Operations | Monitoring | ITSM | DevOps | Cloud

Linux

Monitor Alpine Linux ARM Hosts with AppSignal

Today, we're launching ARM support for machines running Alpine Linux. This feature is available for our Ruby and Elixir users! We hope to add support for Alpine Linux ARM to our Node.js package in the future. The ARM CPU architecture is becoming more and more popular. As it powers people's development machines and production servers, we decided to add it to the list of the operating systems we support.

Linux "find" command - A Complete Guide

Linux users cannot just rely on GUI to perform various tasks in their system. Rather they need to have a good knowledge of the various commands available. One of the very useful commands for any Linux user is the find command. This command is used to locate files in one or more directories. Using this command, Linux users can set a specific search area, filter or find the files on the specific area or directory, and perform actions on the files that match the search.

What is eBPF and what are its use cases

With the recent advancements in service delivery through containers, Linux has gained a lot of popularity in cloud computing by enabling digital businesses to expand easily regardless of their size or budget. These advancements have also brought a new wave of attack, which is challenging to address with the same tools we have been using for non cloud-native environments.

Raising the bar on cybersecurity with Ubuntu for AWS GovCloud

US government agencies and organizations in government-regulated industries face a huge challenge in complying with regulations and standards in order to run their workloads. AWS GovCloud and Ubuntu make it much easier to deploy missions securely in the cloud whilst remaining compatible with compliance requirements.

Multipass 1.10 brings new instance modification capabilities

Developers rejoice! The Multipass team has been listening to your feedback, and we are excited to announce that the latest update to Multipass contains one of our most requested features – instance modification. For those who are just discovering Multipass, it’s software designed to make working with virtual machines as painless as possible. It has an intuitive command line interface, and abstracts away the hard work of configuring, launching, modifying and destroying VMs.

What is Bashtop? Setup, Commands, and Shortcuts

Usually, we have top and htop to monitor the Linux system and get to know the running processes along with CPU and Memory utilization. But these commands have certain limitations which refrain them from giving a detailed overview of the system performance. This limitation is overcome by the alternative called Bashtop. In this blog, we will learn about Bashtop, its advantages, and disadvantages along with its shortcuts and installation guide.

Let's get confidential! Canonical Ubuntu Confidential VMs are now generally available on Microsoft Azure

On behalf of all Canonical teams, I am happy to announce the general availability of Ubuntu Confidential VMs (CVMs) on Microsoft Azure! They are part of the Microsoft Azure DCasv5/ECasv5 series, and only take a few clicks to enable and use. Ubuntu 20.04 is the first and only Linux distribution to support Confidential VMs on Azure.

Omnichannel Enablement: 4 technology success factors

The days in which a business could thrive by serving customers through brick-and-mortar stores alone are long gone. Almost all retailers now offer a variety of online and offline channels, often with some degree of integration to ensure a smooth customer journey across different touchpoints. However, even these multichannel and cross-channel strategies are increasingly falling short of modern expectations.

Introduction to Confidential Computing

Public clouds are great! Yet, many users are still reluctant towards moving their security-sensitive workloads away from their private data centers and into the public cloud, due to a set of security concerns. To address these challenges, what we need is a way to perform a privacy-preserving computation that can protect the confidentiality and integrity of your workload. Confidential computing achieves this by running your workload in a hardware-encrypted execution environment, that is isolated from the cloud provider’s privileged system software (e.g. hypervisor, host OS, and firmware), as well as its employees.