GitHub Actions is a powerful tool for automating software workflows, and it can be used to build, test, and deploy code right from GitHub. It provides a way to automate repetitive tasks and can be integrated with many popular tools and platforms.
GitHub Actions can use two types of runners: hosted and self-hosted.
Hosted runners are provided by GitHub and run on virtual machines in the cloud.
Self-hosted runners are machines that you set up and manage yourself. They run on your infrastructure, and you can customize them to meet your needs.
In this tutorial, we will show you how to set up GitHub’s self-hosted runner on Kubernetes.
Before you begin, make sure you have the following:
A Kubernetes cluster
Access to a GitHub repository for creating PAT and adding runners.
As the Edtech industry continues to grow and evolve, the need for reliable and secure network infrastructure becomes imperative. Recently I got a chance to work on an Edtech project where we had to manage multiple Virtual Private Clouds (VPCs) and on-premises networks in order to accommodate their different environments – development, testing, and production.
Managing these networks separately was quite challenging and also made it difficult to troubleshoot any issues. This is where we thought of leveraging AWS Transit Gateway. In this blog, we’ll explore the capabilities of AWS Transit Gateway.
Transit Gateway can make your routing easy with the simple configuration just by making simple Transit attachments. See how it works.
What is Transit Gateway?
Transit gateways help you to connect multiple VPCs, multiple Transit Gateway, network Appliance, AWS Direct Connect Gateway, and VPN to transit Gateway. It helps you in making your routing flow understandable and easy to maintain. More over you can say it’s serverless of your VPC peering Service.
In organizations, employees often need access to various Azure services to perform their tasks. They can use services like SQL database or Azure container services when the system administrator assigns them a user id and password for each service. However, managing multiple user logins for each service can be a hassle for administrators, especially in organizations with over 1000 employees. Azure Active Directory (AD) helps solve this issue by enabling administrators to manage multiple user logins in a centralized manner.
In the IT industry, the need for migration can raise several questions in your mind. Like what will be migrated and what measures should be taken to perform the particular migration. And the major concern is whether there are any chances of losing data. Losing even a tiny fraction of the data in transition can impact the performance of the application. So, in that scenario there are several measures that need to be kept in our mind while performing any sort of migration is taking a backup of the data, software configuration, and if any plugin is required for the software so that should also be checked. Apart from that migration should always take place when the least traffic comes on the application.
So, recently we got a requirement where we had to upgrade a self-managed Gitlab Community Edition(CE) from 11.11 to the latest version i.e., 15.4.
While upgrading Gitlab to any other version you might face many problems related to incompatible versions. So, for a successful upgrade, we’ll discuss the GitLab requirements for the upgradation and will also share the analyses that we found while following through this blog post.
Are you searching for service discovery or a service mesh tool for a distributed environment?
Did you find any with easy installation? Not yet!! Think fast….It’s just a piece of cake.YES! NO! Calm down because I got it !!!!
A few days back we got a requirement where we had to setup multiple services on multiple servers and in a cluster mode….So now the question arises how will the services be auto discovered? how will we get to know the health check of the service? and above all how to restrict users on different services. After a lot of research, I came across a tool named as consul. But now another stumbling block arises HOW TO SETUP IT?
Your answer might be just go ahead and download the binary on every server, if that’s what you’re thinking…then STOP! Because doing it manually on plenty of servers is time-consuming and also not an efficient way. So, I thought of using a configuration management tool that is none other than ansible. Then there were roles that were already present in the market but some have the hard coded encryption key, some were not generating the bootstrap token and also they were not easy to understand. None of the roles fulfilled the requirement.
So, I thought of creating an ansible role with features like, enabling ACL and generating a bootstrap token, and an encryption key with easy-to-understand language.
In this blog, I have explained the OT-OSM consul ansible role.