Operations | Monitoring | ITSM | DevOps | Cloud

%term

Introduction to K8s Horizontal Pod Autoscaling | Monitor Autoscaling in Splunk Observability Cloud

In this video, I’m going to introduce you to Horizontal Pod Autoscaling in Kubernetes and monitoring autoscaling events in Splunk Observability Cloud. I’ll first walk through our simple application deployment definition. We will analyze the metrics of that application in Splunk Observability cloud, identifying that the application is under resource pressure. I’ll then discuss the scaling options at our disposal, and we will walk through an implementation of a Horizontal Pod Autoscaler that will automatically scale our pods according to the load they are receiving.

Why companies choose Adaptive Metrics and how they save time and (a lot of) money

Let’s cut to the chase: Managing metric volumes at scale is hard. In fact, when we asked the open source observability community about their biggest concerns in this year’s Grafana Labs Observability Survey, the top four responses — cost, complexity, cardinality, and signal-to-noise ratio — can all be tied back to exponential growth in telemetry data.

Building an asset attribution system for software security

Asset attribution is an operational necessity for robust digital protection, but hasn't always been easy to achieve. Especially when software state and ownership is unknown, or inconsistent. This blog delves into the historical complexities and challenges of asset attribution for security and engineering teams and explores how Internal Developer Portals like Cortex can help.

Contributing to Open Source: A Guide on Where and How to Get Started

Today, open source software is everywhere – from Linux-based servers, to Android smartphones, to the Firefox Web browser, to name just a handful of open source platforms in widespread use today. But the open source code that makes the world spin doesn't write itself. It's developed by open source contributors – including, potentially, you.

Optimizing VPN Performance and Availability with Network Observability by Broadcom

In recent years, hybrid work approaches have grown increasingly commonplace, and for a significant percentage of users, VPN is the go-to approach for accessing secured corporate resources and services. In fact, one article reveals that 72% of desktop and laptop users employ a VPN. As the reliance on hybrid work models and VPN connectivity continues to grow, VPN health has emerged as a critical success factor for businesses.

HEAL Software - Understanding the Unknown Unknowns

The term “unknown unknowns” refers to problems or vulnerabilities that have not yet been identified or anticipated. Unlike known issues, which can be addressed with existing knowledge and tools, unknown unknowns require a different approach to detection and resolution. These hidden issues are often beneath the surface, only becoming apparent when they cause significant disruption.