Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Introducing Rancher on NetApp HCI: Hybrid Cloud Multicluster Kubernetes Management with Push-Button Ease

If you’re like me and have been watching the odd purchasing trends due to the pandemic, you probably remember when all the hair clippers were sold out — and then flour and yeast. Most recently, you might have seen this headline: Tupperware profits and shares soar as more people are eating at home during the pandemic. Tupperware is finally having its day. But a Tupperware stacking strategy is probably not why you’re here.

Cloud Cost Management with HashiCorp Terraform & Densify

Watch and learn how automated infrastructure management withink HashiCorp Terraform and machine-learning-based cost optimization analytics can be combined as part of DevOps and provisioning processes to continuously make FinOps a part of everyday cloud infrastructure management.

Full Steam Ahead! D2iQ Konvoy 1.6 and D2iQ Kommander 1.2 are GA!

The latest versions of Konvoy and Kommander are now available, continuing the rapid progress and relentless innovation that has characterized the D2iQ Kubernetes Platform (DKP) from its inception. We are also updating our integrated GitOps capabilities, and streamlining their integration with DKP to improve both developer and operator experiences and remove friction from the development and deployment pipelines.

How to deploy the Elastic Stack on Red Hat OpenShift with ECK

Managing hundreds or thousands of containers has quickly become the standard for many organizations. With infrastructures growing more complex, we want every user to find value with Elastic (regardless of where or how they operate). We created Elastic Cloud on Kubernetes (ECK) — the official Operator — to simplify setup, upgrades, scaling, and more for running Elasticsearch and Kibana on Kubernetes.

Cybersecurity defenses for IIoT

Cybersecurity attacks on industrial IoT solutions can have detrimental consequences. This is the case because IoT devices record privacy-sensitive data and control production assets. Therefore, demonstrable trustworthiness is prerequisite to IoT adoption in industrial settings. Fortunately, IT security is a mature field. Experts have identified classes of threats devices may be subject to. Let’s discuss these threat patterns and mitigation strategies in the IIoT context.

Edge computing is dead, long live micro clouds and IoT gateways

“The King is dead, long live the King.” It might be my french roots speaking, but it seems that actual use cases are replacing King Edge, and it might be for the best. Warning; do not read this blog if you’re particularly sensitive about edge computing (and if you don’t know what this is about, read the “What’s the deal with edge computing?” blog first).