Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Top Kubernetes Tutorials & Resources for All Levels

If you are a developer who uses containers, chances are you and your team have heard about Kubernetes. At its core, Kubernetes is a container operating system for the web, but has grown to be much more. Sure, Kubernetes can manage your containers, network traffic, and bring up a crashed ad, but it has also become a widely adopted platform with a growing community.

What are the alternatives to hiring a DevOps?

Congratulations!! After 3 months of hard work, your developer has done an incredible job and your brand new web application is ready to be put online. But wait a minute… Who is going to put it online? Try to ask your developer to do it - there is a good chance that he can’t. Why? Deploying applications is not necessarily a part of their qualifications. And even if he is able to, who's going to make sure it's always available and scale as your business grows?

Find Security Vulnerabilities in Kubernetes Clusters

Security is one of the most talked-about topics for Kubernetes users. Google “Kubernetes security” and you’ll find a huge number of articles, blogs and more. The reason is simple: you need to align your container and Kubernetes security with your organization’s existing security profile. Kubernetes has some strong security best practices for your cluster—authentication and authorization, encryption in secrets and objects in the etcd database—to name a few.

Docker Container Performance Metrics to Monitor

In Part 1 we’ve described what container monitoring is and why you need it. Because each container typically runs a single process, has its own environment, utilizes virtual networks, or has various methods of managing storage. Traditional monitoring solutions take metrics from each server and the applications they run. These servers and applications running on them are typically very static, with very long uptimes.

Docker Containers Management: Main Challenges & How to Overcome Them

Even though containers have been around for ages, it wasn’t until Docker showed up that containers really became widely adopted. Docker has made it easier, faster, and cheaper to deploy containerized applications. However, organizations that adopt container orchestration tools for application deployment face new maintenance challenges.

The Simplest Way to Deploy Spring Boot with PostgreSQL on AWS

AWS (Amazon Web Services) is an amazing and reliable cloud service provider. AWS, like Google Cloud Platform and Microsoft Azure, provides everything you need to host an application without having to worry about running the underlying servers and network configuration. Everything you need to quickly begin hosting is provided as a packaged services.

Image Scanning with Github Actions

In this blog post, you will learn how to setup image scanning with Github Actions using Sysdig Secure DevOps Platform. We will create a basic workflow to perform a local scan to detect vulnerabilities and bad practices before the image is pushed to any registry. We will also customize scanning policies to stop the build according to a set of defined rules.

Falco is the First Runtime Security Project to Join the CNCF Incubator

Falco, originally created by Sysdig in 2016, is approved to join the CNCF Incubator after a 257 percent increase in downloads. The CNCF's only open source Kubernetes runtime security project has more than 8.5 million downloads as runtime security becomes cemented as a standard component of the cloud-native stack.

Programmatic Creation of Codefresh Pipelines - Part 2

At Codefresh, we know that any CI/CD solution must be attractive to both developers and operators (SREs). One of the major advantages of Codefresh is the graphical user interface that includes dashboards for Kubernetes and Helm deployments. These graphical dashboards are very useful to developers who are just getting started with deployments and pipelines.