All Resources

Showing the most recent resources. The latest one is from 2019-12-03.
  • Automation of server builds minimizes human error, ensures that environments are identical, and saves time building servers. This article from Mircea Opera demonstrates provisioning one server or multiple load-balanced servers in AWS with code.
    Article  Added by Mirch // // 7 days ago
  • In this video I highlight a few interesting updates happened in AWS in the last weeks. Among them are:
    - AWS ServiceLense;
    - ECR Image vulnerability scanning;
    - Improved EC2 instance types comparison.
    Article  Added by graffzon // // 12 days ago
  • Review Assistant is a code review plug-in for Visual Studio. Our code review tool allows you to create review requests and respond to them without leaving Visual Studio. Devart’s Review Assistant supports TFS, Subversion, Git, Mercurial, and Perforce
    Tool  Added by andreasneuman // // 19 days ago
  • Every server instance with publicly facing IP address is constantly targeted by malicious network scanning bots. Those bots are usually harmless but they can always start a DDoS attack or discover a vulnerability in your server. Additionally, they are obfuscating the SSH access logs and using up some of the server resources. In this tutorial, I will explain how to hide your AWS EC2 server from those scanners using IPv6.
    Tutorial  Added by pawurb // // about 1 month ago
  • Trackman is a command-line tool and Go library that runs multiple commands in a workflow. It supports parallel steps, step dependencies, async steps, and success checkers.
    Article  Added by Kasia66 // // 2 months ago
  • I came to cloud infrastructure engineering role from product teams of full-stack and backend development and I've noticed that one thing I miss here. In the article, you can find more about the issue and how I overcame it.
    Article  Added by graffzon // // 3 months ago
  • The "flasher" function is just a small command which flashes your screen until you press any key. It is usually put at the end of a long running process in order to indicate that the job is finished.
    Tutorial  Added by mig-hub // // 3 months ago
  • I don't know about you but each time I want to delete a remote branch in Git, I always end up looking online. Here is a function which will delete any branch, remote or local, with the same syntax.
    Tutorial  Added by mig-hub // // 4 months ago
  • You probably already know a few ways to transform variables inherited from Bash. If not, you should check them out because they are really useful. They allow you to get a substring, substitute a word for another, etc. Here are a few variable modifiers for handling paths.
    Tutorial  Added by mig-hub // // 4 months ago
  • Essentially, jobs are processes which you started from your terminal session. You see all processes with the ps command, but processes which you started from one terminal session are also in your jobs and the shell has built-in functions to operate on them and improve your workflow.
    Tutorial  Added by mig-hub // // 4 months ago
  • Since its beginnings, Google cloud has had an identity crisis. They entered the market after AWS and Microsoft and tried to find a unique angle that makes them different from the other two...
    Article  Added by Kasia66 // // 5 months ago
  • What you need to know about Kubernetes deployments to deliver your Docker containers to production.
    Article  Added by markoa // // 5 months ago
  • An Omakase approach to containerized infrastructure can be a great facilitator in growing the pie for everyone involved. Omakase vendors can navigate customer requirements without the rigidity of set menus at much lower costs than custom á la carte options provided by consultancies...
    Article  Added by Kasia66 // // 6 months ago
  • A book that introduces readers to the Apache Mesos cluster manager and the concept of application-centric infrastructure
    Book  Added by vonlatinski // // 6 months ago
  • Simple instructions on how to install Git on an Ubuntu system.
    Tutorial  Added by nickreiner // // 6 months ago
  • Setting up HA on your Kubernetes cluster is certainly the next logical step in bringing Kubernetes to the prime-time. That said, the process of configuring and maintaining the cluster still presents some challenges! I'm hopeful that advancements in the Kubernetes project will help to reduce some of those challenges in the future.
    Article  Added by Kasia66 // // 8 months ago
  • A step by step guide on how to set up secure endpoints in Kubernetes.
    Article  Added by Kasia66 // // 9 months ago
  • In microservices architecture, a Service Mesh is a set of components that act as an intermediary to intercept and redirect traffic between your services. This is useful in many scenarios from access authorization to support for canary releases, blue/green deployments and more.
    Article  Added by Kasia66 // // 10 months ago
  • New stats on orchestrator adoption (e.g. Kubernetes, ECS, Fargate) compiled from the real-world usage of thousands of companies and nearly half a billion containers.
    Article  Added by johnaxel // // 12 months ago
  • Having a Kubernetes cluster is the first step towards building a more resilient and scalable infrastructure. While building a Kubernetes cluster is becoming easier every day, building a solid deployment pipeline to deploy our applications onto can feel a bit scary. It shouldn’t be. Let’s see what we need to deploy our applications onto a cluster in a safe, secure, reliable and repeatable way.
    Article  Added by Kasia66 // // about 1 year ago
  • Containers are a great way to realize the promise of a microservices architecture, but in production, containerization is not going to work without developers’ involvement and buy-in.

    Each side of this equation (Dev and Ops) has its own vendors, tools, and open source projects to help them with what it takes to move to a containerized world—but that’s not enough.
    Article  Added by Kasia66 // // about 1 year ago
  • The article may be useful for those who either heard about these concepts but never worked with them or worked but never dived deep enough to understand the history and internals. This article reveals some of those.
    Article  Added by graffzon // // about 1 year ago
  • Google Certifications themselves stand out for their rigor and thoroughness in evaluating a candidate’s skills, with an emphasis on hands-on experience to design, develop, manage and administer application infrastructure and data solutions on Google Cloud technology.
    Article  Added by sakimjan // // about 1 year ago
  • Transform configuration files based on custom scripts. An elegant and understandable equivalent of XSLT but for JSON and YAML!

    While Alterant can be used with any JSON or YAML file, it is most useful if you use it with Kubernetes configuration files. Kubernetes configuration files describe how infrastructure resources should be deployed and configured on a cluster. However, a lot of times we find ourselves applying the same modifications to many of them.
    Article  Added by Kasia66 // // about 1 year ago
  • Manuals, instructions, how tos
    Tool  Added by zilord // // about 1 year ago
  • [Step-by-step] We've deployed a sample web service application onto DigitalOcean’s brand new managed Kubernetes service with Cloud 66 Skycap.
    Article  Added by Kasia66 // // about 1 year ago
  • With Kubernetes firmly established as the way to orchestrate container-based applications, all major cloud providers have rolled out their managed Kubernetes products - and we tested it.
    Article  Added by Kasia66 // // about 1 year ago
  • A strong trend in the world of application deployment is “build once, deploy many”—where “many” could stand for complex environments, clusters and/or clouds. This, together with the power of the Kubernetes API, easily accessed by developers, makes the need for reliable, traceable and auditable configuration files even more pertinent.
    Article  Added by Kasia66 // // about 1 year ago
  • Currently the most prominent and popular docker monitoring tools.
    Article  Added by CodeMazeBlog // // over 1 year ago
  • In the 2018 edition of this annual study, Datadog analyzes data from more than 10,000 companies to report on the adoption and usage of Docker and other container technologies. One notable finding: orchestrators like Kubernetes and ECS are now running in nearly half of Docker environments monitored by Datadog.
    Article  Added by johnaxel // // over 1 year ago