Operations | Monitoring | ITSM | DevOps | Cloud

Set up Let's Encrypt TLS Encryption using the HAProxy Kubernetes Ingress Controller

When it comes to TLS in Kubernetes, the first thing to appreciate when you use the HAProxy Ingress Controller is that all traffic for all services traveling to your Kubernetes cluster passes through HAProxy. Requests are then routed towards the appropriate backend services depending on metadata in the request, such as the Host header. So, by enabling TLS in your ingress controller, you’re adding secure communication to all of your services at once. HAProxy is known for its advanced support of the important performance-oriented features available in TLS.

Securing and Monitoring AWS Container Services

Developers, operations, and security teams must work together to address key workflows to secure and monitor containers, Kubernetes and cloud services across the entire cloud-native lifecycle. By addressing mage scanning, runtime security, and compliance, along with monitoring for Kubernetes, container, applications, and cloud services you can automate protection and performance management to accelerate cloud adoption.

Top 3 Things to Consider When Selecting a Log Analysis Platform

Effective log analysis can help you significantly reduce the time spent investigating and troubleshooting incidents. With the many different log analysis platforms available, it can be overwhelming to choose and difficult to know what to look for. In this short guide, we’ll share the top three things you should consider when selecting a log analysis platform for your business.

What is an inode and what are they used for?

Inodes, speculated to be short for “index nodes,” have been around since the introduction of the first UNIX file system around the late 1970s. They were adopted into Linux in the 90s—and for good reason. They’re an excellent way to keep track of how your files are stored, and the method many systems are still based on today.