ARTICLES

  • SRE: From Theory to Practice: What’s Difficult About Tech Debt?

    In episode 3 of "From Theory to Practice," Blameless’s Matt Davis and Kurt Andersen were joined by Liz Fong-Jones of Honeycomb.io and Jean Clermont of Flatiron to discuss two words dreaded by every engineer: technical debt. So what is technical debt? Even if you haven’t heard the term, I’m sure you’ve experienced it: parts of your system that are left unfixed or not quite up to par, but no one seems to have the time to work on. Pretend your software system is a house. Tech debt is the leak in your sink that you’ve haven’t gotten around to fixing yet. Tech debt is the messy office you haven’t organized in a while. It’s also the new shelf you bought but haven’t installed. To-do’s quickly build up over time. Even if certain tasks are quick, there are just so many of them that it’s tough to know where to start.

  • 10 Best Infrastructure-as-Code Tools for Automating Deployments in 2022

    IT technologies continue to evolve at an unprecedented pace. From cloud computing to DevOps and artificial intelligence (AI) to internet of things (IoT), the technology landscape has unlocked potential opportunities for IT businesses to generate value. The enterprise IT infrastructure has become crucial for modern-day digital business. It is because it facilitates the compute, network and data capabilities required to run business-critical software applications. The key role of infrastructure goes beyond production environs. It spreads across the complete development process. The infrastructure includes a host of components including servers, load balancers, firewalls, and databases. They also include DevOps tools, CI/CD platforms, staging environments, and testing tools. But there’s a catch here.

  • Back to Basics: Accessing Kubernetes Pods

    Kubernetes is a colossal beast. You need to understand many different concepts before it starts being useful. When everything is set up, you'll probably want to expose some pods to the outside of the cluster. Kubernetes provides different ways to do it: I'll describe them in this post. Setup For the sake of the demo, I'll be using kind:

  • Monitoring Blind Spots in the Cloud and What to Do About Them

    Cloud adoption is growing because it comes with many advantages—like easy provisioning of new resources when there’s demand for it. Plus, there are generally short-term money savings as well. The cloud is more than just SaaS; there are lots of third-party providers that use the cloud—including DNS, CDNs, and APIs.

  • How To Migrate From ECS to EKS and the #1 Trick To Make EKS Easier

    Migrating from Amazon ECS to EKS is probably the last thing you want to spend your time on; yet, you’re here. It’s likely that ECS hasn’t been serving you fully, or perhaps you’re curious if you should start planning the migration and how long will it take. I’ll try to answer most of your questions, starting from whether you should look at EKS at all to some practical migration and EKS management tips for when you’ve made your decision.

  • Shared Kubernetes Clusters for Hybrid and Multi-Cloud

    Now more than ever, hybrid and multi-cloud deployments are quickly becoming key enterprise requirements. As Kubernetes adoption in an enterprise grows, effectively managing multicluster deployments becomes increasingly critical to application delivery. To bring Kubernetes usage and hybrid/multi-cloud infrastructure together, IT organizations need a modern operating model for shared K8s clusters in hybrid and multi-cloud architectures. The impetus for choosing enterprise hybrid and multi-cloud deployment varies, but the challenges and opportunities remain regardless of an organization’s infrastructure journey. Whether purposefully undertaken as an IT strategy or as the result of prior infrastructure investment, many IT leaders are discovering the benefits of using more than one infrastructure approach simultaneously. Container orchestration, in many respects, is the next logical step. Managing Kubernetes in a hybrid and multi-cloud context, however, comes with unique challenges.

  • Difference Between Data Mining and Data Warehousing

    Data mining and warehousing are two processes essential for any organization that wants to be recognized on a global or national level. Both techniques help prevent data fraud and improve managerial statistics and rankings. Data mining is used to detect significant patterns by relying on the data gathered during the data warehousing phase. Data mining and data warehousing are both considered as part of data analysis. But they work in different ways. This blog will look at the differences between the two and whether or not one can exist without the other.

  • Monitoring at the Edge of the Third Act of the Internet

    Whether you’re in tech, media, retail, or any other business with or without a digital presence, the biggest challenge you are facing is how to deliver something to the last mile. If I own a grocery store, while it’s easy for me to have a big warehouse where I store and sell goods, no one will drive there if it’s not convenient. This is the reason why stores are located close to their customers — so anyone can stop on their way home and pick up their weekly groceries. The biggest challenge for everyone has been how to deliver any product or service as conveniently and as fast as possible to the end user. Amazon has disrupted the retail industry with its "same day" delivery, setting a very high bar for "last mile" delivery. Along the same lines, their acquisition of Whole Foods Market shows that they see a big opportunity in disrupting the perishable goods industry by streamlining its delivery chain and offering a more convenient experience for getting weekly groceries. Given the above examples, it is apparent that "edge" is not just a term for the computing industry — the concept is applicable to all customer facing industries.

  • Verizon’s Data Breach Report: Cloud Security Insights

    * All quotations and images are sourced from Verizon 2021 Data Breach Investigations Report. For the past 14 years, telecommunications services provider Verizon has published an annual report that analyzes the security incidents and data breaches of the previous year. The Verizon Data Breach Investigations Report (DBIR) presents findings by attack type, industry, vulnerability, and more, and provides insights into global changes taking place in the cybersecurity sphere.

  • Amazon Lightsail: Virtual Cloud Server

    Amazon Lightsail, launched in 2016, is essentially a virtual private server (VPS) that offers you everything needed to deploy an application or website in a cost-effective and easy-to-understand manner. It is a basic service, but extremely convenient. It is designed for customers, developers, small businesses, or startups to get quickly started in AWS. It reduces the learning curve in the beginning, and users can later adopt the broad AWS Services as they get more familiar with the AWS cloud and/or solution workload increases.

  • SRE: From Theory to Practice: What's Difficult About Incident Command?

    A few weeks ago, we released episode two of our ongoing webinar series, "SRE: From Theory to Practice." In this series, we break down a challenge facing SREs through an open and honest discussion. Our topic this episode was “What’s difficult about incident command?” When things go wrong, who is in charge? And what does it feel like to do that role? To discuss, Jake Englund and Matt Davis from Blameless were joined by Varun Pal, Staff SRE at Procore, and Alyson Van Hardenburg, Engineering Manager at Honeycomb. To explore how organizations felt about incident command, we asked about the role on our community Slack channel, an open space for SRE discussion. We found that most organizations don’t have dedicated incident commander roles. Instead, on-call engineers are trained to take on the command role when appropriate. Because of this wide range of people who could end up wearing the incident commander hat, it’s important to have an empathetic understanding of exactly what the role entails.

  • A Concise Guide to DevSecOps and Their Importance in CI/CD Pipeline

    Leveraging continuous integration and delivery (CI/CD), many businesses today automate the software development life cycle. CI/CD is a part of the DevOps process, which aims to accelerate software development while minimizing errors. Continuous delivery automates the entire software release process up to production, whereas continuous integration produces and tests code automatically. However, security still possesses a significant concern. That brings us to the critical question, why is security a primary concern? CI/CD pipeline enhances your software development capabilities by providing several benefits.  These include fewer code modifications, a shorter mean time to fix issues, more reliable tests, quicker release cycles, a lower backlog of products, and more customer satisfaction.

  • 7 Great Terminal/CLI Tools Not Everyone Knows

    Do you work frequently work with the CLI? Whether you use Windows, macOS, or Linux, in the video below, you'll learn 7 tools that I frequently use: exa, Clink, rg and rga, plocate, bat, jq, and f**k. What’s in the Video? The video gives a short overview of how to use the tools mentioned above work. In order of appearance:

  • Kubernetes Data Simplicity: Getting Started With K8ssandra

    You might have heard about the K8ssandra project and want to start contributing, or maybe you want to start using all of its features. If you aren’t familiar with K8ssandra (pronounced like “Kate Sandra”), you can read this overview before digging into the developer activities in this post. In a nutshell, K8ssandra is an open-source distribution of Apache Cassandra™ for Kubernetes, which includes a rich set of trusted open-source services and tooling. K8ssandra comes with handy features that are baked-in and pluggable, which allows for flexible deployment and configuration.

  • Developing a Cloud Adoption Strategy

    The value of technology in businesses and organisations cannot be underestimated, and there was nothing like the COVID-19 pandemic for us to see its value first-hand.  Overnight, the way we interact with and operate businesses was forcefully changed forever, effectively accelerating our journey towards digitally transforming our organisations. According to a 2020 McKinsey report, companies were able to adopt digital changes 20-25 times faster than they would have anticipated.

  • What You Need to Know to Debug a Preempted Pod on Kubernetes

    The purpose of this post is to share some thoughts on the management of a Kubernetes platform in production. The idea is to focus on a major problem that many beginners encounter with this platform, namely: the management of preempted pods. What Is a Preempted Pod? Preemption is a famous nightmare on every orchestration platform, this is not something dedicated to Kubernetes, but several aspects of this platform can be the root cause of an unexpected preemption. 

  • What Is Cloud Storage: Definition, Types, Pros, and Cons

    What exactly do tech-savvy individuals and internet users mean when they say files have been moved to the cloud? Do all files go to private cloud storage? Is there an invisible storage device that only developers and data scientists can access? Where is the cloud? This article on cloud storage is typical to a beginner's compass and will serve as a reference resource for anyone seeking sufficient knowledge about the cloud. 

  • Top 5 Datadog Integrations To Improve the Efficiency of Tech Teams

    Datadog is an exceptional tool for DevOps teams, developers, and SREs. It's suitable for a broad range of cloud applications of every size. However, despite its powerful capabilities, most businesses aren't making the most of Datadog. Are you? Can you see how newly launched features are affecting user experience? Can you immediately see the root cause of an issue on your dashboard – without digging around?  Are you managing Jira tickets directly in Datadog? Datadog’s integrations help make the platform stand out, but using them to make Datadog more powerful can be confusing, as there are over 500 interesting tools to consider.

  • The Need for a Kubernetes Alternative

    Kubernetes has become a household name for container orchestration. There is no denying that it has risen to become an ideal solution for many developers. But is Kubernetes truly flawless? On the contrary, you can go from being enthusiastic about the possibilities Kubernetes offers to being frustrated trying to resolve the many issues that come up along the way. This is why an increasing number of organizations have begun to look for more easy-to-use Kubernetes alternatives. This article highlights the need for these alternatives and puts forward a strong contender to replace Kubernetes. Source: Pixabay

  • Observability Tools Help Catch Application Failures — But Automating the Observer Is Becoming Crucial

    A modern-day blessing for Site Reliability Engineers (SREs) entreats, “May the queries flow, and the pager stay silent.” This is because SREs, DevOps engineers, or support staff are constantly stressed about responding to their alert channels while keeping an eye on operational and performance dashboards to ensure their users have a good experience. Many frontline engineers are glued to dashboard monitor screens laid out in front of them. Assessing and responding to alerts is a top priority. This approach involves both the observability tool and the observer, and they both have crucial roles. While various golden signals are continually monitored on the observability dashboards, it is up to the observer to provide the evaluation and intelligence to piece together details and know when and how to respond. This is especially apparent when there is some kind of problem. The observer has to determine what to drill down on and then where to go next in order to find the root cause. The observer is decidedly not automated, and there are finite limits to what they can take in and consider in their observations to develop proper context, validation, and, ultimately, to understand the root cause of a problem.

  • Everything You Need to Know About Cloud Automation in 2022

    The cloud has changed the way we work. But it hasn't changed everything: certain industries still require onsite IT support. Businesses that depend on legacy systems, like manufacturing or banking, are often left scrambling for solutions. As technology evolves and progresses, the need to have a plan in place will become more crucial.  To make your life easier when it comes to running a business, you can use a service known as cloud automation. It is a service where you can use applications from the cloud to automate various things. Let's check out what cloud automation is.

  • SRE From Theory to Practice: What's Difficult About On-Call?

    We wanted to tackle one of the major challenges facing organizations: on-call. "SRE: From Theory to Practice - What’s Difficult About On-call" sees Blameless engineers Kurt Andersen and Matt Davis joined by Yvonne Lam, staff software engineer at Kong, and Charles Cary, CEO of Shoreline, for a fireside chat about everything on-call.  As software becomes more ubiquitous and necessary in our lives, our standards for reliability grow alongside it. It’s no longer acceptable for an app to go down for days, or even hours. But incidents are inevitable in such complex systems, and automated incident response can’t handle every problem.

  • Debugging a Wordle Bug

    I have a confession: I'm addicted to Wordle. Especially now that it's out of style and people don't post about it. I love that it's short, I can solve one word, and then it's gone. I don't feel bad about the addiction and wasting my time with any game. This cloud debugger tutorial is an enormous challenge for me since the target is a Wordle game. But I'm getting ahead of myself. As part of the Lightrun Playground, we recently released we needed a demo application that will let developers who are new to Lightrun, practice in a "safe environment".We decided to pick Wordle as our demo application because it's instantly familiar, visual, and not too interactive. A Flappy Bird demo might have been painful to debug. At this point, our key challenge was in creating a bug where the debugging process would be interesting enough and yet subtle enough so it won't be instantly obvious.

  • Upgrading Kubernetes Clusters With Cluster API on Oracle Cloud

    In this post, I’ll cover an awesome feature of Cluster API: the ability to do a rolling upgrade of your Kubernetes cluster. Cluster API makes it simple, and repeatable. I’ll be totally honest, I’ve manually upgraded a Kubernetes cluster, it wasn’t the end of the world, but I’m a lazy hacker so why do it manually when I can automate it and have the safety of repeatability?

  • Common Mistakes to Avoid When Migrating

    For enterprises, being able to migrate thousands of applications is an inevitable part of staying competitive. Figuring out how to achieve a successful migration is scary so let’s dive into the pitfalls to avoid. COVID-19 has created both a technical talent shortage combined with an increase in demand for accelerated technical timelines. Many companies are starting to face a “Red Queen” effect, where companies are having to re-define how and where they are competing in the market to ensure they remain relevant. Today businesses that remain complacent are rewarded with a biting disadvantage and a perpetual catchup cycle. Migrations from incumbent technologies to more responsive and cost-effective solutions are a significant part of any enterprise’s metamorphosis; however, it can be fraught with pitfalls for the unprepared.

  • Cloud Tagging Strategic Practices

    The hype around cloud cost optimization is soaring high along with cloud adoption. According to NASSCOM, enterprises are expected to increase their cloud budget by nearly 5-15% CAGR till FY 2025.  “The wider the cloud adoption, the more complex is the cloud cost management”

  • Install Anypoint Flex Gateway on the Kubernetes as an Ingress Controller in Connected Mode - Part 3

    In my last blog, we have a walkthrough on how to set up Flex Gateway on Minikube as an Ingress controller in the Connected Mode and how to publish the APIs to the Flex Gateway and access those APIs via Ingress on HTTP. In this blog, we will walk through how to implement TLS on the ingress and enable ingress to receive only HTTPS traffic. Before we start implementing the TLS on the ingress, we will be requiring the private key and public key in base64 format. Either we can use a Self Signed certificate or a CA-signed certificate. 

  • The Best Infrastructure as Code Tools for 2022

    Customer: Can we exchange our systems? System Admin: Why do you want to exchange your system?

  • Install Anypoint Flex Gateway on the Kubernetes as an Ingress Controller in Connected Mode - Part 2

    In my last blog, we saw how to set up Flex Gateway on Minikube as an Ingress controller in the Connected Mode and here we will see how to publish the APIs to Flex Gateway. As we have seen for installing the Flex Gateway, we have used the Runtime Manager and for publishing the APIs, we will be using the API Manager. To achieve this, we have to make sure that Flex Gateway is connected. With Flex Gateway, Anypoint API Manager capabilities can be extended to the MuleSoft APIs as well as to Non-MuleSoft APIs.

  • Multi-Cloud Identity Orchestration — What Does the Future Look Like?

    Cloud computing has offered endless business opportunities to enterprises embarking on a digital transformation journey.  Whether we talk about SMEs or renowned brands, everyone is on the verge of adopting the latest cloud computing technologies to stay ahead of the curve. 

  • DevOps Security Checklist for Kubernetes

    Kubernetes is a container orchestration platform today adopted by many companies. Its implementation requires a certain understanding of its ecosystem in order to deploy a cluster ready for production. Implementing working principles or tools is therefore essential and requires the work of all teams (operations, development, security, etc.) to promote the detection of anomalies as soon as possible and thus raise the level of security of the orchestrator and its resources. Pre-Commit Hooks The primary objective being to minimize the impacts in production by adding automated processes as early as possible in a continuous integration pipeline is today a recognized principle of the DevSecOps world.

  • Testing Strategies for Microservices

    A microservice application is a group of distributed programs that communicate over networks, occasionally interfacing with third-party services and databases. Microservices, by their networked nature, provide more points of failure than a traditional monolith. As a result of this, we need a different, broader approach to testing. So, how do we test a microservice application? Does the testing pyramid still work? How do we test when third-party services are involved, and network disruptions are a possibility? We’ll attempt to answer all these questions in this post.

  • Replace your Scripts with Gradle Tasks

    I really like Maven, and I really like the declarative build style, but recently I finally came to understand why Gradle is better. For small projects that produce a common library JAR, you can still use Maven, but real-life, complex software projects always contain a lot of support scripts for deployment, copying artifacts, and so on. For some of those tasks you can find Maven plug-ins, for most of them you can write Maven plugins, but in real life you have shell scripts to do the job.

  • CI/CD Pipelines and Caching of Dependencies on Azure DevOps

    In this blog, we'll be taking you through a brief explanation of CI/CD pipelines in Azure DevOps and how to implement caching of Maven dependencies in the pipelines while deploying your Mule application to CloudHub. What Is CI/CD? CI, short for continuous integration, is a software development practice in which all developers merge code changes in a central repository multiple times a day. CD stands for continuous delivery, which on top of continuous integration adds the practice of automating the entire software release process.

  • The Best Solution to Burnout We’ve Ever Heard

    With registration for our October INTERACT conference now open, we wanted you to hear one of our favorite sessions from this past April’s INTERACT. Featuring the best minds from Slack, Netlify, and Ambassador Labs, our session on Inspiring Engineering Leaders & Driving Developer Creativity turned into one of the best conversations we’ve ever heard on topics like dev toil, focus, and burnout. This is a great preview of the type of content we’re working on for our conference in October, and this panel completely made us rethink how we approach burnout at LinearB. If you like it as much as we do, be sure to sign up for October’s free virtual INTERACT conference.

  • 5 Options for Deploying Microservices

    Microservices are the most scalable way of developing software. But that means nothing unless we choose the right way to run them: processes or containers? Run on my servers or use the cloud? Do I need Kubernetes? When it comes to microservice architecture, there is such an abundance of options, and it is hard to know which is best. As we’ll see, the perfect place to host a microservice application is largely determined by its size and scaling requirements. So, let’s go over the 5 main ways we can deploy microservices.

  • Writing Your Own Service Discovery Client for Apache APISIX

    In general, API Gateways - and in particular, Apache APISIX - provide a single entry point into one's information system. This architecture allows for managing load balancing and failover over similar nodes. For example, here's how you can create a route balanced over two nodes in Apache APISIX: Shell   curl http://localhost:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -i -d '{ "uri": "/*", "upstream": { "type": "roundrobin", "nodes": { "192.168.0.1:80": 1, # 1 "192.168.0.2:80": 1 # 1 } } }'

  • Automated Deployment with Mule Management Console and Maven

    In my opinion, the deployment of any application should be as automated as possible to avoid errors due to manual mistakes. This is no different with a mule esb application. If you are using the enterprise edition of the mule esb you also have the ability to make use of the mule management console (MMC).  This instrument makes the governance of the deployment of your mule applications into different environments easier, and therefore, the whole deployment cycle less error-prone. 

  • How to Install Grafana Loki Stack Using AWS S3 Bucket

    For any production environment, having a proper logging and monitoring system is vital. This is down to the fact that downtime can lead to unwanted bottlenecks in such an environment and even loss of business reputation and revenue. As a result, most organizations that utilize DevOps principles and tools require a logging system to cover the shortcomings of Prometheus, which is an efficient production system monitoring tool but lacks logging capabilities.  Grafana Loki is one of the tools that help companies maintain a centralized logging system. The importance of having a centralized logging system in a production environment is that it allows you to address issues such as downtime and identify potential issues that need resolution. Loki started at Grafana Labs in 2018 and was announced at the KubeCon in Seattle in December 2018. In June 2019, the first beta version 0.1.0 was released.

  • What I Have Understood About DevOps

    When I first heard the term DevOps, What I understood from my peers is that, “The process of deploying the application in any environment (dev/QA/prod) is called DevOps. It’s just another synonym for operations.”