Authors: Jing Xu (Google), Xing Yang (Huawei), Saad Ali (Google) Volume snapshotting support was introduced in Kubernetes v1.12 as an alpha feature. In Kubernetes v1.13, it remains an alpha feature, but a few enhancements were added and some breaking changes were made. This post summarizes the changes. Breaking Changes CSI […]

Authors: Jing Xu (Google), Xing Yang (Huawei), Saad Ali (Google) Volume snapshotting support was introduced in Kubernetes v1.12 as an alpha feature. In Kubernetes v1.13, it remains an alpha feature, but a few enhancements were added and some breaking changes were made. This post summarizes the changes. Breaking Changes CSI […]

Author: Saad Ali, Senior Software Engineer, Google The Kubernetes implementation of the Container Storage Interface (CSI) has been promoted to GA in the Kubernetes v1.13 release. Support for CSI was introduced as alpha in Kubernetes v1.9 release, and promoted to beta in the Kubernetes v1.10 release. The GA milestone indicates […]

Author: Saad Ali, Senior Software Engineer, Google The Kubernetes implementation of the Container Storage Interface (CSI) has been promoted to GA in the Kubernetes v1.13 release. Support for CSI was introduced as alpha in Kubernetes v1.9 release, and promoted to beta in the Kubernetes v1.10 release. The GA milestone indicates […]

Author: Antoine Pelisse (Google Cloud, @apelisse) Declarative configuration management, also known as configuration-as-code, is one of the key strengths of Kubernetes. It allows users to commit the desired state of the cluster, and to keep track of the different versions, improve auditing and automation through CI/CD pipelines. The Apply working-group […]

Author: Antoine Pelisse (Google Cloud, @apelisse) Declarative configuration management, also known as configuration-as-code, is one of the key strengths of Kubernetes. It allows users to commit the desired state of the cluster, and to keep track of the different versions, improve auditing and automation through CI/CD pipelines. The Apply working-group […]

Authors: Irfan Ur Rehman (Huawei), Paul Morie (RedHat) and Shashidhara T D (Huawei) Kubernetes provides great primitives for deploying applications to a cluster: it can be as simple as kubectl create -f app.yaml. Deploy apps across multiple clusters has never been that simple. How should app workloads be distributed? Should […]

Authors: Irfan Ur Rehman (Huawei), Paul Morie (RedHat) and Shashidhara T D (Huawei) Kubernetes provides great primitives for deploying applications to a cluster: it can be as simple as kubectl create -f app.yaml. Deploy apps across multiple clusters has never been that simple. How should app workloads be distributed? Should […]

Author: Gyuho Lee (Amazon Container OSS Team, @gyuho), Joe Betz (Google Cloud, @jpbetz) etcd is a distributed key value store that provides a reliable way to manage the coordination state of distributed systems. etcd was first announced in June 2013 by CoreOS (part of Red Hat as of 2018). Since […]

Author: Gyuho Lee (Amazon Container OSS Team, @gyuho), Joe Betz (Google Cloud, @jpbetz) etcd is a distributed key value store that provides a reliable way to manage the coordination state of distributed systems. etcd was first announced in June 2013 by CoreOS (part of Red Hat as of 2018). Since […]

Authors: Josh Berkus (Red Hat), Yang Li (The Plant), Puja Abbassi (Giant Swarm), XiangPeng Zhao (ZTE) Kubecon Shanghai New Contributor Summit attendees. Photo by Jerry Zhang We recently completed our first New Contributor Summit in China, at the first KubeCon in China. It was very exciting to see all of […]

Authors: Josh Berkus (Red Hat), Yang Li (The Plant), Puja Abbassi (Giant Swarm), XiangPeng Zhao (ZTE) Kubecon Shanghai New Contributor Summit attendees. Photo by Jerry Zhang We recently completed our first New Contributor Summit in China, at the first KubeCon in China. It was very exciting to see all of […]

Authors: Lucas Käldström (CNCF Ambassador) and Luc Perkins (CNCF Developer Advocate) kubeadm is a tool that enables Kubernetes administrators to quickly and easily bootstrap minimum viable clusters that are fully compliant with Certified Kubernetes guidelines. It’s been under active development by SIG Cluster Lifecycle since 2016 and we’re excited to […]

Authors: Lucas Käldström (CNCF Ambassador) and Luc Perkins (CNCF Developer Advocate) kubeadm is a tool that enables Kubernetes administrators to quickly and easily bootstrap minimum viable clusters that are fully compliant with Certified Kubernetes guidelines. It’s been under active development by SIG Cluster Lifecycle since 2016 and we’re excited to […]

Author: The 1.13 Release Team We’re pleased to announce the delivery of Kubernetes 1.13, our fourth and final release of 2018! Kubernetes 1.13 has been one of the shortest releases to date at 10 weeks. This release continues to focus on stability and extensibility of Kubernetes with three major features […]

Image “he sed she sed” by Ken Hess Still trying to figure out how to use sed? Check out these examples. Read the full article on redhat.com In a previous article, I covered how to manipulate text with grep. Now, turn your attention to the sed (Stream Editor), which is best suited to be used […]

Image “he sed she sed” by Ken Hess Still trying to figure out how to use sed? Check out these examples. Read the full article on redhat.com In a previous article, I covered how to manipulate text with grep. Now, turn your attention to the sed (Stream Editor), which is best suited to be used […]

Image “Red Hat” by liber is licensed under CC BY-SA 2.0 These VLAN configuration examples can help you get your Red Hat Enterprise Linux networks set up correctly. Read the full article on redhat.com All but the smallest networks are typically split into Virtual Local Area Networks (VLANs, for short), and I discussed VLAN […]

Image “Red Hat” by liber is licensed under CC BY-SA 2.0 These VLAN configuration examples can help you get your Red Hat Enterprise Linux networks set up correctly. Read the full article on redhat.com All but the smallest networks are typically split into Virtual Local Area Networks (VLANs, for short), and I discussed VLAN […]

Image “p1120431” by generalising is licensed under CC BY-SA 2.0 SSH is easy to use, but when something causes your known_hosts to backfire on you, it can be frustrating. Here’s how to fix this problem. Read the full article on redhat.com SSH is easy to use and is generally trouble-free. But, there’s this little […]

Image “p1120431” by generalising is licensed under CC BY-SA 2.0 SSH is easy to use, but when something causes your known_hosts to backfire on you, it can be frustrating. Here’s how to fix this problem. Read the full article on redhat.com SSH is easy to use and is generally trouble-free. But, there’s this little […]

Image “My dog sniffing flowers” by wolfgangm90 is licensed under CC BY 2.0 Capturing packets with a free tool like tcpdump is an essential skill that you need to acquire as a sysadmin. Anthony Critelli shows you the ropes. Read the full article on redhat.com Performing packet captures using a sniffer can be an […]

Image “My dog sniffing flowers” by wolfgangm90 is licensed under CC BY 2.0 Capturing packets with a free tool like tcpdump is an essential skill that you need to acquire as a sysadmin. Anthony Critelli shows you the ropes. Read the full article on redhat.com Performing packet captures using a sniffer can be an […]

Image “Displacement of a continuum.svg” by Nicoguaro is licensed under CC BY-SA 3.0 Keep your Ansible installation secure and tidy with these guidelines. Read the full article on redhat.com In a previous article, I covered Red Hat Ansible basics and installed Ansible, creating one control node named RHEL8 and four managed nodes (node1, node2, node3, […]

Image “Displacement of a continuum.svg” by Nicoguaro is licensed under CC BY-SA 3.0 Keep your Ansible installation secure and tidy with these guidelines. Read the full article on redhat.com In a previous article, I covered Red Hat Ansible basics and installed Ansible, creating one control node named RHEL8 and four managed nodes (node1, node2, node3, […]

Image A popular mantra in information security is, “Trust, but verify.” Learn how to inspect a web server’s TLS certificate before trusting the site. Read the full article on redhat.com We have all accepted a certificate that is not recognized by our browser. Maybe it’s from a developer or a test deployment […]

Image A popular mantra in information security is, “Trust, but verify.” Learn how to inspect a web server’s TLS certificate before trusting the site. Read the full article on redhat.com We have all accepted a certificate that is not recognized by our browser. Maybe it’s from a developer or a test deployment […]

Image “grep” by Ken Hess Want to get more out of grep? Check this out. Read the full article on redhat.com Imagine you have a file (or bunch of files) and you want to search for a specific string or configuration setting within these files. Opening each file individually and […]

Image “grep” by Ken Hess Want to get more out of grep? Check this out. Read the full article on redhat.com Imagine you have a file (or bunch of files) and you want to search for a specific string or configuration setting within these files. Opening each file individually and […]

Image “Fast Ethernet PCI Network Interface Card SN5100TX.jpg” by Jana.Wiki is licensed under CC BY-SA 3.0 If you’ve ever booted a Red Hat-based system and have no network connectivity, you’ll appreciate this quick fix. Read the full article on redhat.com It might surprise you to know that if you forget to flip the network […]

I did the following presentation “Devops with Kubernetes” in Kubernetes Sri Lanka inaugural meetup earlier this week. Kubernetes is one of the most popular open source projects in the IT industry currently. Kubernetes abstractions, design patterns, integrations and extensions make it very elegant for Devops. The slides delve little deep […]

I did the following presentation “Devops with Kubernetes” in Kubernetes Sri Lanka inaugural meetup earlier this week. Kubernetes is one of the most popular open source projects in the IT industry currently. Kubernetes abstractions, design patterns, integrations and extensions make it very elegant for Devops. The slides delve little deep […]

This week, I did a presentation in Container Conference, Bangalore. The conference was well conducted and it was attended by 400+ quality attendees. I enjoyed some of the sessions and also had fun talking to attendees. The topic I presented was “Deep dive into Kubernetes Networking”. Other than covering Kubernetes […]

This week, I did a presentation in Container Conference, Bangalore. The conference was well conducted and it was attended by 400+ quality attendees. I enjoyed some of the sessions and also had fun talking to attendees. The topic I presented was “Deep dive into Kubernetes Networking”. Other than covering Kubernetes […]

Debugging Container and Docker Networking issues can be daunting at first considering that containers do not contain any debug tools inside the container. I normally see a lot of questions around Docker networking issues in Docker and stackoverflow forum. All the usual networking tools can be used to debug Docker […]

Debugging Container and Docker Networking issues can be daunting at first considering that containers do not contain any debug tools inside the container. I normally see a lot of questions around Docker networking issues in Docker and stackoverflow forum. All the usual networking tools can be used to debug Docker […]

Last few months, I have been looking at Docker forums(https://forums.docker.com/, https://stackoverflow.com/questions/tagged/docker) and trying to understand some of the common questions/issues faced in the Docker Networking area. This prompted me to do 2 presentations: Docker Networking overview Docker Networking – Common issues and troubleshooting techniques I received positive feedback to these 2 […]

Last few months, I have been looking at Docker forums(https://forums.docker.com/, https://stackoverflow.com/questions/tagged/docker) and trying to understand some of the common questions/issues faced in the Docker Networking area. This prompted me to do 2 presentations: Docker Networking overview Docker Networking – Common issues and troubleshooting techniques I received positive feedback to these 2 […]

Starting with Docker 17.03, Docker introduced Community edition(CE) and Enterprise edition(CE) version of their Docker software. The release numbering also changed. From Docker 1.13.1, we jump to 17.03 version. Docker CE is the free version while Docker EE is the commercially supported enterprise version. Docker enterprise edition comes in different […]

X- ITM

Cloud Computing – Consultancy – Development – Hosting – APIs – Legacy Systems

X-ITM Technology helps our customers across the entire enterprise technology stack with differentiated industry solutions. We modernize IT, optimize data architectures, and make everything secure, scalable and orchestrated across public, private and hybrid clouds.

This image has an empty alt attribute; its file name is x-itmdc.jpg

The enterprise technology stack includes ITO; Cloud and Security Services; Applications and Industry IP; Data, Analytics and Engineering Services; and Advisory.

Watch an animation of  X-ITM‘s Enterprise Technology Stack

We combine years of experience running mission-critical systems with the latest digital innovations to deliver better business outcomes and new levels of performance, competitiveness and experiences for our customers and their stakeholders.

X-ITM invests in three key drivers of growth: People, Customers and Operational Execution.

The company’s global scale, talent and innovation platforms serve 6,000 private and public-sector clients in 70 countries.

X-ITM’s extensive partner network helps drive collaboration and leverage technology independence. The company has established more than 200 industry-leading global Partner Network relationships, including 15 strategic partners: Amazon Web Services, AT&T, Dell Technologies, Google Cloud, HCL, HP, HPE, IBM, Micro Focus, Microsoft, Oracle, PwC, SAP, ServiceNow and VMware

.

X ITM