Operations | Monitoring | ITSM | DevOps | Cloud

Redirect HTTP to HTTPS with HAProxy

Use the HAProxy load balancer to redirect users from HTTP to HTTPS automatically. For decades, our lives have become increasingly dependent on sending and receiving data from across the Internet. Now, with more people working, studying, and hanging with friends remotely, that trend is showing an uptick. Yet, adversaries seem to be grasping at that communication from every direction.

AWS Elasticsearch Pricing: Getting Cost Effective Logging as You Scale

AWS Elasticsearch is a common provider of managed ELK clusters., but does the AWS Elasticsearch pricing really scale? It offers a halfway solution for building it yourself and SaaS. For this, you would expect to see lower costs than a full-blown SaaS solution, however, the story is more complex than that.

Calico and K8s Network Policies - An Overview and Comparison

In an age where attackers are becoming more and more sophisticated, network security as a line of defense is more important than ever. Network Policy is the primary tool for securing a Kubernetes network. It allows you to easily restrict the network traffic in your cluster so only the traffic that you want to flow is allowed. In this training session, we will go over the core concepts in Kubernetes Network Policies and Calico Network Policies. Compare and contrast between the two models, and highlight when to use one versus the other.

Getting Started with Continuous Integration

It is impossible to overestimate the importance of a strong development environment when scaling your team’s capacity. Nowadays, most organizations use Git, and one of the popular and successful development models used by many organizations is Gitflow. When making use of such models, continuous integration (CI) is key as it enables faster project delivery and offers reduced risk and expenses thanks to self-managed and easy-to-control dedicated teams.

Effective Alerting for a Server Monitoring

Every minute of server downtime can cost you serious revenue. 98% of organizations revealed that a single hour of downtime costs them over $100,000. The good news is that you can effectively prevent such losses with server monitoring software. Being a critical piece of your technical infrastructure, servers must be continuously tracked for their performance, and health. Efficient server monitoring lets you resolve issues before they become too critical.

Continuous Deployment explained in code

Don Brown, CTO/Co-founder of Sleuth and ex-Atlassian Architect, shows what Continuous Deployment is and how to we use it to build and deploy Sleuth, itself a deployment tracker. It steps through the CircleCI and Fabric configuration files and code that takes each commit to master and puts them through staging and production environments automatically.

Smart Cities: Cars, Roads & Mobility

This is the third blog post in a series on “Smart Cities and Urban Environments” and the implications for networks & telecoms. About 55% of the world’s population lives in urban areas; for developed OECD countries the figure is about 80%. Urbanisation is good for economic and even environmental reasons, but brings challenges for transport, roads and personal mobility*.

How open source solutions help the U.S. Air Force accelerate software development and modernize collaboration

The pressure to ship quickly is greater than ever before. But for many organizations, including the U.S. Air Force, security and compliance concerns severely limit their ability to quickly adopt and integrate new technologies, putting teams at risk of being locked into approved vendors and missing out on critical innovations. In order break the cycle of slow-moving development, Platform One, the U.S.

All About Trust

One of the biggest roadblocks for getting anyone to listen to what you want them to do is trust, or more accurately, a lack of trust. You could say we’re facing an unprecedented trust deficit in every aspect of life due to the COVID-19 pandemic. Who can we trust to tell us what to do? And can we trust them to do the right thing? This lack of trust can even make us question the motives of those whom we may have trusted in the past.