Headquartered in what has become my hometown, SolarWinds shares a campus with AMD in the southwestern corner of Austin. The majority of the existing, product suite is comprised of componentized, enterprise-architected, Windows-oriented network, systems, security, database management software. Many (not all) of these offerings were from one of ~18 acquisitions, with the latest (LogicNow) in early June of this year. These acquisitions include three SaaS offerings, Librato, Papertrail and Pingdom, giving SolarWinds continuous-delivery known-how and a splash of DevOps culture. Continue reading »
Recently adopted by the Cloud Native Computing Foundation, Prometheus is an open-source systems monitoring and alerting toolkit, focused on supporting the operation of microservices and containers. Like any open source project, it can be augmented with additional capabilities.
Contributing to Prometheus is no different than most other open source endeavors, which, like many projects, welcomes community contributions. Let’s gain better familiarity with the process by augmenting Prometheus’ Alert Manager with a new “history” view. The first step, naturally, is to check out the contributing guidelines for the specific repository (in this case, Alert Manager‘s).
When electing to contribute to any open source project, you’ll want to ensure that you are capable of wielding the technologies used with the project — in this case, those are Go, AngularJS, SQL, etc. Continue reading »
Running a few containers? No problem. Running hundreds or thousands? Enter the container orchestrator. Let’s take a look at the characteristics of the three most popular container orchestrators and what makes them alike, yet unique.
Look for more detail in my upcoming book Developer Defined Infrastructure using Tectonic and Kubernetes.
The slides from my talk have been posted.
Article originally appeared on Network World on April 15th, 2016.
Security has and continues to be an impediment to container adoption. Whether containers are less or more secure than their virtual machine counterparts is a topic of continued debate.
Like any debate, there are merits to arguments on both sides with a bit of FUD interlaced. Many efforts have been undertaken within the container ecosystem to educate adopters and improve their comprehension of available tooling and security postures within platforms and offerings—be that in the form of static analysis (image scanning), runtime vulnerability detection, provenance (image signing), fine-grained authorization, cryptographic verification, etc.
Continue reading »