Operations | Monitoring | ITSM | DevOps | Cloud

November 2021

Take your data to the cloud and chill - with Aiven!

Aiven’s fully managed data solutions take the pain out of cloud infra – everything is already set up for you. Just select the services and tools you need, pick a cloud provider and your storage needs, and you’re good to go. You can deploy a cluster in under 10 minutes. We offer rock solid, reliable, open source data infra – with no hidden costs. Pick and choose from Apache Kafka, Apache Cassandra, PostgreSQL, MySQL, OpenSearch, Redis, InfluxDB, M3 and Grafana in more than +100 regions around the world on AWS, GCP, Microsoft Azure, DigitalOcean, and UpCloud platforms.

Cluster Info

The Aiven Cluster startup program offers $100,000 credit to help you build your data infrastructure using Aiven services, and technical expertise to help your startup grow – fast. Aiven Cluster helps you grow your business by taking away all your data infrastructure worries so you can focus on the stuff that really matters – building your dreams.

Linux Mint vs Ubuntu: Who will win?

Linux is an open-sourced operating system for computers, smartphones, servers, mainframes, and embedded devices. The main advantage of Linux over other operating systems is that Linux is an open-source operating system, which means that you can view, edit, customize, enhance, and share the code with anyone. The release of Linux garnered a huge community of contributors that created a variety of features and distributions for users at no added cost.

History of Open Source Identity Management (part 2)

This is the second blog post (part 1 available here) where we look at the history of open source identity management. This post focuses on Oauth and OpenID, the protocols currently used in modern applications and services. This post does not cover the technical details of the open source identity management standards, which are explained very well in this Okta blog post. Rather, it explains the origins of Oauth and OpenID, and provides insights on the context that led to their creation.

Logz.io Moves to Embrace OpenSearch at the Core of its Platform

As Logz.io prepares to hold its annual ScaleUP user conference tomorrow, celebrating another amazing year of customer success and continued advancement of our observability platform, we’ve got exciting news to share about our involvement with the OpenSearch project.

Understanding Alamofire Swift and Why is it So Powerful for iOS Development

The Alamofire Swift library is an open-source networking framework that has been designed to add the functionality of networking to iOS and macOS apps, being compatible with both. It can be used in both open source and commercial projects, and it is also the result of an international collaboration between people who are passionate about Swift. The main goal of this library is to reduce the amount of time and code that developers need in order to create networking applications.

History of Open Source Identity Management (part 1)

Few computing concepts are as ubiquitous as identity and access management. There isn’t a single day that goes by without us being asked for credentials, passwords or pin codes. Yet very few know the origins and the evolution of the technologies behind them. This is the first of two blog posts where we will look at the history of open-source identity management. We will cover the main open-source protocols and standards that shaped it, from its origins to the modern days.

Open Source for Better Observability

Monitoring cloud-native systems is hard. You’ve got highly distributed apps spanning tens and hundreds of nodes, services and instances. You’ve got additional layers and dimensions—not just bare metal and OS, but also node, pod, namespace, deployment version, Kubernetes’ control plane and more. To make things more interesting, any typical system these days uses many third-party frameworks, whether open source or cloud services.

Securing the Open-Source supply chain with Ubuntu Pro on Google Cloud

It’s official: since the outbreak of the COVID-19 pandemic, cybercrime has increased by 600%. Among these, ransomware attacks are estimated to cost $6 trillion in 2021 alone. And there were nearly 550,000 ransomware attacks per day in 2020. The question is: are your workloads secure enough? In this blog, we will discuss how to make your Open Source workloads more secure in one second.