Home Blog Page 413

Proxmox Virtualization Manager

Without a doubt, if you only want to manage a few VMs, you are significantly better off with a typical virtualization manager than with a tool designed to support the operation of a public cloud platform. Although classic VM managers are wallflowers compared with the popular cloud solutions, they still exist and are very successful. Red Hat Enterprise Virtualization (RHEV) enjoys a popularity similar to SUSE Linux Enterprise Server (SLES) 12, to which you can add extensions for high availability (HA) and which supports alternative storage solutions.

Another solution has been around for years: Proxmox Virtual Environment (VE) by Vienna-based Proxmox Server Solutions GmbH. Recently, Proxmox VE reached version 5.0. In this article, I look at what Proxmox can do, what applications it serves, and what you might pay for support.

KVM and LXC

Proxmox VE sees itself as a genuine virtualization manager and not as a cloud in disguise. At the heart of the product, Proxmox combines two virtualization technologies from which you can choose: KVM, which is now the virtualization standard for Linux, and LXC, for the operation of lightweight containers. Proxmox also gives you the choice of paravirtualizing the whole computer or relying on containers in which to run individual applications (Figure 1).

Read more at ADMIN

The Linux Ranger: What Is It and How Do You Use It?

For those of us who cut our technical teeth on the Unix/Linux command line, the relatively new ranger makes examining files a very different experience. A file manager that works inside a terminal window, ranger provides useful information and makes it very easy to move into directories, view file content or jump into an editor to make changes.

Unlike most file managers that work on the desktop but leave you to the whims of ls, cat and more to get a solid handle on files and contents, ranger provides a very nice mix of file listing and contents displays with an easy way to start editing. In fact, among some Linux users, ranger has become very popular.

Read more at Network World

Singularity HPC Container Start-Up – Sylabs – Emerges from Stealth

The driving force behind Singularity, the popular HPC container technology, is bringing the open source platform to the enterprise with the launch of a new venture, Sylabs Inc., which emerged this week from stealth mode.

Sylabs CEO Gregory Kurtzer, who founded the Singularity project along with other open source efforts, said his startup would bring the horsepower of Singularity containers to a broader set of users. Kurtzer said the launch of Sylabs coincides with greater enterprise reliance on high-end computing. “There’s a shift happening,” he said.

As the enterprise container ecosystem continues to expand, most of that infrastructure is designed to deliver micro-services. The startup’s goal is to deliver “enterprise performance computing,” or EPC, moving beyond services to handle more demanding artificial intelligence, machine and deep learning as well as advanced analytics workloads.

Read more at HPCWire

Advanced Dnsmasq Tips and Tricks

Many people know and love Dnsmasq and rely on it for their local name services. Today we look at advanced configuration file management, how to test your configurations, some basic security, DNS wildcards, speedy DNS configuration, and some other tips and tricks. Next week, we’ll continue with a detailed look at how to configure DNS and DHCP.

Testing Configurations

When you’re testing new configurations, you should run Dnsmasq from the command line, rather than as a daemon. This example starts it without launching the daemon, prints command output, and logs all activity:

# dnsmasq --no-daemon --log-queries
dnsmasq: started, version 2.75 cachesize 150
dnsmasq: compile time options: IPv6 GNU-getopt 
 DBus i18n IDN DHCP DHCPv6 no-Lua TFTP conntrack 
 ipset auth DNSSEC loop-detect inotify
dnsmasq: reading /etc/resolv.conf
dnsmasq: using nameserver 192.168.0.1#53
dnsmasq: read /etc/hosts - 9 addresses

You can see tons of useful information in this small example, including version, compiled options, system name service files, and its listening address. Ctrl+c stops it. By default, Dnsmasq does not have its own log file, so entries are dumped into multiple locations in /var/log. You can use good old grep to find Dnsmasq log entries. This example searches /var/log recursively, prints the line numbers after the filenames, and excludes /var/log/dist-upgrade:

# grep -ir --exclude-dir=dist-upgrade dnsmasq /var/log/

Note the fun grep gotcha with --exclude-dir=: Don’t specify the full path, but just the directory name.

You can give Dnsmasq its own logfile with this command-line option, using whatever file you want:

# dnsmasq --no-daemon --log-queries --log-facility=/var/log/dnsmasq.log

Or enter it in your Dnsmasq configuration file as log-facility=/var/log/dnsmasq.log.

Configuration Files

Dnsmasq is configured in /etc/dnsmasq.conf. Your Linux distribution may also use /etc/default/dnsmasq, /etc/dnsmasq.d/, and /etc/dnsmasq.d-available/. (No, there cannot be a universal method, as that is against the will of the Linux Cat Herd Ruling Cabal.) You have a fair bit of flexibility to organize your Dnsmasq configuration in a way that pleases you.

/etc/dnsmasq.conf is the grandmother as well as the boss. Dnsmasq reads it first at startup. /etc/dnsmasq.conf can call other configuration files with the conf-file= option, for example conf-file=/etc/dnsmasqextrastuff.conf, and directories with the conf-dir= option, e.g. conf-dir=/etc/dnsmasq.d.

Whenever you make a change in a configuration file, you must restart Dnsmasq.

You may include or exclude configuration files by extension. The asterisk means include, and the absence of the asterisk means exclude:

conf-dir=/etc/dnsmasq.d/,*.conf, *.foo
conf-dir=/etc/dnsmasq.d,.old, .bak, .tmp 

You may store your host configurations in multiple files with the --addn-hosts= option.

Dnsmasq includes a syntax checker:

$ dnsmasq --test
dnsmasq: syntax check OK.

Useful Configurations

Always include these lines:

domain-needed
bogus-priv

These prevent packets with malformed domain names and packets with private IP addresses from leaving your network.

This limits your name services exclusively to Dnsmasq, and it will not use /etc/resolv.conf or any other system name service files:

no-resolv

Reference other name servers. The first example is for a local private domain. The second and third examples are OpenDNS public servers:

server=/fooxample.com/192.168.0.1
server=208.67.222.222
server=208.67.220.220

Or restrict just local domains while allowing external lookups for other domains. These are answered only from /etc/hosts or DHCP:

local=/mehxample.com/
local=/fooxample.com/

Restrict which network interfaces Dnsmasq listens to:

interface=eth0
interface=wlan1

Dnsmasq, by default, reads and uses /etc/hosts. This is a fabulously fast way to configure a lot of hosts, and the /etc/hosts file only has to exist on the same computer as Dnsmasq. You can make the process even faster by entering only the hostnames in /etc/hosts, and use Dnsmasq to add the domain. /etc/hosts looks like this:

127.0.0.1       localhost
192.168.0.1     host2
192.168.0.2     host3
192.168.0.3     host4

Then add these lines to dnsmasq.conf, using your own domain, of course:

expand-hosts
domain=mehxample.com

Dnsmasq will automatically expand the hostnames to fully qualified domain names, for example, host2 to host2.mehxample.com.

DNS Wildcards

In general, DNS wildcards are not a good practice because they invite abuse. But there are times when they are useful, such as inside the nice protected confines of your LAN. For example, Kubernetes clusters are considerably easier to manage with wildcard DNS, unless you enjoy making DNS entries for your hundreds or thousands of applications. Suppose your Kubernetes domain is mehxample.com; in Dnsmasq a wildcard that resolves all requests to mehxample.com looks like this:

address=/mehxample.com/192.168.0.5

The address to use in this case is the public IP address for your cluster. This answers requests for hosts and subdomains in mehxample.com, except for any that are already configured in DHCP or /etc/hosts.

Next week, we’ll go into more detail on managing DNS and DHCP, including different options for different subnets, and providing authoritative name services.

Additional Resources

Learn more about Linux through the free “Introduction to Linux” course from The Linux Foundation and edX.

The Complete Schedule for Open Networking Summit North America Is Now Live

Early Registration Ends in 3 Days; Save $805 & Register Now!

The Open Networking Summit North America (ONS) schedule is now live and features 75+ sessions across 6 tracks:

  • Networking Business and Architecture
  • Service Provider & Cloud Networking (Business & Architecture)
  • Service Provider & Cloud Networking (Technical)
  • Enterprise IT (Business & Architecture)
  • Enterprise IT DevOps (Technical)
  • Networking Futures

Read more at The Linux Foundation

DevOps Metrics

Collecting measurements that can provide insights across the software delivery pipeline is difficult. Data must be complete, comprehensive, and correct so that teams can correlate data to drive business decisions. For many organizations, adoption of the latest best-of-breed agile and DevOps tools has made the task even more difficult because of the proliferation of multiple systems of record-keeping within the organization.

One of the leading sources of cross-organization software delivery data is the annual State of DevOps Report (found at https://devops-research.com/research.html).2 This industry-wide survey provides evidence that software delivery plays an important role in high-performing technology-driven organizations. The report outlines key capabilities in technology, process, and cultural areas that contribute to software-delivery performance and how this, in turn, contributes to key outcomes such as employee well-being, product quality, and organizational performance.

Read more at ACM Queue

Integrating Continuous Testing for Improved Open Source Security

Preventing new security flaws is conceptually simple, and very aligned with your (hopefully) existing quality control. Because vulnerabilities are just security bugs, a good way to prevent them is to test for them as part of your automated test suite.

The key to successful prevention is inserting the vulnerability test into the right steps in the process, and deciding how strict to make it. Being overly restrictive early on may hinder productivity and create antagonism among your developers. On the flip side, testing too late can make fixing issues more costly, and being too lenient can eventually let vulnerabilities make it to production. It’s all about finding the right balance for your team and process.

Here are a few considerations on how to strike the right balance.

Read more at O’Reilly

IOT Trends To Watch Out For In Mobile App Development

At the moment, mobile app development is in its prime. No doubt, these recent years have been phenomenal for mobile particularly now that that many business organizations and individuals are recognizing mobile apps to be more of a necessity than an optional investment. Today, any business person looking to meet customer demands and boost sales must pass through the way of mobile for sure.

At the moment, one of the most actively growing sectors in the industry is mobile app development whose market is currently been dominated by gaming apps, lifestyle, social media, and Google apps. While small and medium-size businesses are struggling to create their own apps and follow the mobile trend, many large companies such as banks, retailers, hospitability etc. are already employing mobile applications to enhance and improve direct their marketing, customer engagement, and branding activities.

Obviously, the future of mobile application development is bright. The internet of things (IoT) is one of the most recent innovative technologies transforming app development in the mobile world.

The Impact of IOT in Mobile App Development

This trend which involves connecting all kinds of gadgets to the web is already gaining fast momentum and also impacting mobile app development in a very significant way. As a matter of fact, many top app development companies are now getting themselves engaged in the business of controlling physical devices through a smartphone.

There are fairly obvious and plentiful options to benefit from connected things. Users can effectively obtain full control of the features offered by connecting several gadgets and machines to their smartphones. IoT is helping apps to push notifications directly to the phone by running them through the internet. It also makes it possible for users to switch these systems on and off remotely since it allows update parameters.

The scope to access IoT-enabled devices is better provided via mobile phones and mobile app programming. Currently, some sectors such as hospitality, travel, retail, education, and healthcare are employing mobile connectivity and apps to access IoT ecosystems. Thanking an IoT approach to mobile app development comes with lots of benefits including:

– It provides a faster means of accessing information than web browsing. As a matter of fact, customers will not have to wait so long for sites to load before they can access applications as this won’t even take a minute.

– The integration of IoT in mobile app development will go a long way in making the entire development process affordable. The cost of sending SMSes and newsletters can be effectively reduced through this means. This is because apps can now integrate direct communication with customers via messages.

Currently, app developers and mobile app development company alike are trying so hard to transform the mobile app development space by building IoT-friendly apps that are capable of rendering customer-centric services at any time.

Reasons for Integrating IoT Mobile Strategy into App Development

No doubt, the mobile app development world is amazing, but there are quite a lot more things to benefit from IoT which just beginning to emerge. In order to provide end users with the topical product, it is imperative for app developers India to keep up with the latest trends in this sphere. As a matter of fact, there are some serious technical challenges that they need to address including testing requirements for IoT apps and learning how to meet the security analytics.

Here are some meaningful reasons why app developers India and mobile app development businesses should consider the development of IoT mobile apps.

– Regardless of where users are located on the face of the earth, they can always access mobile apps on their smartphones. Due to the highly flexible accessibilities of these apps, there has been an increasing demand for mobile apps in recent times.

– Like social platforms, IoT is basically concerned with the interconnectivity of devices and how they interact. Since mobile apps offer enabling features such as comments, likes, share etc., for social platforms they have proven to be very efficient at boosting IoT capabilities.

– Aside from their excellent abilities to promote brands, mobile applications can win over the most customers for any business. Companies are using their mobile apps to not only enhance user engagement but to persuade customers to buy their products and use their services. This is how they expand their customer base.

– It only takes seconds to spread information to a target audience through a mobile app. With the use of some helpful mobile features such as push notifications, companies are connecting with customers and reminding them of relevant updates.

– Unlike traditional websites where information is somewhat limited and restricted to certain areas and demographics, customers can now access information on just about anything through the use of their smartphones. Nowadays, mobile applications are considered more important for business growth and expansion than websites because they offer more quality browsing experience and buying options.

Mobile App Development: IoT Trends to Watch Out For

With each passing day, the mobile app development world is constantly evolving. However, it is fascinating to see how a beginner industry such as the Internet of Things (IoT) is transforming mobile technology. Many app developers India are now coming to understand how IoT and mobile app improvements can boost connection and improve interaction between people around the world. This has led to the emergence of several devices controlled by many businesses online which in turn are helping to boost productivity and response times.

One major area of concern for the development in any enterprise app is security. When tangible (physical) devices become the first entry point to communication there is every possibility that IoT could drastically improve the overall defense barriers of mobile app development.

In less than no time, there’ll probably be a technological explosion in the mobile app development world as more and more app developers India begin to take up the challenge of using IoT to drive the development process. This will lead to a wide-spread of IoT devices around the world thereby boosting customer communication and user engagement.

Don’t Fear the Regex: Getting Started on Regular Expressions

According to good ol’ Mozilla Developer Network, “Regular Expressions are patterns used to match character combinations in strings.”  Yes, strings as in text or — as the authors of Programming Perl point out — “If you take ‘text’ in the widest possible sense, perhaps 90 percent of what you do is 90 percent text processing.”

This is useful because regular expressions can match just about any pattern. They are fast — faster than the recursive cruft required to not write regex, for sure. And while regexes aren’t the easiest to read, especially for newcomers to the syntax, consider whether you’d rather put in the effort required to puzzle out the logic of one line of cryptic letters and symbols versus the dozens of lines of non-regex code required to achieve the same result.

Read more at The New Stack

Kubernetes for Dev Infrastructure

Kubernetes is one of the hottest open-source projects these days. It’s a production-grade container orchestration system, inspired by Google’s own Borg and released into the wild in 2014. Thousands of developers joined the project since then, and now it’s becoming an industry standard for running containerized applications. Kubernetes is designed to run production workloads on a scale, but it’s capable of much more. In this article, I’ll talk about my experience setting up a Kubernetes cluster as a core component of a development infrastructure while working at ThoughtSpot.

I was initially assigned to solve an easy-sounding problem: make integration tests faster. There were a few hundreds of Selenium-based workflows, which were running sequentially and taking up to 10 hours to complete. The obvious solution was to parallelize them. The problem was that they were not designed to run concurrently…

Read more at HackerNoon