Author: ProHoster

Monitoring and logging external services to a Kubernetes cluster

Good to everyone. I did not find a generalized guide on logging and collecting metrics from third-party services on systems deployed in Kubernetes on the net. I am posting my solution. This article assumes that you already have a working Prometheus and other services. The PostgreSQL DBMS in a Docker container will be used as an example of a data source for an external stateful service. The company uses […]

OpenLinux as part of SIM7600E-H modules

The mechanism for developing a custom application and loading it into a module is available under both Linux and Windows operating systems. In this article, we will take a detailed look at how, using the examples from the SDK provided by SIMCom Wireless Solutions, to compile and load a custom application into the module. Before writing the article, a friend of mine, who is far from developing under Linux, asked for […]

Tango Controls

What is TANGO? It is a system for managing various hardware and software. TANGO currently supports 4 platforms: Linux, Windows NT, Solaris and HP-UX. Work with Linux (Ubuntu 18.04) will be described here. Why do you need it? Simplifies work with various hardware and software. You do not need to think about how to store data in the database, this is […]

Ford Mustang Mach-E electric car will learn to steer for the driver, but you have to look at the road

The automotive industry's transition to electric vehicles and driver assistance technologies go hand in hand. Following these trends, Ford has decided to use its all-electric Mach-E SUV as the first vehicle to feature Ford Co-Pilot 360 2.0 technology. The main innovation is the use of a driver-facing camera to improve safety. Mustang Mach-E drivers will be able to purchase Active Drive Assist (...

Russian industrial smartphone MIG S6 can be used in an explosive environment

The Mobile Inform Group company announces that the MIG S6 smartphone has been certified for compliance with the requirements of the technical regulations of the Customs Union on the safety of equipment for working in explosive environments. The named device belongs to industrial class devices. The smartphone is made in accordance with the IP-68 standard: it is not afraid of hour-long immersions under water to a depth of 1,2 meters. Except […]

Appeared the first "live" photo of the gaming smartphone ASUS ROG Phone III

An image of an advertising poster for the new and as yet unannounced gaming smartphone ASUS ROG Phone III has appeared on the Chinese social network Weibo, as well as the first “live” photo of the device. The photo shows the back of the device. Looking at it, you can immediately notice the RGB backlight, which clearly hints at the gaming nature of the future new product. You can also notice that ASUS ROG Phone III has […]

Release of programming language Perl 5.32.0

After 13 months of development, a new stable branch of the Perl programming language was released - 5.32. In preparing the new release, about 220 thousand lines of code were changed, the changes affected 1800 files, and 89 developers took part in the development. At the same time, it was announced that Perl development and bug tracking would be moving to the GitHub platform. Branch 5.32 was released in accordance with the approved seven […]

Calculate Linux 20.6 released

A release of the Calculate Linux 20.6 distribution is available, developed by the Russian-speaking community, built on the basis of Gentoo Linux, supporting a continuous update release cycle and optimized for rapid deployment in a corporate environment. The new version has optimized loading, reduced RAM requirements, and added support for preconfiguring browser plugins for working with Nextcloud. The following distribution editions are available for download: Calculate […]

Vulnerability in UEFI for AMD processors, allowing code execution at the SMM level

AMD announced that it is working on a fix for a series of “SMM Callout” vulnerabilities (CVE-2020-12890), which allows you to gain control of UEFI firmware and execute code at the SMM (System Management Mode) level. An attack requires physical access to the equipment or access to the system with administrator rights. In case of a successful attack, the attacker can use the AGESA (AMD Generic Encapsulated Software Architecture) interface […]

Calculate Linux 20.6 released

Released on June 21, 2020. On the occasion of the 20th anniversary of Calculate, we are pleased to present to your attention a new release of the Calculate Linux 20.6 distribution! The new version has optimized loading, reduced RAM requirements, and added support for preconfiguring browser plugins for working with Nextcloud. The following distribution editions are available for download: Calculate Linux Desktop with KDE desktop (CLD), […]

Proper Comparison of Kubernetes Apply, Replace and Patch

For Kubernetes, there are several options for updating resources: apply, edit, patch, and replace. There is confusion about what each of them does and when to apply them. Let's figure it out. If you search Google for the phrase "kubernetes apply vs replace", there is an answer on StackOverflow that is not correct. When searching for "kubernetes apply vs patch" the first link is documentation on […]

Deployment of distributed services in Yandex.Cloud using Grafana as an example

Hi all! As part of my course work, I was researching the capabilities of such a domestic cloud platform as Yandex.Cloud. The platform offers various services for solving practical problems. However, sometimes it is necessary to configure your cloud application with a rather extensive infrastructure based on these services. In this article, I want to share the experience of deploying such an application. What do you want to receive? Grafana- […]