Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

An error occurred while submitting your form. Please try again or file a bug report. Close

  1. Blog
  2. Article

Jorge O. Castro
on 23 February 2016

Juju Charmer Summit: Design For Success


This talk from Juju Charmer Summit 2015 provides a comprehensive introduction to the pieces that make Juju magic happen. We recommend that anyone interested in writing Charms or the process of charming watch this talk as, like Juju itself, it distills best practices into a repeatable formula for success. Topics covered in this video include the basics, the juju dictionary, charm structure, actions, configurations, and testing.

Happy charming!

Related posts


Canonical
30 September 2025

Canonical achieves ISO 27001 certification

Canonical announcements Article

The certification demonstrates alignment with cybersecurity standards that will further safeguard open source products and services for use in the most demanding enterprise environments. Canonical is proud to announce it has achieved the ISO/IEC 27001 certification for its Information Security Management System (ISMS), following an extens ...


Jehudi
29 September 2025

Fortifying security for Ubuntu on Azure with Metadata Security Protocol (MSP)

Cloud and server Article

Ubuntu now supports Azure’s Metadata Security Protocol (MSP), raising the baseline for VM security on Azure. MSP locks down IMDS and WireServer behind HMAC-signed, identity-aware requests enforced by the azure-proxy-agent (Canonical’s integration of Microsoft’s GPA) using eBPF interception and per-endpoint allowlists. It must be enabled f ...


Stephanie Domas
24 September 2025

Beyond ‘whack-a-mole’ and insecticide

Ubuntu Article

Designing a new, robust, sustainable, and truly holistic approach to cybersecurity Talk to any cybersecurity expert or IT security manager, and they’ll tell you they’re sick of alerts and issues. For a while now, the industry has slowly been realizing that there’s a better way to improve cybersecurity and resolve security issues in IT wit ...