Operations | Monitoring | ITSM | DevOps | Cloud

Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

How does Cloudify Manage the Lifecycle of VNFs and Network Services in ETSI MANO

In 2021, Cloudify introduced the Agile-First approach to 5G network orchestration, creating a bridge between the Telco and DevOps worlds. In those previous POCs, Cloudify proved to be a platform built to support agile service delivery and multiple interfaces that allow multi-vendor flexible solution integration. Today, Cloudify takes the next step to provide a vendor-agnostic solution in 5G and the public cloud.

Choosing the Right AWS Messaging Service for Your Application

With the dawn of microservices and serverless, event-driven architectures have become the way to go when building a new system in the cloud. This approach has allowed for greater scalability, as the system can easily adapt and respond to changes in traffic or demand without having to overhaul the entire architecture. Additionally the Event-driven approach means your application is mainly concerned with routing event data to the right services.

Deploy Access Restricted Azure website from DevOps Pipelines

We have a couple of internal websites hosted on Azure. Websites that require authentication and should only be accessed from our IP. This can easily be configured using Access Restrictions in Azure. But when doing so, you exclude the dynamic IP range for Microsoft-hosted Azure DevOps build agents. In this post, I'll show you how we set up deployment to the Access Restricted websites with a bit of PowerShell magic.

How do I Access Blob Storage? A Step-by-Step Guide

Blob Storage is a highly scalable and secure cloud storage solution offered by Microsoft Azure. It allows users to store unstructured data like text, images, videos, and audio files. Accessing Blob Storage is crucial for developers, IT professionals, and business owners who want to manage their data and applications in the cloud. In this article, we will discuss how to access Blob Storage using different methods and tools.

Azure Monitor Pros and Cons

Enterprise use of Microsoft’s Azure Cloud Services is expanding at an unprecedented rate as cloud computing usage expands. However, enterprises that have recently switched to Azure continue to have serious concerns about monitoring their applications efficiently. As the business overgrows, it is essential to understand its functioning and health simultaneously.

Sweet Trick! Mastering O11y for Cloud-Native Technologies

Using the cloud can be challenging. Everyone likes to tell stories about a surprise cloud bill they received and laugh, but let’s be honest: it’s happened to all of us. When dealing with complex cloud environments and cloud-native architectures, gaining visibility into the state of the environment is critical. Today, developers are looking to monitor how things are working and performing as part of every step in the software development life cycle.

10 Ways to Optimize your Azure cost

In modern times, building and publishing an application has become very easy with Cloud-based deployment. Users don’t need to worry about infrastructure-related challenges like availability, reliability, scalability, etc. The cloud providers are responsible for keeping the deployment flow simple and intact. Providing many advantages and coherence, the high cost incurred for such benefits is the downside.

Understanding Hyper-V Checkpoints: A Comprehensive Guide

Hyper-V is a virtualization platform developed by Microsoft that allows users to create and manage virtual machines (VMs) on Windows operating systems. One of the features of Hyper-V is checkpoints, which allow users to capture the state of a VM at a particular point in time. Hyper-V checkpoints are essential for many tasks, such as testing software in a safe and isolated environment, creating backups of virtual machines, and rolling back a virtual machine to a previous state if something goes wrong.