Integration of Prometheus with Cortex

As we promised in our previous blog Prometheus as Scale – Part 1 that in our next blog we will be writing about the implementation part of Cortex with Prometheus, so here we are with our promise. But before going to the implementation part, we would suggest you guys go through our first blog to know the need for it.

Previously we talked that Prometheus is becoming a go-to option for people who want to implement event-based monitoring and alerting. The implementation and management of Prometheus are quite easy. But when we have a large infrastructure to monitor or the infrastructure has started to grow you require to scale monitoring solution as well.

A few days back we were also in a similar kind of situation where one of our client’s infrastructure was growing as per the need and they need a resilient, scalable, and reliable monitoring system. Since they were already using the Prometheus, so we explored our option and came across an interesting project called “Cortex“.

Continue reading “Integration of Prometheus with Cortex”

Dependency Management with Renovate: Beyond the Limits of Dependabot

While mature CI pipelines often incorporate security scanner tools like Trivy and Clair. But these tools primarily identify vulnerabilities and to fix those vulnerabilities, developers manually upgrade versions of those dependencies like packages, libraries, etc.

Manually managing dependencies in software development can be a time-consuming and error-prone process, leading to several challenges. What if we use a tool that scans the entire repo and detects if updates/patches are available or not and raises PR to upgrade dependency automatically, allowing developers to review and merge them as needed. This proactive approach helps prevent the introduction of vulnerabilities in the first place by ensuring dependencies are kept up-to-date until it is zero-day vulnerabilities.

This blog introduces you to Renovate, a powerful open-source tool that automates dependency management. As an open-source, it offers various ways of installing and configuring it. We will specifically focus on installation using the command-line interface (CLI), in this blog.

Continue reading “Dependency Management with Renovate: Beyond the Limits of Dependabot”

How Can IT Services Adapt and Benefit From Platform Engineering?

Delve into the world of Cloud Platform Engineering and explore how IT services can embrace this concept to meet the ever-changing demands of the modern digital age. 

In today’s fast-paced and ever-evolving digital landscape, Information Technology (IT) services play a pivotal role in ensuring the smooth operation of businesses across various industries. As organizations increasingly rely on technology to drive innovation, improve efficiency and stay competitive, the pressure on IT services to deliver reliable and scalable solutions has never been higher. To meet these demands, IT departments are turning to a paradigm known as “Platform Engineering.” 

This transformative approach not only enhances the performance and agility of IT services but also fosters a culture of innovation, collaboration and adaptability. In this blog, we will delve into the world of Cloud Platform Engineering and explore how IT services can embrace this concept to meet the ever-changing demands of the modern digital age. 

We’ll uncover the key principles, benefits and practical strategies that can empower IT teams to excel in delivering robust and adaptable solutions. So, if you’re curious about how your IT services can stay ahead in the game, read on to discover the exciting possibilities of Platform Engineering.

Continue reading “How Can IT Services Adapt and Benefit From Platform Engineering?”

How to get Java heap dump from Kubernetes container into a local machine?

Introduction to External Secret Operator

ESO

In today’s digital world, the protection of sensitive information has become paramount. So while working with microservices orchestrator tools such as kubernetes it is important to handle the secrets securely such as username or password, DB Password, or API Keys. Kubernetes has a built-in feature for managing secrets called secrets. But the downside of Secrets is that It doesn’t support storing or retrieving the secrets from external secret management systems like AWS Secrets Manager, HashiCorp Vault, Google Secrets Manager, Azure Key Vault, IBM Cloud Secrets Manager, and many more.

Moreover, external secret management provides encryption at rest, secret rotation policies, and many more. So in this blog, we will talk about the solution GoDaddy came up with an open-source solution called External Secrets Operator.

What is External Secret Operator?

External Secrets Operator is a tool or component that extends the functionality of Kubernetes to manage external secrets in a more secure and efficient manner. It acts as a bridge between Kubernetes and external secret management systems, allowing you to securely store and retrieve secrets from external sources. It integrates with external secret providers such as HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, or other similar systems. This enables Kubernetes applications to access and utilize secrets stored in these external systems without exposing them directly within the cluster.

Continue reading “Introduction to External Secret Operator”