Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Distribute ROS 2 across machines with MicroK8s

Our simple ROS 2 talker and listener setup runs well on a single Kubernetes node, now let’s distribute it out across multiple computers. This article builds upon our simple ROS 2 talker / listener setup by running it on multiple K8s nodes. At the completion of this setup expect to have a ROS2 Kubernetes cluster running MicroK8s on three different machines. Applying a single configuration file distributes the ROS 2 workload across the machines.

6 Myths of DevOps

Have you ever heard someone say "no one has the same definition of DevOps." While the definitions of DevOps principles and DevOps practices are pretty clear, there is a lot of myths and subjectivity in how the principles play out in the real world. In this episode of Dissecting DevOps, Dave and Chris debunk six common DevOps Myths. Dave McAllister and Chris Riley are DevOps Advocates at Splunk. Follow them on Twitter at @dwmcallister​ and @hoardinginfo.

How to Choose your Monitoring Solution

When we talk about IT support in an organization, it’s not only about resetting passwords or fixing desktops and printers. The most important task for your IT staff is to regularly monitor your network for any emerging issues or threats, and respond on time to ensure that the problem does not interfere with your productivity. However, in an age of growing networks and small budgets, it’s a challenging task that is not easy to handle manually at all times.

Secure Chaos Engineering on Kubernetes Clusters Without being a Noisy Neighbor

Get started with Gremlin's Chaos Engineering tools to safely, securely, and simply inject failure into your systems to find weaknesses before they cause customer-facing issues. Kubernetes is a powerful open source platform to build scalable, reliable systems, designed to be extensible and customizable for many use cases. Kubernetes provides the ability to scale individual pods, swap out runtimes, and control access to objects using namespaces.

HAProxy Log Sampling

Log Sampling is a powerful feature introduced in HAProxy 2.0 that lets you define a percentage of your logs to create a representative view of your data allowing you to minimize your costs. Log files are the key to observability. They can provide helpful information that can be used for debugging as well as analytics that can be used to understand how users interact with an application.

Scale Your Devops With High Availability And Replication

As your development teams grow and you expand to different geographies, you will need a DevOps solution to help you scale and support your geographically distributed teams. This webinar will discuss the key benefits of upgrading to an enterprise grade solution and best practices in setting up your network for multi-site replication, high availability, load balancing, and scaling your storage needs as your business grows. Learn how to manage your artifacts and dependencies with the industry leader in universal binary management as your single source of truth and to secure your binaries.

Introducing AI-Assisted Workflows and Automation-Grade Grouping

Imagine you’ve been working on a new feature for weeks. Finally—after exhaustive QA and testing, and more late coding sessions than you care to count—you release with a feeling of both accomplishment and relief. Only to be woken up at 3am that something’s wrong. Or worse, you get flooded with customer complaints that it’s not working properly. Well, it’s probably a scenario you don’t need to imagine. Every developer has a version of this story to tell.

Introducing Rancher on NetApp HCI: Hybrid Cloud Multicluster Kubernetes Management with Push-Button Ease

If you’re like me and have been watching the odd purchasing trends due to the pandemic, you probably remember when all the hair clippers were sold out — and then flour and yeast. Most recently, you might have seen this headline: Tupperware profits and shares soar as more people are eating at home during the pandemic. Tupperware is finally having its day. But a Tupperware stacking strategy is probably not why you’re here.

NeuVector & JFrog - Integrating Container Security To Accelerate Your CI CD Pipeline

Container security must shift both left and right to protect environments across the full application lifecycle – from the beginning of development through production. In this webinar, we will discuss how the integration of JFrog Xray and NeuVector can provide you with the best Container protection while improving productivity.