Do you want to deploy RabbitMQ as micro services in multiple virtual machines? Do you want the freedom to launch a RabbitMQ Docker container in any cloud, any infrastructure? Then my friend, you’re in the right place. Read on to find out how. Read More
In this blog post, we show how to install an ElasticSearch Cluster on any cloud in four easy steps. If you’re new to ElasticSearch, it is a powerful open source search and analytics engine that makes it easy to explore, query, and manipulate big data. It’s built on top of Apache Lucene, a Java search engine library. To process large amounts of data, it helps to configure ElasticSearch as a cluster on which different ElasticSearch nodes process data in parallel.
To install an ElasticSearch cluster on a Linux distribution using ElasticBox, you just need our ElasticSearch box where you can adjust configuration parameters to suit your scenario. Read More
If you’re making bulk changes or integrating automatically with ElasticBox, you can use the API to handle those functions. Which is why, when making API requests, you don’t want to compromise your login credentials. Use authentication tokens instead!
Gone are the days when you had to fret about an authentication method for API calls. Regardless of how you login to ElasticBox, be it Google, GitHub, username/password, or LDAP, you can connect over the API in an uniform way — using a token. Read More
If you have recently received the bill from your cloud provider, you may be still wondering how you spent all this significant amount of money in cloud resources. And if you’re using multiple cloud providers (like we do at ElasticBox), this problem is even more complicated. Evidently, you need to have much better insight into where your expenses are going. Resource tagging is a crucial technique to improve the cost efficiency and reduce your infrastructure bill. Read More
Nowadays, a majority of cloud service providers offer an API that allows users to interact with their infrastructure for the creation or deletion of resources, volumes, and images, to name a few. To use these APIs, users have to first authenticate using mechanisms based on key-password pairs.
However these mechanisms are quite cumbersome as users often have to search for their credentials on cloud provider websites or in their file systems. Besides, these key-password pairs are in the format of long and difficult chains of alphanumeric characters, which make them impossible or pretty difficult to remember. Read More