Tag : tutorial

Kpack, oh kpack, wherefore art thou build logs?

Any CI/CD is just like a serverless platform or PaaS: you run other people’s code. The difference? With a platform you expect the code to work. With CI/CD you’re waiting for things to fail. So you can fix them. Until they work. Hopefully. And to fix them you need logs. kpack is a new open

Dr Nic Williams Profile Image

Posted by:
Dr Nic Williams

Read More ➝
Where is PostgreSQL Getting That $%&^ing Configuration Parameter From?

​ Photo by Steve Smith on Unsplash Like a squirrel looking for a lost nut, finding where a configuration parameter is being set in PostgreSQL can be a pain in the (fluffy) tail. For example, the log_min_duration_statement which is used to configure the threshold duration of a query before it is logged can be set

Chris Weibel Profile Image

Posted by:
Chris Weibel

Read More ➝
Creating an App Registration in Azure

You want to automate the deployment of your Azure infrastructure. Great! But now you need to create an account for your automation to access Azure’s API. Azure implements these in the form of what they call App Registrations. In order to create one, you will need access to create accounts in Azure Active Directory. If

Thomas Mitchell Profile Image

Posted by:
Thomas Mitchell

Read More ➝
Adding pgBadger to the PostgreSQL Helm Chart

pgBadger is a helpful tool which will generate reports and diagrams about the type and pattern of sql queries over time that are submitted to PostgreSQL. The tool works by reading the PostgreSQL logs (not transaction logs) which are not typically enabled by default in the helm chart. Below are a few methods for leveraging

Chris Weibel Profile Image

Posted by:
Chris Weibel

Read More ➝
CredHub: Keys must be PEM-encoded PKCS#1 keys.

Credhub keeps your credentials out of your configuration files.  On a recent project, I was adding certificates and their private keys to a CredHub instance so that Concourse could retrieve them to configure and then deploy a Cloud Foundry foundation that would then use these certificates. To do this, I ran: credhub set –name /path/to/certificate

MichaelFerris Profile Image

Posted by:
MichaelFerris

Read More ➝
Modifying the Default PostgreSQL Helm Chart to Emit Logging

Photo by Aleksandar Radovanovic on Unsplash While using the PostgreSQL Helm Chart I wanted to take a look at the queries which were running. I quickly realized I needed to enable the logging to see all the DML goodness to later feed into pgBadger to review the usage patterns of the queries. Below are three

Chris Weibel Profile Image

Posted by:
Chris Weibel

Read More ➝
Formatting Terraform Lists as Strings

I’m deep in the weeds again. I’m inside of a YAML document inlined inside of a heredoc inside of a bash script that exists as a string inside of a heredoc inside of a Terraform configuration file written in HCL. It’s not my finest work, but it’s up there. To complete this masterpiece, I simply

Thomas Mitchell Profile Image

Posted by:
Thomas Mitchell

Read More ➝
Jumping through tunnels (A guide to SSH-ProxyJump)

At some point, we’ve all been in an environment similar to the one shown above and had the fun experience of SSHing from one Jumpbox to the next in order to access a deployment in a more secure environment. Now if this is a rare occurrence, it isn’t a big issue. The real annoyance comes

Dobmeier David Profile Image

Posted by:
Dobmeier David

Read More ➝
Logging Into Concourse From a Remote System

Authentication Scenarios When using Concourse in several environments, you’ll eventually end up in a situation where you’re on a remote system (Jumpbox, Docker Container, etc) and need to use fly to get or set a pipeline, or hijack into a job and troubleshoot a task. This is where things get a bit interesting. If you

Dobmeier David Profile Image

Posted by:
Dobmeier David

Read More ➝