Every business needs their essential equipment to operate at peak efficiency and utilization to realize their return on capital investments.

This equipment could range from aircraft engines, turbines, elevators, or industrial chillers that cost millions to purchase.

For maintenance of this equipment, businesses follow the approaches below:

  1. Most of the businesses depend on Corrective Maintenance that ensures parts are used completely, but this costs business in downtime, labour, and unscheduled maintenance requirements, etc.
  2. Some of the businesses have gone next level by practicing Preventive Maintenance, where they determine the lifetime of each part and perform maintenance before the actual failure…

The Internet of Things (IoT) has opened up a new, virtually inexhaustible source of technical innovations, which are equally valuable for a broad variety of industries. Applying smart connected devices, sensors, and gateways to control each part of the production process, manufacturing, and infrastructure companies are dramatically increasing their operational efficiency. At the same time, the consumer tech market has exploded with an abundance of smart products and spin-off cloud services that they brought to life. …


The Internet of Things (IoT) has opened up a new, virtually inexhaustible source of technical innovations, which are equally valuable for a broad variety of industries. Applying smart connected devices, sensors, and gateways to control each part of the production process, manufacturing, and infrastructure companies are dramatically increasing their operational efficiency. At the same time, the consumer tech market has exploded with an abundance of smart products and spin-off cloud services that they brought to life.

With this context, let us check one of the IoT use cases on how to visualize Device Data using Azure Time Series Insights.

Azure…


Kubernetes, as we know, coordinates a highly available cluster of computers that are connected to work as a single unit. Kubernetes contains a number of abstractions that allows deployment of containerized applications to the cluster without attaching them to individual machines.

In short, Kubernetes is -

  • Portable: public, private, hybrid, multi-cloud
  • Extensible: modular, pluggable, hook able, composable
  • Self-healing: auto-placement, auto-restart, auto-replication, auto-scaling

In this post,we are going to take look at steps on how to back up and restore your Kubernetes cluster resources and persistent volumes using Velero open source tool.

First off, let’s understand the typical scenarios where you…


Today we are going to learn about how to aggregate Docker container logs and analyse the same centrally using ELK stack. ELK stack comprises of Elasticsearch,Logstash, and Kibana tools.Elasticsearch is a highly scalable open-source full-text search and analytics engine. It allows you to store, search, and analyze big volumes of data quickly and in near real time.Kibana is like window into the Elastic Stack. It enables visual exploration and real-time analysis of your data in Elasticsearch. Logstash is the central dataflow engine in the Elastic Stack for gathering, enriching, and unifying all of your data regardless of format or schema.If…


Linux containers has been around since the early 2000s and architected into Linux in 2007. Due to small footprint and portability of containers, the same hardware can support an exponentially larger number of containers than VMs, dramatically reducing infrastructure costs and enabling more apps to deploy faster. But due to usability issues, it didn’t kick-off enough interest until Docker (2013) came into picture.

Unlike hypervisor (ex. Xen,hyper-v) virtualization, where virtual machines run on physical hardware via an intermediation layer (hypervisor), containers instead run user space on top of an operating system’s kernel. That makes them very lightweight and fast.

Containers…


In Microservice ecosystem, usually cross-cutting concerns such as service discovery, service-to-service and origin-to-service security, observability and resiliency etc., are deployed via shared asset such as an API gateway or ESB. As microservice grows in size and complexity, it can become harder to understand and manage.

Service mesh technique addresses these challenges where implementation of these cross-cutting capabilities is configured as code. A service mesh provides an array of network proxies alongside containers. Each proxy serves as a gateway to each interaction that occurs, both between containers and between servers. The proxy accepts the connection and spreads the load across the…


With the increasing adoption of containers and microservices in the enterprises, there is need now to focus on structuring the containers and other distributed building blocks so that we can solve some of the common design challenges.In this post,we take look at some of the key design patterns that could be used in Docker,Kubernetes and other container platforms.The foundation work was actually done by Brendan Burns and David Oppenheimer in their container design patterns paper,this post summarizes the key design patterns.

#1.Side Car Pattern

In this pattern, the sidecar is attached to a parent application and provides supporting features for the application. …


This story uses affiliate links.When you click an affliate link,we get a small compensation at no cost to you.Thanks for your support!

Data Science has been ranked as one of the hottest professions and the demand for data practitioners is booming. Data Scientists perform sophisticated empirical analysis to understand and make predictions about complex systems. They draw on methods and tooling from probability and statistics, mathematics, and computer science and primarily focus on extracting insights from data. They communicate results through statistical models, visualizations, and data products.

Per IBM study, By 2020 the number of Data Science and Analytics job…


Google has recently introduced , an open-source tool for building container images from a Dockerfile even without privileged root access. If you’ve noticed, Docker daemon always runs as the root user. It actually binds to a Unix socket instead of a TCP port.

By default, Unix socket is owned by the user root and other users can only access it using sudo command. With kaniko, we can build an image from a Dockerfile and push it to a registry without root access. …

KarthiKeyan Shanmugam

Experienced IT Professional. Check out my blog at https://upnxtblog.com. Also check out my course aggregation site at https://skillmeup.xyz

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store