Operations | Monitoring | ITSM | DevOps | Cloud

February 2021

12 Best Docker Container Monitoring Tools

Monitoring systems help DevOps teams detect and solve performance issues faster. With Docker and Kubernetes steadily on the rise, it’s important to get container monitoring and log management right from the start. This is no easy feat. Monitoring Docker containers is very complex. Developing a strategy and building an appropriate monitoring system is not simple at all.

Troubleshooting services on Google Kubernetes Engine by example

Applications fail. Containers crash. It’s a fact of life that SRE and DevOps teams know all too well. To help navigate life’s hiccups, we’ve previously shared how to debug applications running on Google Kubernetes Engine (GKE). We’ve also updated the GKE dashboard with new easier-to-use troubleshooting flows. Today, we go one step further and show you how you can use these flows to quickly find and resolve issues in your applications and infrastructure.

Announcing Support for GKE Autopilot

Google Kubernetes Engine (GKE) is the preferred way to run Kubernetes on Google Cloud as it removes the operational overhead of managing the control plane. Earlier today, Google Cloud announced the general availability of GKE Autopilot, which manages your cluster’s entire infrastructure—both the control plane and worker nodes—so that you can spend more time building your applications.

Sysdig contributes Falco's kernel module, eBPF probe, and libraries to the CNCF

Today, I’m excited to announce the contribution of the sysdig kernel module, eBPF probe, and libraries to the Cloud Native Computing Foundation. The source code of these components will move into the Falco organization and be hosted in the falcosecurity github repository. These components are at the base of Falco, the CNCF tool for runtime security and de facto standard for threat detection in the cloud.

Tanzu Tuesdays - Modern Application Configuration in Tanzu with Craig Walls

Historically, application configuration has been managed internal to an application deployment, in environment variables, or in files placed in the filesystem of the running application. As applications evolved into microservices, however, that approach become inadequate. Centralized configuration, including application-specific and shared configuration, versioning and rollback capabilities, and auditing became necessary. As more applications and microservices are becoming containerized and deployed in Kubernetes, configuration continues to be challenging. While Kubernetes offers configuration via ConfigMaps and Secrets, there’s no clear way to manage the properties going into those resources. In this Tanzu Tuesday session, we’ll explore the Tanzu Configuration Service, a means of managing configuration in a Kubernetes-native way using ConfigMaps, but that also offers the benefits afforded in a centralized configuration option.

Kaptain Is Aboard: v. 1.0 Is GA!

AI and Machine Learning (ML) are key priorities for enterprises, with a recent survey showing that 72% of CIOs expect to be heavy or moderate users of the technology. Unfortunately, other research has found that the vast majority—87%—of AI projects never make it into production. And even those that do often take 90 days or more to get there. Why this disconnect between intent and outcome? What are the roadblocks to enterprise ML? And what can be done about them?

What's new in Sysdig - February 2021

Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new features to all of our customers, automatically and for free! We hope you all managed to make it through January, and happy Lunar New Year! February welcomes the launch of our always-popular fourth annual Sysdig Container Security and Usage report, which looks at how global Sysdig customers of all sizes and industries are using and securing container environments.

Sysdig achieves Red Hat Vulnerability Scanner Certification

Image vulnerability scanning is a critical first line of defense for security with containers and Kubernetes. Today, Red Hat recognized Sysdig as a certified Red Hat security partner based on our work to standardize on Red Hat’s published security data with Sysdig Secure.

Container Monitoring: Essential Tools + Best Practices

In the Modern era of application development, businesses move towards building highly available, fault-tolerant, zero downtime applications to make the user experience and performance smoother and better. One of the essential steps in that process is containerization and orchestration of an application. A Container Monitoring process is as vital as containerizing your application.

VMware Spring Cloud Gateway for Kubernetes, the Distributed API Gateway Developers Love, Is Now GA

For all the talk of digital transformation, there’s one workflow that tends to hinder release velocity: changes to API routing rules. But while—much to the consternation of enterprise developers everywhere—this process has historically remained stubbornly ticket-based, Spring Cloud Gateway removes this bottleneck. The open source project provides a developer-friendly way to route, secure, and monitor API requests.

Bringing value to our members through automation using Ocean by Spot

Moving to Kubernetes gives applications the ability to scale, but it also introduces challenges to managing and operating cloud infrastructure. When giffgaff, a virtual mobile network, migrated to EKS, they needed to figure out how they would automatically scale their EC2 instances and how they would do so cost-efficiently. In this session, you’ll hear how giffgaff worked with Spot by NetApp to implement container-driven autoscaling for provisioning compute capacity and leverage spot instances to save big on their cloud bill.

Feature Spotlight: Golden Signals

As a team we have spent many years troubleshooting performance problems in production systems. Applications have gotten so complex you need a standard methodology to understand performance. Fortunately right now there are a couple of common frameworks we can borrow from: Despite using different acronyms and terms, they fortunately are all different ways of describing the same thing.

AI Chihuahua! Part II

With build-or-buy decisions, it often comes down to an all-in-one platform or a mixture of best-of-breed technologies. With open-source technology companies can actually get the best of everything. So, why not roll your own platform based on top-notch technologies? The real question is whether enterprises can afford to. Open-source software is free to use, but teams have to invest quite a bit in selecting, introducing, using, and maintaining these technologies.

Splunking AWS ECS Part 2: Sending ECS Logs To Splunk

Welcome to part 2 of our blog series, where we go through how to forward container logs from Amazon ECS and Fargate to Splunk. In part 1, "Splunking AWS ECS Part 1: Setting Up AWS And Splunk," we focused on understanding what ECS and Fargate are, along with how to get AWS and Splunk ready for log routing to Splunk’s Data-to-Everything platform.

Customizing Containers during App Modernization using CloudHedge

CloudHedge Transform provides the user with the option of modifying the data that goes into the container. It uses the data gathered from the X-Ray, a part of the CloudHedge Discover module that has been performed on the process. Using the Transform Platform, the user can currently: The Edit Dockerfile feature can be used to: And the File Selection feature can be used to.

How to reduce your AWS bill up to 60%

Let’s face it. Once you have consumed your free credit, AWS costs an arm and a leg. This is the price to pay for high-quality services. But how can you reduce your costs without sacrificing quality? This post will show you how to reduce your bill by up to 60% by combining four built-in features in Qovery. There are three categories of costs on AWS. The “data transfer”, the “compute”, and the “storage” costs.

Surviving the disaster: How to identify bugs immediately & get back on track w/ Codefresh & Rookout

Deploying through imperative kubectl commands is error-prone and time-consuming. In this webinar, we show you how to automate deployments to your Kubernetes cluster through Codefresh. Codefresh has several features to manage Kubernetes deployments, including the Kubernetes Environment Dashboard and the GitOps Dashboard.

Rancher Online Meetup - Feb 2020 - Longhorn 1.1 and Rancher

Join Rancher and SUSE at our next global meetup where we focus on the latest release from of CNCF Sandbox project Longhorn and its benefits for Rancher users. When used with Rancher, Longhorn 1.1 provides Kubernetes users with a reliable Kubernetes-native persistent storage solution from core to cloud to edge. This meetup will be hosted by Adrian Goins (Director of Community, SUSE). You will also hear directly from Sheng Yang (Principal Developer, Longhorn) and William Jimenez (Product Manager, Longhorn).

AI Chihuahua! Part I: Why Machine Learning is Dogged by Failure and Delays

AI is everywhere. Except in many enterprises. Going from a prototype to production is perilous when it comes to machine learning: most initiatives fail, and for the few models that are ever deployed, it takes many months to do so. While AI has the potential to transform and boost businesses, the reality for many companies is that machine learning only ever drips red ink on the balance sheet.

Kubernetes admission controllers in 5 minutes

Admission controllers are a powerful Kubernetes-native feature that helps you define and customize what is allowed to run on your cluster. As watchdogs, they can control what’s going into your cluster. They can manage deployments requesting too many resources, enforce pod security policies, and even block vulnerable images from being deployed. In this article, you’ll learn what admission controllers are in Kubernetes and how their webhooks can be used to implement image scanning.

Shielding your Kubernetes runtime with image scanning and the Sysdig Admission Controller

Implementing image scanning on a Kubernetes admission controller is an interesting strategy to apply policies that need Kubernetes context, and create a last line of defense for your cluster. You are probably following the image scanning best practices already, detecting vulnerabilities and misconfigurations before they can be exploited. However, not everything you deploy goes through your CI/CD pipeline or known registries. There are also third-party images and, sometimes, manual deploys.

Our Relentless Roll: D2iQ Konvoy 1.7 and D2iQ Kommander 1.3 are GA!

The latest versions of Konvoy and Kommander are now generally available: the D2iQ Kubernetes Platform (DKP) continues on its relentless roll. DKP is the leading independent Kubernetes platform for enterprise grade production at scale and Konvoy and Kommander are the reason why. You can learn more about Konvoy here, Kommander here, and our general approach here.

Kubernetes at Scale on the Public Cloud: Q&A with Forrester Research

Today’s enterprises are pushing forward with their digital transformation initiatives to meet customer and market demand. The latest CNCF survey reports that 91% of companies are running Kubernetes and 81% of those companies are running Kubernetes in production. That’s up from 58% in 2018, and the numbers continue to ramp up quickly. There’s several approaches to how enterprises are thinking about adoption and their deployment and management of Kubernetes. I sat down with Lauren E.

How to monitor Amazon ECS with Elastic Observability

With an increasing number of organizations migrating their applications and workloads to containers, the ability to monitor and track container health and usage is more critical than ever. Many teams are already using the Metricbeat docker module to collect Docker container monitoring data so it can be stored and analyzed in Elasticsearch for further analysis. But what happens when users are using Amazon Elastic Container Service (Amazon ECS)? Can Metricbeat still be used to monitor Amazon ECS? Yes!

The Coralogix Operator: A Tale of ZIO and Kubernetes

As our customers scale and utilize Coralogix for more teams and use cases, we decided to make their lives easier and allow them to set up their Coralogix account using declarative, infrastructure-as-code techniques. In addition to setting up Log Parsing Rules and Alerts through the Coralogix user interface and REST API, Coralogix users are now able to use modern, cloud-native infrastructure provisioning platforms.

Industry-First Pay-as-you-go SaaS Platform for Kubernetes Security and Observability

We are excited to introduce Calico Cloud, a pay-as-you-go SaaS platform for Kubernetes security and observability. With Calico Cloud, users only pay for services consumed and are billed monthly, getting immediate value without upfront investment.

Splunking AWS ECS Part 1: Setting Up AWS And Splunk

It’s no secret that Amazon Web Services is a powerhouse Cloud provider, and one of the market pioneers in Cloud operations. They do, after all, power some of the world’s biggest and most modern systems we all use and love today. It’s natural then that they attract a lot of users both big and small to deliver high quality and effective solutions. With growing user demand comes the need for new methods of visibility and intelligence.

Monitoring Challenges Emerge as Agencies Embrace Container Technology

Container technology is catching on big-time in the federal government as agencies such as the USDA and the National Institutes of Health look to containers to simplify software development and reduce costs. Containers offer enormous advantages over traditional “waterfall” application development processes. A containerized approach makes it easier for developers to create and deploy software faster and with fewer errors.

All Developers Need Is a Browser - How to be more productive by having less

What would you say if I told you that you can be as productive with the cheapest laptop as with the one you already have? Would you believe me if I said that there is no need for you to install an IDE, compilers, CLIs, Docker, and whatever else you might have on your laptop? How about having a full development environment created whenever you need it instead of dealing with Virtual Machines and whatever else might be fulfilling your development needs?

Automate Assessment and Analysis of Apps for Modernization

Thank you for reading my last blog on how to modernize age-old applications using automation. Let’s take a closer look at the available automated tools and explore the insights they extract to speed up app modernization. Assessment and Analysis The automation tool for application assessment should: There are free tools provided by cloud service providers, however, they focus more on infra (VMs and Bare Metal) and don’t focus on applications and databases (aspects mentioned above).

Runtime security in Azure Kubernetes Service

Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across your applications, infrastructure, and cloud environment. Runtime threats include things like: Even if you’re taking advantage of tools like container image vulnerability scanning, Kubernetes pod security policies, and Kubernetes network policies with AKS, not every risk will be addressed.

Using Google Container Registry To Invoke Codefresh Pipelines

If you are using a CI/CD tool, you likely are already familiar with workflows. Generally, workflows are a set of tasks, activities or processes that happen within a specific order. Within Codefresh, a popular workflow is to trigger Codefresh pipelines from Docker image push events. This moves the workflow forward from Continuous Integration to Continuous Deployment. Images can be promoted from one environment to the other through a variety of ways.

Accelerate Your Container Adoption with VMware Tanzu Build Service 1.1

Building containers securely, reliably, and consistently at scale is a daunting task. Yet, it’s an imperative for organizations embracing the rapid delivery of high-quality software. This is the scenario addressed by VMware Tanzu Build Service, which can help any enterprise IT group build and update containers automatically. And it’s flexible enough to slot right into any incumbent CI/CD toolchain.

Getting started with Kubernetes audit logs and Falco

As Kubernetes adoption continues to grow, Kubernetes audit logs are a critical information source to incorporate in your Kubernetes security strategy. It allows security and DevOps teams to have full visibility into all events happening inside the cluster. The Kubernetes audit logging feature was introduced in Kubernetes 1.11.

Comparison: Code Analysis Tools

Code analysis tools are essential to gain an overview and understanding of the quality of your code. This post is going to cover the following While these tools target similar use cases, they differ in their implementation, ease of use, and documentation just to name a few. This post provides an overview of each tool as well as a detailed comparison to help analyse and decide which tool is best suited for your needs.

Do Edge Applications Need Stateful Storage?

Kubernetes applications are increasingly making their way to the edge and embedded computing. Storage will quickly follow as the applications that rely on this edge infrastructure become more advanced and naturally carry more state. According to a study by McKinsey and Company, a “connected car” processes up to 25GB of data per hour.

Benefits of containers for enterprises

Within just five years, Kubernetes and containers have redefined how software is deployed. Researchers expect the container market to grow by 30% year over year to become a 5 billion industry by 2022. But what is the reason behind this mass adoption of container technology in the enterprise? Download whitepaper Containers are more resource efficient than virtual machines or other legacy app architectures.

How to Modernize Applications using Automation

Automation and adoption of cloud (public and/or private) are the two key components for the success of Digital Transformation. Automation has been synonymous with the agility and scalability of applications and infrastructure. DevOps ensures quick release of apps all the way from development to test to the stage to production. Cloud ensures quick allocation of resources (Compute, Memory, Storage, Network, etc.) for the applications.

Delivering Container Security in Complex Kubernetes Environments

You may have noticed the VMware Tanzu team talking and writing a lot about container security lately, which is no accident. As DevOps and Kubernetes adoption continue their exponential growth in the enterprise, securing container workloads consistently is among the most difficult challenges associated with that transformation. There is a term we have been seeing—and using—a lot lately that encompasses a new way of looking at container security for Kubernetes: DevSecOps.

What is Codefresh? Platform Overview

Brandon provides a high-level overview of the #Codefresh, The #1 #GitOps automation platform for #Kubernetes apps. TIMESTAMPS 00:00 - What is Codefresh? 00:26 - Key Integrations 01:06 - Codefresh Pipelines 01:28 - Live pipeline debugging 01:44 - Pipeline composition 01:50 - Open-source steps library, custom steps, and freestyle steps 02:20 - Conditional logic, variables, and breakpoints 02:43 - Trigger capabilities 03:15 - Granular control over concurrency 03:40 - DevOps dashboards & traceability 04:19 - Helm deployments and release boards 04:32 - GitOps support & ArgoCD Integration

New year, New York, new CivoStack

When we first started our managed Kubernetes beta, we knew utilising K3s as the Kubernetes distribution of choice was the right move. Not only is it light-weight and quick to deploy, K3s has features ideally suited for the scenarios we envisioned our users would encounter. It’s important for us to make sure any service we offer is 100% compatible with industry standards, and K3s allows us to do just that but with simplicity and speed for our users.

To Build a Production App Platform with Kubernetes, Focus on Developer Experience

To get developers to adopt Kubernetes, it's important to keep in mind that it's not about Kubernetes! It's about the developer experience we create on top of it. At VMware Tanzu, we believe that success with platforms like Kubernetes is found at the intersection of applications and infrastructure, focusing on creating a great developer experience and enabling platform teams in modern practices that will help them be successful on Day 2.

Talking Shipa - "What's New in 1.2?"

Shipa is excited to launch our new webcast series, Talking Shipa. To kick this series off, we sat down with Shipa Founder and CEO, Bruno Andrade, to discuss the release of Shipa Application Management Framework for Kubernetes, version 1.2. In this video, Bruno spends a few minutes with us to talk about the new features and improvements that are packed into this new release.

Operationalizing Kubernetes

Organizations have now seen the value of building microservices. They are delivering applications as discrete functional parts, each of which can be delivered as a container or service and managed separately. But for every application, there are more parts to manage than ever before, especially at scale, and that’s where many turn to an orchestrator for help.

Rancher Online Meetup: January 2021 - k3d: Local Development with K3s Made Easy

In this meetup we'll show you how to get productive developing locally on Kubernetes with the help of k3d which lets you spin up a K3s cluster on your laptop. We'll guide you through a full development setup including the k3d CLI, the awesome new vscode-k3d plugin and synergy with tools like Skaffold or Tilt.

Portainer recommends MicroK8s for effortless deployment

Portainer is an open source tool that allows for container deployment and management without the need to write code. In their recent publication, ‘How to deploy Portainer on MicroK8s’, the Portainer team share with the community how easy and fast it is to deploy Portainer on MicroK8s. In fact, the entire process only requires a single command! For a step-by-step walkthrough of the process, take a look at Portainer’s 5 minute video below. Install MicroK8s

AI in telecom: an overview for data scientists

I have seen many junior data scientists and machine learning engineers start a new job or a consulting engagement for a telecom company coming from different industries and thinking that it’s yet another project like many others. What they usually don’t know is that “It’s a trap!”. I spent several years forging telecom data into valuable insights, and looking back, there are a couple of things I would have loved to know at the beginning of my journey.

Cloud Suitability Analyzer: Scan and Score Your Apps' Cloud Readiness for Faster Migration

Migrating to the cloud is a significant, complicated endeavor, one that requires a realistic migration plan for any application portfolios that will be mapped out first. To get started, a detailed technical analysis of each application's cloud readiness helps determine the best cloud migration approach and strategy to take. If this sounds like a daunting process, that’s because it often is! Let's understand why.

Detecting MITRE ATT&CK: Defense evasion techniques with Falco

The defense evasion category inside MITRE ATT&CK covers several techniques an attacker can use to avoid getting caught. Familiarizing yourself with these techniques will help secure your infrastructure. MITRE ATT&CK is a comprehensive knowledge base that analyzes all of the tactics, techniques, and procedures (TTPs) that advanced threat actors could possibly use in their attacks. Rather than a compliance standard, it is a framework that serves as a foundation for threat models and methodologies.

Real-time monitoring of Formula 1 telemetry data on Kubernetes with Grafana, Apache Kafka, and Strimzi

Data streaming is important for getting insights in real time and reacting to events as fast as possible. Its application is wide, from banking transactions and website click analytics to IoT devices and motorsports. The last example represents a really interesting use case.

Protecting Against the Unpatched Kubernetes Vulnerability (CVE-2020-8554)

CVE-2020-8554 is a vulnerability that allows Kubernetes Services to intercept cluster traffic to any IP address. Users who can manage services can exploit the vulnerability to carry out man-in-the-middle (MITM) attacks against pods and nodes in the cluster. All Kubernetes versions including the latest release (v1.20) are vulnerable to this attack. If your cluster is multi-tenant, or allows unprivileged users to create and update services, you are impacted.

Kubernetes Observability Challenges: The Need for an AI-Driven Solution

Kubernetes provides abstraction and simplicity with a declarative model to program complex deployments. However, this abstraction and simplicity create complexity when debugging microservices in this abstract layer. The following four vectors make it challenging to troubleshoot microservices.