Operations | Monitoring | ITSM | DevOps | Cloud

Webinar: Exploring Kubernetes 1.18 with Alex Ellis

With the release of Kubernetes 1.18, we saw 40 features and updates added. In a recent blog post we collated these together in one place so that you can learn what may affect your clusters and prepare for change. Now, we go one step further, inviting Alex Ellis, CNCF Ambassador and Open Source project founder to share his take on the changes. We saw Alex’s in-depth article on the recent deprecations around “kubectl run” and asked him to pick four of his highlights to share with examples.

Troubleshooting microservices on K8S

What’s the best way to troubleshoot an application made up of multiple microservices, distributed across multiple nodes and multiple pods? In this training session we will cover a variety of Kubernetes troubleshooting tips and tricks, and you’ll learn how Calico Enterprise can help provide valuable visibility and reduce troubleshooting time in complex networks of microservices.

Extending Your Fortinet FortiManager to Kubernetes

Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiManager and Calico Enterprise, you gain access control and full visibility into the container environment along with centralized management. In this webinar, you will learn how Calico Enterprise and FortiManager enable you to.

Application Performance Monitoring (APM) for HTTP URLs

Since its beginning, Obkio's solution focused on Network Monitoring with the Network Performance Monitoring and Network Device Monitoring feature sets. With these features, IT teams can monitor and troubleshoot intermittent network issues with precise network metrics including some Quality of Experience (QoE) metrics based VoIP Quality and MOS Score.

GitLab Summit 2020 recap: Using messaging for better remote DevOps collaboration

As many on-site organizations scramble to adopt remote work, DevOps teams are turning to messaging and integrated workflows to collaborate effectively. Usual office work practices are changing, and people are having to adapt to a remote-first approach. This demands a change to your company culture, a remote mindset and the tools to deliver it.

Why You Need Security Operations

A fully grown security operations center (SOC) was, until recently, a luxury, affordable for the largest organizations only, but even in global players, budget constraints are real. Unfortunately, the willingness to raise money for security seems to require an incident first. However, we often forget there’s no need for a dedicated war room, and it doesn’t always require a full team. Centralized security can be outsourced.

7 Tips to Make Digital Performance Monitoring More Effective

A poorly performing website or web application hurts the end-user experience and can result in lost revenue and customers. That’s why businesses seek better tools and processes to simplify digital performance monitoring to expedite detection and troubleshooting of performance issues. There are numerous website performance and availability monitoring tools available for this purpose.

Air Gap Distribution Delivers Peace of Mind to Isolated Environments

The best way to stay out of danger is to keep far away from where danger lurks. But in the internet age, the global network means risk to your systems is from everywhere, at all times. With estimates that worldwide damage from cybercrime will exceed 6 trillion dollars by 2021, many companies choose, or are required by regulations to isolate their most sensitive systems to avoid any type of security breach.