Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Explore Kubernetes resources with Datadog Live Containers

Running Kubernetes applications requires visibility into not only the overall performance of clusters but also the health of individual pods, deployments, and other resources that make up your environment. Datadog already integrates with your containerized environments and includes features like the Live Container view and the Container Map, enabling you to easily monitor Kubernetes and container runtime performance in real time and get deep visibility into clusters.

6 Steps to Increase DevOps Velocity

Many organizations are looking to implement DevOps due to the promise of increased release velocity, better developmental agility, and the ability to free up time for developers to focus on innovation. However, adopting DevOps isn’t a panacea— instead, the idea of communication, collaboration, and blameless retrospectives that a DevOps model encourages can help foster a leaner system where bottlenecks are solved in a manner that not only fixes the problem, but also improves the process.

MicroK8s HA

MicroK8s is Canonical’s lightweight Kubernetes, that allows for Kubernetes to be installed on any machine in under 60 seconds. Initially, microK8s was a single K8s cluster project, however as users grew to love this easy-to-deploy distribution, Canonical now enables them to create small K8s clusters for higher scalability. Watch this video to witness yourself how easily you can run a command, create your K8s cluster, and run it in an instance using microK8s.

Hybrid Cloud Kubernetes: Connecting the dots with Azure Arc-enabled Kubernetes

Canonical has recently teamed up with Microsoft, to enable Kubernetes users to manage multiple K8s clusters from a single platform - Azure Arc. Even if you’re not a Microsoft user, you can attach any on-prem or public cloud Kubernetes cluster to Arc, and manage them from a centralised point. In this demo, watch how to administrate multiple and different K8s clusters with Canonical’s distributions of Kubernetes and Arc.

What your company can learn from the Bank of England's resilience proposal

Learn how to modernize your financial systems with confidence while mitigating risk (and meeting compliance). This article was originally published on TechCrunch. The outages at RBS, TSB, and Visa left millions of people unable to deposit their paychecks, pay their bills, acquire new loans, and more.

Additional deployment environments for Bitbucket Pipelines

Bitbucket Pipelines provides teams with a one-stop solution to build, test, deploy and track their code, without ever leaving Bitbucket. Developers and release managers can easily track and visualize deployments, while non-technical teams can have visibility into what features are coming down the pipeline.

Migrate NGINX from "stable" Helm Charts Repo with ChartCenter

For the last four years, anyone wanting to deploy the Ingress NGINX Controller for Kubernetes would find its official Helm chart nginx-ingress in the stable repository maintained by the Helm project. Those days are over. And not just for NGINX, the most popular Ingress Controller used as a reverse proxy and load balancer, but for all open-source K8s apps. With the advent of Helm 3, the Helm project is deprecating the stable repositories.

Installing the HAProxy Kubernetes Ingress Controller using Helm

Helm, the Kubernetes package manager, revamps the way teams manage their Kubernetes resources and allows them to deploy applications in a consistent and reliable way. It is a valuable tool in a continuous delivery pipeline, with support for quick updates and rollbacks. At HAProxy Technologies, we offer Helm as the preferred method for installing the HAProxy Kubernetes Ingress Controller, and we’ll show you how to customize that installation to fit your use case.

Use HAProxy Response Policies to Stop Threats

HAProxy gives you an arsenal of sophisticated countermeasures including deny, tarpit, silent drop, reject, and shadowban to stop malicious users. There are two phases to stopping malicious users from abusing your website and online applications. Step one is detection, step two is deploying countermeasures. HAProxy is more powerful than nearly every other load balancer when it comes to both detection and countermeasures.

Accidental Cloud Administrator

Accidental DBA is a term most IT pros are familiar with, and traditionally it describes an “on-top task” for the SysAdmin. It was followed by the “involuntary security admin,” a task carried out by network admins, as back in the days it was all about securing the perimeter. Now there are the clouds, but whose responsibility is it? Surely the SysAdmin again, as it’s just about infrastructure? But then there’s VPNs and BGP and load balancers—network territory!