Deleting a Network drivers in Kubernetes
In
a Kubernetes cluster network add-ons has to be installed/deployed so that the
hosts/pods in a cluster can communicate with each other. This
doc shall talk about deleting a...
Creating HA Postgres Setup on CentOS with streaming replication
In this blog we will create the master-slave setup of the postgres using the streaming replication. All below steps are tested with the centos.
File Based Service Discovery with Prometheus
Prometheus does provide many configs for service discovery. It’s very easy to discover the targets from consul, kubernetes & mesos, etc.However, there are certain use cases where we maybe...
Understanding the Kubernetes Pod
A pod is the deployment unit for the Kubernetes. A pod is also having the life cycle just like the process in Linux. Pods are mortal i.e. pods can...
Understanding Metric Types of Prometheus
Introduction: Prometheus is an open source system. It is widely adopted by the industries for active monitoring and alerting. It supports the multidimensional data model.In this blog, I will...
8 Container Orchestration Platforms to Know
Container As a Service (CaaS) is growing very rapidly. Enterprises are adopting the containers and including container orchestration for managing containerized applications at scale. Here are...
Dockerize the NodeJS app
Containerization is the most important aspect to bundle all the dependencies together we called it as container. Container can be an application container, web container or a database container....
Modern Monitoring with Legacy Systems
There are a lot of tools in the market which can do sufficient monitoring and alert for your application and infrastructure. The growth of containerized platforms helped to have...
Lesson’s Learned | Running Prometheus in Production
We are running the Prometheus as our white-box monitoring solution for the last 1 and a half years. Following are the point’s to be noted: 1....
Cloud native security tools you should know
Containers are new deployment units for production environments. The adoption of containers is rapidly growing into enterprises. Container security is one of the common concerns. As we heard recent...