This article discusses what serverless is, comparing it with PaaS and SPaaS, the benefits and costs of a serverless architecture and the need for a framework.
The theme of the 2016 Cloud Identity Summit (CIS) was r/evolution of enterprise security, using identity as the security perimeter rather than the border of the corporate network. In this story, we look at the keynote messages presented here.
Alex Zhitnitsky of Takipi has written about five ways to try to improve the chances of successful deployed of microservices into production. As we will see, they share many similarities with other independent efforts, perhaps leading us to agreement on top areas of concern, if not ways of solving these problems.
LinkedIn’s Joel Koshy details their Kafka usage, debugging and monitoring two production incidents in using the core Kafka infrastructure concepts, semantics and behavioral patterns to plan for and detect similar problems in the future.
Moving applications to the cloud has somewhat become commodity in the meantime - not only for big players, but also for smaller companies that rely on flexibility and resource utilization. In his presentation "Implementing Infrastructure as Code", Kief Morris, cloud practice lead at ThoughWorks, shares some key principles and recommendations on how to leverage cloud based infrastructure.
Windows Management Instrumentation (WMI) is a primary source of data when monitoring Windows systems. Given that the performance counters available vary from machine to machine, a tool is needed to list all counters available. The WMI type provider is one possible option to explore WMI performance counters.
LinkedIn recently detailed open-sourced Kafka Monitor service that they're using to monitor production Kafka clusters as well as extensive testing automation, leading them to identify bugs in the main Kafka trunk and contribute solutions to the open-source community.
As part of the ongoing transition to the module system, CORBA and other Java EE modules won't be included in the default classpath from Java 9 onwards. These modules will still be available, but specific command line flags will have to be used to be able to use them. The change will only affect non-modular applications targeting Java 9, for modular ones already need to indicate their dependencies.
RightScale published the results of its survey report highlighting the devops trends in the industry. Docker, Puppet and Chef dominate the tools market, with Docker adoption rising in the enterprise.
Jenkins recently announced a partnership with Microsoft to run its project infrastructure on Azure. Moving to Azure will enable elastic workloads as well as additional resources for Jenkins services.
AWS recently added a new instance type with nearly 2 terabytes of memory and 128 virtual CPUs. This is the largest virtual server available today in the public cloud, and is a target for memory-intensive workloads such as SAP HANA.
The NOLOCK directive was broken in Cumulative Update #6 for SQL Server 2014 SP1. As a result, databases that relied on that directive may experience unexpected blocking and/or deadlocks.
The next phase of DevOps will involve collaboration between engineering and non-engineering teams.
A major vulnerability in CoreOS Linux Alpha has been patched, with the security team saying the issue was limited to versions 104x.0.0 of the Linux distribution. Principal security engineer for CoreOs, Matthew Garrett, said users needed to be confident that CoreOS were not "shipping alpha releases with gaping security issues, it is a big deal when we fail in that respect."
Matthew (Ford) Kern and Miko have both recently written posts on the topic "Agile is Dead". Matthew relates it to the saturation of agile consulting and the speed of hype cycles. Miko links it to a need to go faster than the approaches embodied in the agile movement and replace agile with DevOps.