Operations | Monitoring | ITSM | DevOps | Cloud

%term

Microservices Security Summer Camp Session 3 - How to Evaluate Microservices Security Solutions

When evaluating a security solution for modern applications, you’ll need a checklist based on the best practices. Many checklist items are standard and you can adopt those from this webcast. Others may be specific to your environment and compliance requirements and we will be covering those in the Q&A.

Microservices Security Summer Camp Series 2 - Best Practices for Securing Infrastructure

Microservice applications are packaged as containers and require orchestration by infrastructure management software like Kubernetes. Kubernetes will be the focus of this discussion on best practices to secure these dynamic environments. Join us to learn the tips and traps for securing the infrastructure for modern applications.

Guest Blog Post: Ballerina Makeover with Grafana

In this guest blog post from the folks at Ballerina, Anjana shows you how you can easily visualize metrics from a Ballerina service with Grafana, walking you step by step through the installation and configuration of the components. They’ve also extended an offer for a free ticket to their upcoming Ballerinacon to the Grafana community.

Zipkin vs Jaeger: Getting Started With Tracing

Request tracing is the ultimate insight tool. Request tracing tracks operations inside and across different systems. Practically speaking, this allows engineers to see the how long an operation took in a web server, database, application code, or entirely different systems, all presented along a timeline. Request tracing is especially valuable in distributed systems where a single transaction (such as “create an account”) spans multiple systems.