Operations | Monitoring | ITSM | DevOps | Cloud

Containers

The latest News and Information on Containers, Kubernetes, Docker and related technologies.

Introduction to Kubernetes Network Policy with Use Cases

In Kubernetes, Network Policy allows you to define a policy determining what traffic is allowed to flow to and from specific workloads. By default, Kubernetes permits ingress and egress traffic to and from all pods in a namespace. Without correct configuration your risk of a significant security breach is high. Attend this webinar and learn best practices in configuring Kubernetes network security.

Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3

TLS v1.3 introduces several new security improvements over TLS 1.2 but some of these enhancements have an impact on network-based security solutions such as IDS/IPS. While the goal is to enhance the overall security at the application level, there are a few scenarios that are not easily solved when introducing the new technology, especially in Kubernetes environments. Watch this webinar to learn about security and compliance considerations for Kubernetes when implementing TLS v1.3.

Improving Security Forensics in Kubernetes Environments

The success of Kubernetes has made monitoring and alerting more difficult for traditional Security Information and Event Management (SIEM) tools. Attend this live webinar to learn how implementing the right network security and compliance solution will improve the accuracy and completeness of security forensic monitoring and alerting when using Kubernetes.

An Excerpt from Docker Monitoring

Lately, IT teams are looking for Docker monitoring tools as legacy products like cAdvisor and Sysdig cloud do not offer greater insights. Docker monitoring needs a crucial change in the way your agents, plug-ins, and monitoring works to support containers. Many enterprises have started deploying significant production workloads on Docker, it seems there is a substantial shift towards adopting Docker.

Monitoring Java applications: Memory usage, threads and other JRE metrics

In this post we will cover how to monitor the Java Runtime Environment (JRE). You will learn how to assess the performance of your Java application by profiling its memory usage, the garbage collector metrics, monitoring Java daemon and user threads and other fundamental JRE metrics. We will finish with a real Java JRE troubleshooting example using opensource Sysdig and Docker.

Sysdig Monitor 3.0 - Enterprise-grade Prometheus, Kubernetes insights and more.

Today we announced the launch of enterprise-grade Prometheus monitoring with Sysdig Monitor 3.0. We’ve added new Prometheus capabilities like PromQL, a Grafana plugin and new enhancements for our already rich Kubernetes monitoring. If you love Prometheus like we do, and especially if your cloud environment is growing quickly, read on to learn more about what we’re doing with Prometheus, Kubernetes and more.

StackStorm Enterprise HA in Kubernetes - eta

More groups are progressing from just talking about Event-Driven Automation to actually doing it in practice. StackStorm helps make this easy. When organizations start offloading business-critical tasks and automating for real it becomes essential to ensure that the Automation engine itself is not a single point of failure when it is responsible for recovering a fleet of servers, managing datacenters, and automating remediations.