Operations | Monitoring | ITSM | DevOps | Cloud

Valkey container image - securely designed, compliant, and long term supported (LTS)

Valkey is a new database management system that is gaining traction. Valkey is a fork of Redis, and it is available as a deb package in the Ubuntu 24.04 release. You can install it by simply running sudo apt install valkey. We also offer a Valkey container to allow you to run a secure, compliant and long-term supported Valkey on top of any Linux distribution.

Managing Multiple Service Instances with a Systemd Generator

When working with systemd services in Linux, you might encounter situations where multiple instances of a service need to be managed dynamically. When I had to develop a solution to monitor multiple Kubernetes clusters with Icinga for Kubernetes, I ran into exactly this challenge.

Exploring VPS Linux vs VPS Windows: What's the Difference?

When you need to host a website or run an application, you may come across the option to choose between a Linux VPS and a Windows VPS. Both of these Virtual Private Server (VPS) options offer powerful performance, but they operate differently, and each is suited to specific needs. Let's break it down in simple terms so you can understand which one is right for you.

Container attack surface explained

Have you noticed how open-source software has become essential to innovation in the cloud-native arena? Countless cloud-native applications are powered by open source, and they are often mission-critical for organizations across industries, ranging from small startups to large enterprises. However, there are inherent security risks associated with this reliance on external components, and this problem is only growing as container adoption continues to gain momentum.

High-Performance Kubernetes Networking with Calico eBPF

Kubernetes has revolutionized cloud-native applications, but networking remains a crucial aspect of ensuring scalability, security, and performance. Default networking approaches, such as iptables-based packet filtering, often introduce performance bottlenecks due to inefficient packet processing and complex rule evaluations. This is where Calico eBPF comes into play, offering a powerful alternative that enhances networking efficiency and security at scale.

How Ubuntu Pro + Support keeps your Ubuntu 20.04 LTS secure and stable

Whether you plan to continue running Ubuntu 20.04 LTS or upgrade to the latest LTS, keeping your infrastructure secure and stable is a top priority. Extended Security Maintenance (ESM) provides essential security updates to protect your systems from vulnerabilities, ensuring you stay compliant and up to date against the latest threats.

7 considerations when building your ML architecture

As the number of organizations moving their ML projects to production is growing, the need to build reliable, scalable architecture has become a more pressing concern. According to BCG (Boston Consulting Group), only 6% of organizations are investing in upskilling their workforce in AI skills. For any organization seeking to reach AI maturity, this skills gap is likely to cause disruption.

AI in 2025: is it an agentic year?

2024 was the GenAI year. With new and more performant LLMs and a higher number of projects rolled out to production, adoption of GenAI doubled compared to the previous year (source: Gartner). In the same report, organizations answered that they are using AI in more than one part of their business, with 65% of respondents mentioning they use GenAI in one function.

Ubuntu System Logs: How to Find and Use Them

System logs play a crucial role in debugging and monitoring in Ubuntu. When a service misbehaves or an unexpected crash happens, logs hold the answers. They’re also great for keeping an eye on system performance. Knowing how to access, read, and manage these logs can save you hours of troubleshooting. This guide covers everything you need to know about Ubuntu system logs—from where they’re stored to how to analyze them efficiently.

Security in depth with Ubuntu: Mapping security primitives to attacker capabilities

Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for your opponent. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barrier, but instead a layered strategy that forces your adversary into a losing position at every turn.