Operations | Monitoring | ITSM | DevOps | Cloud

Linux

Migration Path to Linux Container Orchestration Keynote Sizzle - Ubuntu Masters

Roblox moved its game servers from Windows to Linux to reduce costs and create a better player experience, including the migration to containerised workloads. Rob Cameron, Technical Director for Cloud Services at Roblox, gives an overview of his keynote discussion from Ubuntu Masters.

Netflix talks about Extended BPF: A new software type

Extended BPF is a new type of software and the first fundamental change to how kernels are used in 50 years. Major companies like Netflix and Facebook already use it. In this talk given at Ubuntu Masters Conference, expert Brendan Gregg, Senior Performance Engineer, Netflix Performance and OS Team, explores the past, present and future of BPF, and describes use cases.

Canonical and IBM on Technology Enablers for Financial Services

Security is critical for both the public cloud and private infrastructure stories. A Linux based application stack on IBM Z and LinuxONE infrastructure provides unrivaled security. Ubuntu is found in 2/3 of all clouds, and represents the majority of the growth workloads from legacy to cloud environments. Learn more about IBM infrastructure running on Ubuntu.

CentOS 8: a clone that reinvents itself

It has taken much longer than usual for the CentOS team to provide us with a new version of their operating system; however, the wait is over. The new CentOS 8 is here. CentOS, or Community ENTerprise Operating System, is a binary-level clone of the RHEL (Red Hat Enterprise Linux) distribution that can be accessed for free. For those unfamiliar with Red Hat, Red Hat offers open source, enterprise-oriented software solutions with enterprise-level support.

A catastrophic flaw in Linux sudo command with a simple fix using Desktop Central

A critical vulnerability in sudo has been disclosed, that when exploited, enables users to bypass security restrictions and execute commands as the root user. This security flaw has to be swiftly remediated as sudo is one of the most integral and commonly used functionalities in Linux operating systems.

How to detect CVE-2019-14287 using Falco

A recent flaw, CVE-2019-14287, has been found in sudo. In this blogpost, we are going to show you how to use Falco or Sysdig Secure, to detect any exploit attempts against this vulnerability. sudo allows users to run commands with other user privileges. It is typically used to allow unprivileged users to execute commands as root. The issue exists in the way sudo has implemented running commands with an arbitrary user ID in versions earlier than 1.8.28.

How to Do Effective Infrastructure Monitoring for Linux with Grafana

Grafana Labs has 8+ clusters in GKE running 270 nodes of various sizes, and all the hosted metrics and hosted log Grafana Cloud offerings are run on 16-core, 64-gig machines. At the recent All Systems Go! conference in Berlin, David Kaltschmidt, Director, User Experience, gave a talk about what monitoring these clusters and servers looks like at Grafana Labs and shared some best practices.