Nomad 0.2

Nov 18 2015 Alex Dadgar nomad

We are proud to announce the release of Nomad 0.2. Nomad is a distributed, scalable and highly available cluster manager and scheduler designed for both microservice and batch workloads.

The initial public release of Nomad was almost two months ago and we have been busy extending the system, improving user experience, and fixing bugs.

Nomad 0.2 brings many new features including service discovery, a system scheduler, restart policies, new constraint types, numerous client improvements, and much more. Please see the full Nomad 0.2 CHANGELOG for more details.

Download Nomad 0.2 here or read on to learn more about the major new features and improvements in Nomad 0.2.

read more

Jana Boruta Joins HashiCorp

Nov 9 2015 Mitchell Hashimoto hiring

Jana Boruta is now an employee of HashiCorp!

Jana is joining as our Director of Events. She was the mastermind behind HashiConf where her attention to detail and logistics management made the event an incredible success. She is joining us now full time to broaden the events we host and participate in.

read more

Diptanu Choudhury Joins HashiCorp

Nov 6 2015 Mitchell Hashimoto hiring

Diptanu Choudhury is now an employee of HashiCorp!

Diptanu is joining as an engineer and will be primary focused on Nomad. Diptanu was previously at Netflix, where he built their Titan cluster scheduler. His background in cluster scheduling, service discovery, IPC, and large scale distributed systems will help drive the evolution of Nomad.

read more

Vault: Cubbyhole Authentication Principles

Nov 4 2015 Jeff Mitchell vault

In the Vault 0.3 release post, the cubbyhole backend was introduced, along with an example workflow showing how it can be used for secure authentication to Vault. Here at HashiCorp, we believe that Cubbyhole-based authentication is the best approach for authenticating to Vault in a wide variety of use-cases. In this post we will explain why Cubbyhole may be the right authentication model for you, and present multiple considerations around Cubbyhole authentication to help fit a number of real-world deployment scenarios.

This post will first explain the motivation behind developing the Cubbyhole authentication model, then describe the model itself, and finally present some considerations for designing deployment scenarios.

read more