubernetes on Ubuntu.

Docker on Mac - a lightweight option with Multipass

For those looking for a streamlined, lightweight command line interface for Docker on Mac, look no further. Multipass is a flexible tool that makes it easy to create and run Ubuntu VMs on any platform, and it comes with built-in tools that make running applications like Docker feel native on platforms such as macOS.

How to ensure business continuity with IT infrastructure support

Picture this: you’re on a dream vacation with your family on a serene tropical island. The weather is perfect, the sea is mesmerising, and you’re ready to enjoy a relaxing day at the beach. Just as you’re about to unwind, your phone rings: it’s your manager calling to inform you that your IT infrastructure is down, and you need to fix it immediately. If this scenario sounds all too familiar, you’re not alone.

Understanding Linux Logs: Overview with Examples

Logging and program output are woven into the entire Linux system fabric. In Linux land, logs serve as a vital source of information about security incidents, application activities, and system events. Effectively managing your logs is crucial for troubleshooting and ensuring compliance. This article explores the importance of logging and the main types of logs before covering some helpful command line tools and other tips to help you manage Linux logs.

Maximizing Coding Productivity with Large Language Models

Learn how to maximize developer productivity by leveraging large language models for rapid code refactoring. Large language models like ChatGPT have tremendous potential to automate repetitive coding tasks and boost team effectiveness. In this MAAS Show And Tell, Peter Makowski, Senior Web Engineer at Canonical, shares insights and a real-world example of using LLM for a successful large-scale migration of hundreds of tests from enzyme to @testing-library/react.

What is virtualization? A beginners' guide.

While information technology continues to evolve rapidly, virtualization remains a cornerstone of modern computing, enabling businesses to maximise resource utilisation, enhance flexibility, and reduce the total cost of ownership (TCO). It is a key building block of the cloud computing paradigm, and millions of organisations use it daily worldwide. All existing cloud platforms, such as AWS, Azure, Google or OpenStack, use virtualization underneath.