Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

What's Cool in Rancher 2.5? A Partner Perspective from SVA

Since 2014, Rancher Labs has been making it easier for IT professionals to handle containers. Until now, every release of their flagship product, Rancher, brought features that you wouldn’t want to be without. But the latest releases have really taken things up a few notches.

Embracing virtual connections at AWS re:Invent 2020

Get started with Gremlin's Chaos Engineering tools to safely, securely, and simply inject failure into your systems to find weaknesses before they cause customer-facing issues. This year has seen a complete re-imagining of tech conferences. Some were cancelled or postponed, while others have evolved and embraced the opportunity to go virtual. This meant innovating to bring the in-person event experience online.

Deployment Rollbacks via FireHydrant Runbook

FireHydrant has a sophisticated set of response actions for coordinating communications, activities, and retrospectives for incidents that affect your services. Relay helps by automating remediations that involve orchestrating actions across your infrastructure. In this example workflow, an incident that affects an application deployed on Kubernetes can trigger a rollback to a previous version automatically.

Cloud services

Cloud computing is transforming the way businesses work. Enterprises can build, perform, and develop their business and manage operations all from the cloud environment. Cloud technology to reduce operational costs, innovating capabilities, and achieving business objectives at a swift pace. Cloud consulting at ZiniosEdge assists the business with decision making, working upon solutions, cloud management, cloud enablement, cloud migration, and technical business decisions as well. All these factors accomplished help in achieving your determined business objectives.

Target, Track and Trace your Vulnerabilities

Lock your sights on the black box hiding untold vulnerabilities in your repository and shine a light inside to find out what monsters lurk within. Yes, I'm talking about running on-demand security scans against supported packages within your repository. If you are a Velocity or Ultra customer, you can start making use of security scanning today!

Canonical publishes LTS Docker Image Portfolio on Docker Hub

November 24th 2020: Canonical has published the LTS Docker Image Portfolio, a curated set of secure container application images, on Docker Hub. The LTS Docker Image Portfolio comes with up to ten years Extended Security Maintenance by Canonical. “LTS Images are built on trusted infrastructure, in a secure environment, with guarantees of stable security updates,” said Mark Lewis, VP Application Services at Canonical.

Secure your infrastructure in real time with Datadog Runtime Security

From containerized workloads to microservice architectures, developers are rapidly adopting new technology that allows organizations to scale their products at unprecedented rates. In order to make sense of these complex deployments, many teams are abstracting applications away from the environments in which they run. Because of this trade-off, developers and security teams lose the access to the unified context from infrastructure to application needed to fully secure their services.

Console Connect by PCCW Global delivers on-demand private network connectivity to RingCentral's global unified communication services

PCCW Global, a leading international communications service provider, today announced a new collaboration with RingCentral, a leading provider of cloud-based unified communications, collaboration, and contact center solutions for global enterprises, to provide on-demand private network connections to RingCentral's global unified communication services.

DockerHub vs Cloudsmith Private Docker Registry

We’re a little late to the party. Fashionably late. By now the world knows that DockerHub has removed the free, untraceable goodness of anonymous pulls. How dare they? How dare they build a revolutionary technology, open-source it and give it away for free at a substantial cost to themselves. It’s worth calculating what a couple of petabytes of CloudFront bandwidth would cost, even with a substantial discount. It’s mind-blowing.

Exploring ROS 2 Kubernetes configurations

Kubernetes and robotics make a great match. However, as we have seen, robots running ROS 2 can be tricky to set up on Kubernetes. This blog series has explored running ROS 2 on Kubernetes, set up a simple talker and listener, and distributed that demo across three machines. The configurations presented may not quite fit your implementation, and you may want to dig a bit deeper into network traffic when troubleshooting.