Flux7 Tech Tutorials

Toolchain Guides and Lessons

Virtual Private Cloud (VPC) Best Configuration Practices

As we at Flux7 Labs AWS partners work on deployments for our customers, many ask questions about basic AWS security issues, including those addressed by using Virtual Private Clouds (VPCs). So in this post, we provide a guide for setting up and using VPCs in order to help guide your AWS setup. This AWS VPC tutorial is based on our experience from using VPN in AWS deployments both for Flux7 Labs’ internal systems and for our customers’ systems. VyScale, our cost- and performance-management solution, is an excellent tool for setting up systems inside of VPCs.

IAM Roles as IaC for Secured Access Control of Business Accounts

Experts agree that the biggest security threat comes from inside the business. While reports of breaches from insider threats range from Security Intelligence’s 75% to 60% in an IBM survey, the overarching point is clear: intentionally or unintentionally employees present the biggest security risk. Identity and Access Management (IAM) helps address this threat by applying the principle of least privilege, keeping the business safe by allowing internal employees, external customers, and business partners access to only those resources necessary to perform their function.

Serverless Framework Deep Dive

Engineers are understandably attracted to serverless as it allows them to execute code in response to events without the complexity of building and maintaining infrastructure. In a previous article, we shared how a serverless framework allows you to develop, deploy, test, secure and monitor any number of serverless applications with increased agility and a lower cost of ownership.  While we compared different models and gave a high-level overview of serverless with example use cases, in today’s article, we’ll highlight how Flux7 implemented a serverless framework for one of its customers with best-practices. 

Ganglia – A walkthrough

Ganglia is a distributed and highly-scalable cluster monitoring tool based on a hierarchical model that supports a federation of clusters. Ganglia is easy to use, to install and to customize. It allows monitoring of memory, disk, CPU usage and other aspects of vital cluster health, and makes that information available for offline analysis.

RabbitMQ Tutorial: Creating Highly Available Message Queues Using RabbitMQ

Every day in the world of modern technology, high availability has become the key requirement of any layer in technology….

Web Apps: WebSockets with AWS Elastic Load Balancing

Amazon Web Service (AWS) Elastic Load Balancing (ELB) is widely used to build highly available and highly scalable architectures. Nowadays, ELB is as common as EC2 is for many customers using AWS. And, Elastic Load Balancing supports the following protocols: HTTP, HTTPs, TCP and TCPs.

AWS Best Practice: Azure AD SAML Authentication Configuration for AWS Console

As AWS experts, we often get asked how different technologies can work with AWS. Most recently we had a customer ask us how to use Azure Active Directory (AD) to manage user authentication to access the AWS console. While we don’t often discuss hybrid cloud technologies in this blog, we thought we’d share with you how we configured Azure AD to manage access to the AWS console.

Docker Tutorial Series, Part 1: An Introduction | Docker Components

Docker, the new trending containerization technique, is winning hearts with its lightweight, portable, “build once, configure once and run anywhere” functionalities. This is part one of Flux7’s Docker tutorial series. As we move forward, together, we will learn and evaluate how Docker makes a difference, and how it can be put to the best use. Let’s learn Docker and nail it in less than six to seven weeks.

Docker Tutorial Series, Part 2: The 15 Commands

In part one of our Docker Tutorial Series, we learned about the basics of Docker. We examined how it works and how it’s installed. In this post, let’s now learn the 15 Docker commands and get some hands-on experience in how they are used and what they do.

Docker Tutorial Series, Part 3: Automation is the Word Using DockerFile

In our last Docker tutorial series post, we shared the 15 commands that got us onboard with Docker. This set…

Docker Tutorial Series, Part 4: Registry & Workflows

In the previous Docker Tutorial Series post, we discussed the importance of DockerFile and provided a list of DockerFile commands that makes the automation of image creation easier. In this post, let’s talk about a significant Docker component: Docker Registry. This is the central registry for all repositories, public and private, and their workflows.

Docker Tutorial Series, Part 5: Docker Security

Docker Security Security is taken seriously when dealing with open source accountability. And it’s no different when developers embrace using Docker, by building applications locally right up to production deployments. A big responsibility that comes with being deployed in so many places is a serious focus on the security of Docker as a project and a platform. As a result, we’ve decided to discuss in part 5 of our Docker Tutorial Series, the key areas of security Docker focuses on and why they matter to overall Docker Security.

Docker Tutorial Series, Part 6: The Next 15 Docker Commands

In an earlier post for the Docker Tutorial Series, we discussed the first 15 Docker commands. We shared some hands-on experience in how they are used and what they do. In this post, we will talk about another 15 Docker commands, leading us to a more practical experience using Docker.

Docker Tutorial Series, Part 7: Ultimate Guide for Docker APIs

Throughout our Docker Tutorial Series, we have discussed many significant Docker components and commands. In today’s series installment, we dig deeper into Docker and uncover Docker APIs.

Docker Tutorial Series, Part 8: Docker Remote API

In the last post, as part of our on-going Docker Tutorial Series, we discussed Docker Hub and Docker Registry API. In today’s post, let’s delve into Docker Remote API. Docker Remote API Docker Remote API is a REST API that replaces the remote command line interface — rcli. For the purpose of this tutorial, we have used cURL which is a command line tool that handles url manipulations. It helps make requests, get and send data, and retrieve information.

10 Steps Deploying Docker Containers on AWS Elastic Beanstalk

Amazon Web Services (AWS) Elastic Beanstalk (EB) is a service to deploy your code. This easy-to-use service works as a...

Why we Recommend Everyone use Amazon CloudWatch Logs

For assured success, it is important to monitor your systems for ongoing operational efficiency, security, and compliance with internal policies. In June we shared with you our Enterprise DevOps Framework in which inspectors, like logs, play a critical role in analyzing services in the pipeline and landing zone to ensure compliance with operational, security, and regulatory requirements.

Single Node OpenStack Installation | Cloud Computing

OpenStack is highly configurable meeting different needs by providing numerous storage and networking options. The first step to design your own architecture is to choose whether to use a single node or multi-node configuration.

OpenStack Multi-Node Installation | Control, Network & Compute – Flux7

In a previous blog article, we discussed how to install and use a single-node in OpenStack. In this post, we will discuss how to install multi-nodes in OpenStack.