Operations | Monitoring | ITSM | DevOps | Cloud

Enable GitOps for Kubernetes Security - Part 1

“How do I enable GitOps for my network policies?” That is a common question we hear from security teams. Getting started with Kubernetes is relatively simple, but moving production workloads to Kubernetes requires alignment from all stakeholders – developers, platform engineering, network engineering, security. Most security teams already have a high-level security blueprint for their data centers.

Service Monitoring and You

Monitoring is an art form. That sounds cheesy and lazy, but the right kind of monitoring is very context-dependent and rarely does the same practice work across multiple pieces of software or people. This gets even harder when you think about modern software architectures. Microservices? Container schedulers? Autoscaling groups? Serverless? ${New-technology-that-will-solve-all-of-my-problems-but-probably-creates-other-problems}?

Hybrid Cloud Monitoring: Defining a Strategy

When we are faced with the challenge of hybrid cloud monitoring, the golden dream of a single monitoring platform is reawakened in us. It would be ideal to have a tool that would allow us to see in a single screenshot what is happening throughout our platform, including those resources that we have decided to establish in the cloud, in other words, it should not discriminate between private and public networks.

Context is Everything - How SPS Commerce uses context to embrace complexity

If there is one thing that all Software as a Service (SaaS) companies understand, it is the pressure of “being fired”, as SPS Commerce’s Andy Domeier puts it. SPS Commerce is a cloud-based supply chain management software company and Andy is a Senior Director of Technology there - so he knows what he is talking about. Part of the core value of buying SaaS solutions is that you are typically buying a subscription, which means that you can also cancel that subscription at some point.

What is DevOps?

Digitalization is sweeping across many industries, creating a huge need for innovation. This innovation forces companies to be more agile and deliver faster. However, increasing the speed of your development team doesn’t happen by magic. It’s a metric that isn’t easy to change. How can you adjust to this fast-paced digitalization? I want to introduce you to DevOps.

Poor Work Experiences Are a "We" Problem

A few weeks ago I attended the Digital Workplace & Employee Experience Summit in Berlin hosted by Platinum Edge. I’ve been to hundreds of conferences in my professional career but none like this one. Surprisingly, the attendees and speakers weren’t just IT engineers like myself, but instead a mix and mash of human resources, change management, content marketing, and digital analytics professionals—all with skin in the proverbial workplace experience game.

SIP Monitoring Services: Many Points of Potential Failure

While SIP Voice over IP (VoIP) technology has come a long way to improve connectivity and quality of service, there remains numerous potential points of failure along the path of devices over which the data flows. Unfortunately, if a remote location is experiencing an issue with their data connections, not only won’t they be able to call support to troubleshoot the issue, but they may not be able to send an email either, as both lines of communication rely on the same network.

Celebrating 5 Years of Grafana Labs Around the World

Grafana Labs turned 5 on Oct. 4. And as a remote-first company, we decided it would be a great excuse to give our team members, who are scattered across 22 different countries, a chance to take their conversations off Slack and celebrate together in person. In London, Berlin, Stockholm, New York City, and Bangalore, Grafana Labs engineers, sales teams, solutions staff, HR, and marketing – everyone! – gathered to meet and mingle, to reconnect and reminisce.

Monitor these loopholes to ensure complete network security

The continuous evolution and growth of the endpoint devices in enterprises makes network security management a primary concern for IT departments. As a sysadmin, you strive to ensure the safety and security of every device in your network. You are on a constant lookout for vulnerabilities and issues that might disturb the shield that protects your enterprise devices. With dynamically changing trends and technologies, it’s easy to miss details that might compromise your network’s armor.