How to Run Rootless Docker Containers
Ever found yourself in a situation where you want to use Docker but don’t have root access? Or perhaps you wish to provide Docker access to your team or clients but aren’t comfortable giving them root privileges.
Podman vs Docker: A Comparison
Containerization has been taking the app development world by storm. In today’s technological landscape, it’s common to hear Docker associated with containers, but there are other options.
The Top 5 Free Containerization Tools
In 2006, several Google engineers started to work on a Linux kernel feature called Cgroups (Control Groups) to limit and isolate hardware resource usage (e.g., RAM, CPU, disk I/O, network, etc.). Eventually, this functionality was merged with the Linux Mainline Kernel in 2008, and that paved the way for all containerization technologies that we use today, like Docker, Cloudfoundry, LXC, etc.
How Does Containerization Work?
If you're invested in the world of web development, you might have already heard of containerization and all its advantages or even enjoyed them yourself by using one of the many available containerization solutions. It’s not an exaggeration to say that software containerization has changed the world, just as the change from bare metal to virtual machines (VMs) did.
What is Desktop-as-a-Service?
As firms advance towards a more modern infrastructure, the Desktop-as-a-Service (DaaS) model is becoming an increasingly popular cloud-based system. Desktop-as-a-Service is a multi-tenant, cloud computing solution in which a service provider furnishes a virtual desktop to an end-user over the internet. A provider typically manages the infrastructure, including the security updates, available desktop applications, data storage, and backups. In specific instances, DaaS users manage these services individually. According to Gartner via Workspot:
How to Store Secrets in Kubernetes
What is a Secret?
A Kubernetes Secret is an object that enables us to store and manage sensitive information. A Secret can contain data like SSH keys, OAuth data, or other user authentication information like passwords. It is typically stored within a cluster in a manner native to Kubernetes. Using a Secret object provides more granular control over how highly sensitive data is used. It also lowers the risk of data exposure to unauthorized parties.
How to Install and Configure KubeKey
What is KubeKey?
KubeKey is the newest Kubernetes installer for KubeSphere. KubeSphere is a distributed OS management system for cloud-native applications using Kubernetes as its kernel. It provides a plug-and-play structure for seamless integration of many third-party applications. It is somewhat similar in nature to MiniKube for installing Kubernetes.
Using Telepresence to Improve Microservice Development
What is Telepresence?
Initially developed by Datawire, Telepresence is a new open-source tool supported by the CNCF (Cloud Native Computing Foundation). It allows developers to run local software while connected to a remote Kubernetes cluster. The application uses a two-way network proxy to simulate TCP connections, environmental variables, and other volumes of services as local processes. This link allows for remote work to be accomplished while seemingly local to the cluster via the proxied connection.
A Beginner’s Guide to Chef on CentOS 8
What is Chef?
Chef is an open-source configuration management DevOps tool used for configuration and management of multiple systems in infrastructure. Using Chef, we can use so-called recipes and cookbooks to automate and speed up managing multiple systems in our environment. By using Chef, we can adjust every system in our environment to our desired state, which we defined using the code in recipes. In the process, code is continuously tested and deployed using Chef.
How to Install Jenkins on Ubuntu 20.04
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.