Kubewarden v1.1.1 Is Out: Policy Manager For Kubernetes
We are happy to announce the first minor release of Kubewarden v1.0: v1.1.1 is now available! For those of you new to Kubewarden, it is a policy manager for Kubernetes.
We are happy to announce the first minor release of Kubewarden v1.0: v1.1.1 is now available! For those of you new to Kubewarden, it is a policy manager for Kubernetes.
We all know the story by now: we’ve entered a new era of work. And no, we’re not just referring to the pandemic, which forced businesses to accelerate digital transformation projects at an unprecedented speed.
As businesses shift to a digital-first environment, cloud computing will play a dominant role in delivering greater flexibility and faster innovation. In a recent report by Deloitte, nearly 90% of US-based senior decision makers proclaim cloud to be the cornerstone of their digital strategy. Covid accelerated cloud migration initiatives, with no signs of slowing down. Gartner forecasts worldwide end-user spend on public cloud services will grow by 20.4% in 2022 to a total of $494.7 billion.
When considering application source code, the way you maintain consistency throughout environments is mostly straightforward. You write application code, commit it to source control, and then build, test and deploy via a CI/CD pipeline. Since the application is defined by the source code living in source control, the build will be identical in all environments to which it’s deployed. But what about the infrastructure on which an application runs?
The Core Splunk platform is rightfully recognized as having sparked the log analytics revolution when viewed through the lenses of ingest, search speed, scale, and usability. Their original approach leveraged a MapReduce approach, and it still stores the ingested data on disk in a collection of flat files organized as “buckets.” These immutable buckets are not human-readable and largely consist of the original raw data, indexes (.tsidx files), and a bit of metadata.
Monitoring and reporting on your most important business metrics is a fundamental part of any APM or ITIM solution. Our Retrace Power User Tips and Tricks series has already looked at “Error and Log Management” functionalities. We’ve discussed useful, advanced features for monitoring app performance in our “Extending APM” post. In this latest edition, let’s take a look at how power users capture advanced server and application metrics.
Cybersecurity is a key priority for small, medium, and large companies. If you are a keen internet user or a lover of news and trending topics, I am sure you already know the current threats surrounding the cybersecurity realm. Cybersecurity threats are now a nightmare that faces all levels of organizations. Malware attacks, DDoS threats, phishing, brute force, SQL injections, etc. are running riot in the internet streets.
With the continued focus in our space on the movement from MSP to MSSP, it’s crucial to remember that products alone don’t necessarily make you an MSSP. For smaller customers, although you might be able to provide a range of security solutions (like EDR and backup) and compliment these with an RMM to provide insight and control over end user devices, this is not enough to call yourself an MSSP.