Operations | Monitoring | ITSM | DevOps | Cloud

Authenticate Puppet Enterprise with FreeIPA using LDAP

Using a Linux Domain controller such as Red Hat Identity Management or FreeIPA? If so then the fields are a bit different than some other LDAP interfaces, which makes it difficult for some to connect to for authentication. Here is a quick how-to on setting up Puppet Enterprise with authentication from FreeIPA. I am assuming that you already have Puppet Enterprise installed with eyaml configured. If not, then you may want to visit these prerequisites.

August 2020 Online Meetup - Rancher 2.5 Preview - EKS Lifecycle Management

Hosted cloud provider Kubernetes services like EKS alleviate the operational burden of Kubernetes. The cluster operator is still responsible for upgrades and all the day 2 operations for the applications running on the cluster. In this meetup we'll discuss how Rancher can help manage the lifecycle of EKS clusters, and will walk through importing existing and provisioning new EKS clusters through Rancher. We will also look at how to deploy Rancher logging and monitoring onto the cluster to handle day 2 operations on the cluster.

How to Implement Network Policy in Amazon EKS to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Amazon EKS solution to this security concern is Network Policy that lets developers control network access to their services. Amazon EKS comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

RampChats: IT Leadership in 2020 | Varma Kunaparaju, OpsRamp CEO

There’s never been a better time for sharp and compassionate leadership than the year 2020. IT leaders everywhere are rethinking plans and investments on the fly. Digital initiatives are continuing, although through a more targeted, tactical lens. Meanwhile, infrastructure resiliency and workforce productivity are key enablers to thrive and survive. Join us for a conversation with OpsRamp CEO Varma Kunaparaju to discuss these integral IT leadership topics along with a look at key IT operations management trends.

Azure Durable Functions CI/CD Issue Solved!

This blog explains a peculiar issue faced when Azure Durable Functions are deployed using Azure DevOps. In case you need to know what Azure Durable Functions are, please refer to Microsoft’s documentation on Durable Functions here as the explanation of it, is not under the scope of this blog. Durable functions work best when built with versions .NET Core 2.2 and above. After developing and testing a durable function, it can be deployed to Azure in many ways.

Django and the N+1 Queries Problem

The N+1 Queries Problem is a perennial database performance issue. It affects many ORM’s and custom SQL code, and Django’s ORM is not immune either. In this post, we’ll examine what the N+1 Queries Problem looks like in Django, some tools for fixing it, and most importantly some tools for detecting it. Naturally, Scout is one of those tools, with its built-in N+1 Insights tool.

Creating Memorable Gaming Experiences with Kubernetes

If you’re a gamer, you probably know how immersed you can get in your favorite game. Or if you’re the parent or partner of a gamer, you probably know what it’s like to try to get the attention of someone who is in “gaming mode.” Creating worlds and enriching players’ lives is in Ubisoft’s DNA.

What's New with Logz.io Cloud SIEM - August 2020

We have been busy adding new features to our growing list of abilities. Logz.io Cloud SIEM is no exception. Throughout 2020 we have been enriching our security incident and event management tool, refining threat intelligence, adding new dashboards, and improving the user experience to ensure there’s an eagle’s-eye view of the security challenges that organizations face. Here are a few of those updates that we have recently put to production.

Logging Best Practices: From Simple to Space Age

It is tempting to consider logging as a simple, solved problem. We write a log, check our file and, boom, we’ve cracked it. Yet those of us who have sat up at three in the morning, trawling through log files over an unreliable SSH connection, know that this is simply not enough. As your system scales, so too must the sophistication of your tooling. Your logging best practices must be scalable and ready to support your efforts.