This is the first post in our series on how to automate your VM config. Post-deployment VM configuration can be done with BASH, Powershell, or cloud-init. This post covers how you can completely automate the configuration process.
This article provides an introduction to Tuono Environments. It covers Environments, venues, credentials, and jobs and how they fit in the Tuono cloud automation platform.
This blog shows how to use userdata to setup Docker and the required cloud infrastructure in the free tier of either AWS or Azure.
This article provides an introduction to Tuono Blueprints. It covers Blueprints, variables, and versioning and how they fit in a cloud automation ecosystem.
Public Key Authentication is a robust security framework that can be used by the SSH protocol to support both interactive (user) and automatic (programmatic) access to virtual machines. It is essential when enabling programmatic access to the components that comprise an application, e.g. the traditional client-server relationship.