Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Containers, Kubernetes, Docker and related technologies.

How to easily add application monitoring in Kubernetes pods

The Elastic APM K8s Attacher lets the Elastic APM agent auto-attach to the application in your pods by adding just one annotation to your deployment The Elastic® APM K8s Attacher allows auto-installation of Elastic APM application agents (e.g., the Elastic APM Java agent) into applications running in your Kubernetes clusters. The mechanism uses a mutating webhook, which is a standard Kubernetes component, but you don’t need to know all the details to use the Attacher.

EKS Add-ons And Integrations: Evaluating Cost Impacts

Amazon Kubernetes Service (EKS) has rapidly become the de facto solution for organizations seeking to deploy, manage, and scale containerized applications using Kubernetes. EKS simplifies the complexities associated with Kubernetes, allowing teams to focus on developing and deploying applications more efficiently. However, as organizations scale their Kubernetes environments, managing and optimizing costs can quickly become a significant concern.

Unlock the Secrets of Machine Learning: A Beginner's Guide with Josh Mesout - Navigate Europe 23

Dive into the world of machine learning with Josh Mesout. This video is a great starting point for beginners, offering a practical approach to understanding and applying machine learning concepts. Follow along as Josh demonstrates setting up a machine learning environment on Civo and explores a PyTorch notebook for handwriting recognition. Whether you're coding along or just watching, this session is packed with useful tips and resources for your machine learning journey. Don't forget to check out our GitHub repository for additional materials and join the conversation in the comments!

Docker Log Rotation Configuration Guide | SigNoz

It is essential to configure log rotation for Docker containers. Log rotation is not performed by default, and if it’s not configured, logs on the Docker host can build up and eat up disk space. This guide will teach us how to set up Docker log rotation. Logs are an essential piece of telemetry data. Logs can be used to debug performance issues in applications.

Supercharge FinOps Programs with Resource Guardrails

Time and time again we hear the same statements from FinOps teams with respect to what is holding back optimization of wasteful cloud resource consumption. Engineers and App Owners are interested in helping but stop short at actually taking actions to reduce that waste. There are many reasons for this main sticking point when it comes to application owners and developers taking action.

Building Controllers with Python Made Easy with Steve Giguere - Navigate Europe 23

Join Steve Giguere and Matt Johnson in this comprehensive workshop from Navigate Europe '23, focusing on Kubernetes Admission Controllers. Learn to build these controllers from scratch using Python, understand their role in Kubernetes security, and get hands-on with real-world applications.

Why Kubernetes For Developers is the Next Big Thing

Let's face it! Kubernetes is the standard for container orchestration, reshaping how we deploy and manage applications for the last 8 years - do you even remember when you run "docker run " on an application server? 😁. However, it's crucial to recognize that Kubernetes was never initially designed with the everyday developer in mind.

Supercharge FinOps Programs with Cloud Resource Optimization

Time and time again we hear the same statements from FinOps teams with respect to what is holding back optimization of wasteful resource consumption. Engineers and App Owners are interested in helping but stop short at actually taking actions to reduce that waste. There are many reasons for this main sticking point when it comes to application owners and developers taking action.

How We Leveraged the Honeycomb Network Agent for Kubernetes to Remediate Our IMDS Security Finding

Picture this: It’s 2 p.m. and you’re sipping on coffee, happily chugging away at your daily routine work. The security team shoots you a message saying the latest pentest or security scan found an issue that needs quick remediation. On the surface, that’s not a problem and can be considered somewhat routine, given the pace of new CVEs coming out. But what if you look at your tooling and find it lacking when you start remediating the issue?