Applied Trust has been producing The Barking Seal for our clients, supporters, and friends since 2003.
One of the greatest features of being consulting IT infrastructure engineers is that we have the opportunity to see, touch, and experience a wide variety of technologies and their successful (and sometimes, not so successful) application. We have the opportunity to solve problems that have never been solved before. And, every once in awhile, we make mistakes that provide good lessons. It's our hope that sharing some of these experiences will better our community as a whole. We hope you enjoy it!!
The workhorse of Microsoft server environments in the mid-2000s is reaching end of support. As of July 14, 2015 (just over 250 days as this post is being written), Server 2003 will be in the same situation as Windows XP was earlier this year, meaning no more security patches. That it's still possible (and likely)...continue reading
Graylog2 is an awesome tool that can provide insight into your environment to help you catch small problems before they become raging infernos. It’s also great at just making things more visible. Perhaps you’ll catch something in your logs that could be changed to make things run more efficiently. Stop looking th...
What is Fabric?
Fabric is an automation tool that lets you orchestrate commands run on servers via SSH using Python. It can be used to help automate deployments, run single or multiple comma...
This is the first installment of what I’m planning as a series (over the next few months) of short philosophical nuggets about lean ops/devops management.
Today’s topic: “Don’t bitch, just fix.” One universal truth is that we cannot change the past. Yet, when unex...
Our Process and Why it is Awesome
We work with a wide variety of technologies. From Windows to Linux with HP-UX, Solaris, and a VAX or two thrown in for good measure. Networking devices we’ve touched range from the over-the-counter DLinks to Cisco Nexus 7000s. We’ve load balanced with Stingray’s, F5s, an...
Software Defined Networking (SDN) promises a fantastic future, but it’s a safe bet that traditional network devices such as routers, switches, and firewalls aren’t going away anytime soon. In the meantime, each of those devices contains a unique configuration that you do not want to lose. Today, we are excited to...
Last night we hosted the DevOps Boulder meeting for July where we were regaled by Jason Hand of VictorOps and his discussion of Blameless Postmortems. This is a topic near and dear to our hearts as it is a practice we follow here.
Centralized logging should be common practice today in any environment, however it’s still surprisingly common to hear arguments against the practice, citing cost, complexity and usefulness as key reasons to not pursue a centralized logging strategy.
Why You Need Centralized Logging
Though not int...
On June 9, 2014, the world of IT infrastructure was quietly revolutionized with the release of Docker 1.0. At first glance, it seems benign enough; Docker is a project that “containerizes” applications. Built using the (also up-and-coming) Go language, Docker relies on LXC (Linux Containers), which have been in t...