Operations | Monitoring | ITSM | DevOps | Cloud

All you need to know about Horizontal Pod Autoscaling in Kubernetes

For most organizations, Kubernetes is the preferred containerization platform thanks to its scaling capabilities. Scaling is more than a mere technical endeavor—it helps maintain reliability, efficiency, and smooth user experiences while handling huge data without any business disruptions. It also aids in reducing business expenditures by cutting down on manual labor and avoiding deployment failures.

Kubernetes cluster metrics 101

Kubernetes clusters facilitate the management of containerized applications. Imagine coordinating a seamless flow of workloads across servers, ensuring they operate in harmony, regardless of scale. This is exactly what Kubernetes clusters can do for the smooth deployment of your applications. Read on to learn more about Kubernetes clusters, including how to manage them using our list of critical metrics.

Monitoring database exposure on Kubernetes and VMs

This week, security researchers at Wiz published a report about an internal database at DeepSeek being exposed to the internet. This kind of security risk is surprisingly common and can affect any company. The only way to prevent it is through continuous monitoring. But in modern infrastructures, services can be exposed in many different ways, making detection tricky. At Coroot, we realized that the telemetry data we already collect can help identify these risks — without requiring any extra setup.

IT Made Simple: Automate Endpoint Management with NinjaOne

Join NinjaOne for a dynamic webinar designed to equip IT leaders with the tools to drive efficiency and innovation. In today’s complex IT landscape, the need for efficiency, security, and visibility has never been greater. Disconnected tools create silos, increase operational overhead, and leave IT teams struggling to deliver consistent results. During this event, you'll see how NinjaOne simplifies workflows, empowers IT teams to elevate help desk performance, and provides strategic insights that position your organization for success.

3 Approaches to AI That Every IT Manager Should Know

Our AI by Design series explored responsible approaches to developing artificial intelligence (AI) systems. Now, it’s time to get practical about leveraging this exciting technology to transform our daily operations. Our upcoming blog series identifies three types of AI adoption—diagnostic, assistive, and automated—and helps you determine where these distinct applications fit into your workflow.

Streamlining CI/CD Pipelines with Automated Policy Checks

Continuous Integration and Continuous Deployment (CI/CD) pipelines power modern DevOps. They enable teams to deliver software faster, with greater reliability and confidence. However, as development accelerates, ensuring security, compliance, and quality becomes increasingly complex. Automated policy checks streamline CI/CD pipelines by addressing these challenges directly.

Interrupt Live: Noah Pendleton | MCU SDK Engineer @ Memfault

On this episode of Interrupt Live, we'll meet Noah Pendleton, an MCU SDK Engineer at Memfault. He'll share why he wrote the article "Publishing the Memfault SDK as an ESP-IDF Component. They discuss the development of an ESP component for the Memfault SDK, exploring Noah's background in firmware engineering, the process of creating and publishing the component, and the importance of automation in development. They also share insights on the ESP-IDF framework and future plans for further contributions to the community. takeaways.

A Deep Dive into Blackbox Monitoring - Tech Talk #1

Do you have any blackboxes that do not provide any monitoring data except for letting you know things are broken? Do you wish you had a way to know your systems were healthy without the constant vigilance? In our January tech talk, on Blackbox, we will explore how to gain valuable insights into your application's health and performance from an external perspective.