Ansible scheduling with filters

The Ansible Automation Platform is a great tool for automation and configuration deployment. In General. That’s why I am also using it on my local clients to keep the configuration in sync and even do the most minuscule changes.

Very rarely I implement changes that do not need to be implemented right away or that will have to be reversed later.

The usual workflow for this is to wait until that moment, implement the change and roll it out. Or ... [continue reading]

Let’s set the ground for who the data analyst is; Core for the role is to have extensive knowledge of the business and its KPIs, about vision and objectives, about metrics that explains the details of the business model and where the target values are, in order to say whether business is successful against an objective. In case when new business objectives are defined, the data analyst supports stakeholders to build metrics to track objective knowing which data exists and ... [continue reading]

What is Streaming Data?

Streaming data is a continuous data flow generated from various data sources, which can be processed and analyzed in real-time by using streaming processing technology. Streaming data is used to describe continues and endless streams with no beginning or end and need to utilize without needing to be downloaded first. Streaming data can be generated by all types of sources, with various data types and volumes. Streaming’s counterpart method is ”batch” processes, which main difference ... [continue reading]

Power BI continues to be one of the most popular Business Intelligence solutions, gaining advantage by allowing teams to meet the needs of business users, data scientists and data science professionals and meet business needs in terms of business intelligence and reporting functions. However, analytical capabilities of Power Bi can be boosted through integration with R. Complementing Power BI with customized and statistical analysis, machine learning, and data visualization. Integration of Power BI and R brings benefits at every stage ... [continue reading]

Local MFA token

Recently my phone went out of order for a day. I immediately switched over to my backup phone and was back to normal after one hour.

This was a great opportunity to check if I still had all T’s crossed and I’s dotted and full control over my data in case of an unexpected event - like missing the phone.

Surprise: I wasn’t fully prepared.

While most applications and their data were recovered, easily restored and no data was lost, ... [continue reading]

What you’ll need to follow along

To gain some understanding about OpenID Connect and Keycloak no tools are needed. If you however want to experiment and follow along yourself on how to get started with OpenID connect and Keycloak you’ll need some basic tools.

Make sure to have the following installed:

  • JDK 8+
  • Maven
  • IDE/Text editor
  • Docker or Podman

Source code can be found here github.com/GustafNilstadius/OIDC-Keycloak-Vert-X-example.

Background

The predecessor of OpenID Connect is OAuth2.0 ... [continue reading]

More Common mistakes in Automation

This post is a follow up to our previous post 10 common mistakes in automation earlier this year.

When discussing Gartners list of mistakes in automation, we were missing some that we quite often see at our customers and decided these should also be mentioned.

This post continues the list. If you missed the previous post, you might want to head over there first.


11 - Fragmentary automation

This mistake can happen fast, especially in ... [continue reading]

10 Common mistakes in Automation

In April 2022 Gartner published an article about ten common mistakes when focusing on automation within a business.

We felt our customers would benefit from deepening and adding to their post.

Therefore here are the ten (same) points Garter already made, but explained in depth and backed up by our experience within this field.


01 - Falling in love with a single technology

Quite a common problem we encounter when assisting with introducing automation. Often a business ... [continue reading]

I work with Linux. That shouldn’t come as a surprise considering where I work. My private system does not differ that much either. Since I also work with automation my private systems are naturally configured automatically as well. I honestly cannot help it.

Bash aliases are a minor part of my configuration deployment and I tend to follow multiple approaches for handling my aliases in my environment.

This post is about my approach on handling the main part of ... [continue reading]

The most common firewall setups reject inbound traffic initiated from the internet as such (strict ingress firewall), but let all traffic pass through as long as the connection was initiated from the intranet (open egress firewall). I strongly believe that ingress firewalls are overrated and that it makes as much sense (maybe even more sense) to close the egress firewall.

The Log4Shell case

Yesterday some of us got quite busy with patching things and searching for vulnerable software due ... [continue reading]