9 SSH Do’s and Don’ts
When ever you can use a key for SSH. Once you create it, you can distribute the public side widely to enable access where ever you need it. Generating one is easy:
View ArticleEmbedding Ops Members in Dev teams – My Recent Experience
For about 2 months I was sitting with a dev team while we worked through how to build a new service which will be continuously deployed. I wanted to share my experiences here because I’ve read both...
View ArticleThe Problems With Having 'DevOps' in a Job Title
Have you recently changed your job title to include the word devops in it? What were your reasons? Has it given the results you hoped for? It’s been a while since I posted about why devops makes sense...
View ArticleWill IT Culture Kill Cloud?
Gartner analysts have suggested that “If you’re going to operate like a cloud provider, you will need to be willing to fire almost everyone in this room.” Here's my take.
View ArticleThe 5 Point Checklist Backup and Recovery in EC2
Learn the 5 keys to backing up resources on Amazon EC2, which include performing multiple types of backups keeping non-proprietary backups offsite and a few other tips...
View ArticleTesting DNS Servers with Python - dns_compare.py
Sometimes it might be nice to be able to test a DNS server’s output, such as with a continuous monitoring system, or as a validation tool when migrating to a different DNS server (or service.)
View ArticleHave You Tried Everything and SSH with PKA its Still Not Working?
I recently ran into the situation in which I couldn’t get PKA to work when SSHing into my Ubuntu server. I checked the key pair (works fine SSHing into other servers), directory permissions,...
View ArticleWhat Operations REALLY Think of Development
Development and Operations are both critical to IS/IT usage in an organization, but operations often look at development as something alien – from another planet (and developers have the same view on...
View ArticleUnix Doesn’t Follow the Unix Philosophy
The Unix philosophy is a noble idea, but even Unix doesn’t follow it too closely. The Unix philosophy, as summarized by Doug McIlroy, says
View ArticleSpin Up New VMs in Their Own Virtual Network - A New FOSS Tool
UrbanCode recently open sourced a very nifty tool for spinning up entire virtual environments, not just machines. It's cool to see an interesting tool that goes above and beyond most other VM creation...
View ArticleGraylog2 Optimization for High-Log Environments
GrayLog2 is a free, open source log collection and correlation system. While it does not match the feature list of Splunk, it provides all of the basic log correlation capabilities that we need.
View ArticleMartin Fowler: Snowflake Servers
Configuration changes are regularly needed to tweak the environment so that it runs efficiently and communicates properly with other systems. This requires some mix of command-line invocations, jumping...
View ArticleRating My Team: Limoncelli Test (Based on Spolsky) for Sysadmins
Tom Limoncelli has his own version of The Joel Test – except his one is for sysadmins. I was only vaguely aware of Joel Spolsky’s test and only just read through it and rated my current team, and I’m...
View ArticleDevops Isn’t Just for Online Startups
One of the things I like about devops is that it takes on important but neglected problems in the full lifecycle of a system: making sure that the software is really ready to go into production,...
View ArticleDevOps Cloud Patterns
In the world of DevOps, there are a few guys who need no introduction. One of them is @botchagalupe. Instead of live blogging a talk he did today at Build a Cloud Day Chicago, I thought I’d just post...
View ArticleLogging on Linux: What to Look Out For With Lots of Linux Boxes
While people generally understand that it is important to store and manage logs so that they can be regularly reviewed for operations, root cause analysis, security purposes etc… Oftentimes we find...
View ArticleAsynchronous WMI Queries: Stay Away From Them
WMI is known for requiring lots of attention to security. To establish a WMI connection to a remote machine, you need to muck around with registry settings, DCOM configuration, group policy details,...
View ArticleReleases Should be Boring
Six times a year, there was a party with ice cream. The release effort spanned multiple projects and was a 36 hour, high pressure marathon. Its successful navigation was a major accomplishment to be...
View ArticleWhy You Can’t Afford to Ignore DevOps
DevOps is a huge movement in IT at the moment. It applies lean practices across an IT organization. While Agile has promoted lean practices in the development of software for years, DevOps is a more...
View ArticleThe Virtuous Cycle of Being On-Call
… or how you can make on-call for service providers a virtuous cycle. In the tech world, for everything that is running as a service or website 24/7/365, there must be someone available to take care of...
View Article
More Pages to Explore .....