Operations | Monitoring | ITSM | DevOps | Cloud

Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

A Vision Turned into a Production Reality All the Way to the Edge!

During MWC 2019, we first announced project Spire. Project Spire was the codename for our Cloudify edge strategy. It was designed primarily for handling orchestration at extreme scale (10k sites, x millions of devices). The design was based on a unique distributed orchestration architecture as could be seen in the diagram below.

Epinio Meets s3gw

Since the very first version, Epinio has made use of an internal S3 endpoint to store the user’s projects in the form of aggregated tarballs. Those objects are then downloaded and staged by the internal engine’s pipeline and, finally, they are deployed into the Kubernetes cluster as consumable applications. Epinio makes use of S3 as an internal private service. In this scenario, S3 can be thought of as an internal ephemeral cache with the purpose of storing temporary objects.

What's the Difference Between Gen 1 and Gen 2 VMs?

Virtual machines (VMs) have been around for quite some time now and have become a cornerstone of modern-day IT infrastructure. They provide a convenient way to run multiple operating systems on a single physical machine, allowing users to consolidate their hardware and save costs. However, as VM technology has evolved, newer versions of VMs have been introduced, such as generation 1 and generation 2 VMs.

How does Cloudify Manage the Lifecycle of VNFs and Network Services in ETSI MANO

In 2021, Cloudify introduced the Agile-First approach to 5G network orchestration, creating a bridge between the Telco and DevOps worlds. In those previous POCs, Cloudify proved to be a platform built to support agile service delivery and multiple interfaces that allow multi-vendor flexible solution integration. Today, Cloudify takes the next step to provide a vendor-agnostic solution in 5G and the public cloud.

Choosing the Right AWS Messaging Service for Your Application

With the dawn of microservices and serverless, event-driven architectures have become the way to go when building a new system in the cloud. This approach has allowed for greater scalability, as the system can easily adapt and respond to changes in traffic or demand without having to overhaul the entire architecture. Additionally the Event-driven approach means your application is mainly concerned with routing event data to the right services.

Deploy Access Restricted Azure website from DevOps Pipelines

We have a couple of internal websites hosted on Azure. Websites that require authentication and should only be accessed from our IP. This can easily be configured using Access Restrictions in Azure. But when doing so, you exclude the dynamic IP range for Microsoft-hosted Azure DevOps build agents. In this post, I'll show you how we set up deployment to the Access Restricted websites with a bit of PowerShell magic.

How do I Access Blob Storage? A Step-by-Step Guide

Blob Storage is a highly scalable and secure cloud storage solution offered by Microsoft Azure. It allows users to store unstructured data like text, images, videos, and audio files. Accessing Blob Storage is crucial for developers, IT professionals, and business owners who want to manage their data and applications in the cloud. In this article, we will discuss how to access Blob Storage using different methods and tools.