Operations | Monitoring | ITSM | DevOps | Cloud

Understanding and mitigating CVE-2020-8563: vSphere credentials leak in the cloud-controller-manager log

While auditing the Kubernetes source code, I recently discovered an issue (CVE-2020-8563) in Kubernetes that may cause sensitive data leakage. You would be affected by CVE-2020-8563 if you created a Kubernetes cluster over vSphere, and enabled vSphere as a cloud provider with logging level set to 4 or above. In that case, your vSphere user credentials will be leaked in the cloud-controller-manager‘s log.

New Gartner Report: How to lead digital disruption with programmable infrastructure

A hybrid infrastructure strategy is integral in creating a successful digital transformation in your enterprise. Programmable infrastructure (PI), or Infrastructure as Code, makes these strategies work in the real world. This blog will cover some highlights from the Gartner Report on why I&O leaders must adopt programmable infrastructure to enhance customer-focused agility.

Associating Incidents to a Problem

As defined by ITIL an ‘Incident’ is an unplanned disruption or reduction in quality of service and a ‘Problem’ is the underlying thing that caused the Incident. They are obviously related and there are endless pages on the internet going into incident and problem management as part of ITSM, so we won’t delve into this topic in any detail. The key issue is resolving the incidents themselves isn’t always enough, you need to get to the route cause of the problem.

AWS And Azure Dedicated Hosts Monitoring With VirtualMetric

Amazon Web Services and Microsoft Azure do not need any formal introduction. They are two major players in the cloud computing and virtualization industry. AWS leads with about 32% market share. On the other hand, Azure is the next closest with about 17% market share. Both the tech giants, AWS and Azure, have been on an onward growth trajectory with revenue boosts coming in every quarter.

Top 7 Reasons Why You Should Monitor Network Performance

Modern networks are complex beasts. With this complexity comes many opportunities for things to go wrong. Additionally, networks are often the backbone of businesses, and so when they don’t perform to the best of their capabilities, your business may suffer. As a network administrator, this is certainly something you’d rather avoid. One of the best ways to avoid business-impacting issues is to see them coming and fix them before they have a chance to wreak havoc.