Tag: Deployment

Reading Time: 5 minutes
DaaS

Introduction

As firms advance towards a more modern infrastructure, the Desktop-as-a-Service (DaaS) model is becoming an increasingly popular cloud-based system. Desktop-as-a-Service is a multi-tenant, cloud computing solution in which a service provider furnishes a virtual desktop to an end-user over the internet. A provider typically manages the infrastructure, including the security updates, available desktop applications, data storage, and backups. In specific instances, DaaS users manage these services individually. According to Gartner via Workspot:

Continue reading →
Reading Time: 5 minutes

What is a Secret? 

k8s secrets

A Kubernetes Secret is an object that enables us to store and manage sensitive information. A Secret can contain data like SSH keys, OAuth data, or other user authentication information like passwords. It is typically stored within a cluster in a manner native to Kubernetes. Using a Secret object provides more granular control over how highly sensitive data is used. It also lowers the risk of data exposure to unauthorized parties. 

Continue reading →
Reading Time: 6 minutes

What is KubeKey?

kubekey2

KubeKey is the newest Kubernetes installer for KubeSphere. KubeSphere is a distributed OS management system for cloud-native applications using Kubernetes as its kernel. It provides a plug-and-play structure for seamless integration of many third-party applications. It is somewhat similar in nature to MiniKube for installing Kubernetes.

Continue reading →
Reading Time: 6 minutes

Moving an Internet business to a cloud platform has flourished and gained prominence in the current industrial climate. Three main types of cloud computing service models are Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS).

Continue reading →
Reading Time: 5 minutes
Teleprescence logo

What is Telepresence?

Initially developed by Datawire, Telepresence is a new open-source tool supported by the CNCF (Cloud Native Computing Foundation). It allows developers to run local software while connected to a remote Kubernetes cluster. The application uses a two-way network proxy to simulate TCP connections, environmental variables, and other volumes of services as local processes. This link allows for remote work to be accomplished while seemingly local to the cluster via the proxied connection. 

Continue reading →
Reading Time: 7 minutes

What is Jenkins?

Jenkins is an open-source software written in Java and Scala. This software allows users the ability to automate almost any task and, it saves significant time that can be better utilized addressing other issues. When automating tasks with Jenkins, users can optimize their workflow by quickly automating the jobs that servers cannot do themselves. In this tutorial, we will learn how to install Jenkins on CentOS 8. We will also explore what its purpose is and share several benefits that Jenkins offers. We will then configure it to run on our CentOS 8 server.

Continue reading →
Reading Time: 5 minutes
Ansible_logo

Ansible is an open-source tool that uses playbooks to enable configuration management, software provisioning, and application deployment. It is primarily written in Python and was released in 2012. Ever since then, it has saved countless hours of often menial work of deploying and maintaining IT infrastructure. Overall, Ansible is very consistent, secure, reliable, and it requires a minimal learning curve. Simply put, Ansible is a powerful tool for automating apps and infrastructure. You can read more about general Ansible information in our recently published article.

Continue reading →
Reading Time: 7 minutes

Introduction: What is IaC?

Files being shared to multiple computers

Today we will become acquainted with a concept known as Infrastructure as Code. The idea of Infrastructure as Code is becoming more and more popular today. IaC is a method used to manage and provision a data center via defined machine-readable files instead of physical hardware configuration or other interactive configuration tools. This article will share what it is used for, why it is important, and why businesses strive to utilize this platform to achieve a desired set of results. It is essential to understand that we will consider both the theoretical and practical parts of IaC.

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434