Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

D2iQ's Groundbreaking AI Chatbot Levels the Kubernetes Skills Gap

D2iQ has introduced an AI assistant that helps organizations resolve problems more quickly and easily, including coding errors and system failures. The new DKP AI Navigator can help reduce the duration and cost of system and application bottlenecks, misconfigurations, and downtime, and ultimately help organizations overcome the Kubernetes skills gap.

Building a Reliable and Scalable Infrastructure: Partoo's Journey with Qovery

Discover how Qovery empowered Partoo, a SaaS company focused on enhancing businesses' customer journey, to overcome their infrastructure challenges and achieve exceptional results. We met Antoine Boileau, Engineering Manager at Partoo, that told us more about their journey. With Qovery, Partoo found the ideal platform to integrate seamlessly, scale effortlessly, and receive reliable support.

A Software Developer's Guide to Getting Started With Kubernetes: Part 2

In Part 1 of this series, you learned the core components of Kubernetes, an open-source container orchestrator for deploying and scaling applications in distributed environments. You also saw how to deploy a simple application to your cluster, then change its replica count to scale it up or down. In this article, you’ll get a deeper look at the networking and monitoring features available with Kubernetes.

Optimizing Network Performance using Topology Aware Routing with Calico eBPF and Standard Linux dataplane

In this blog post, we will explore the concept of Kubernetes topology aware routing and how it can enhance network performance for workloads running in Amazon. We will delve into topology aware routing and discuss its benefits in terms of reducing latency and optimizing network traffic flow. In addition, we’ll show you how to minimize the performance impact of overlay networking, using encapsulation only when necessary for communication across availability zones.

Kubernetes Community Day Munich Recap: A Meeting of Tech Minds and Ideas

This July, the community spirit was profoundly vibrant in the scenic city of Munich, as Kubernetes Community Day (KCD) Munich brought together a meeting of minds and inspired the open-source collaboration we all know and love. The event was a testament to the strength and vitality of the Kubernetes community, which pulsed with an energy of shared intellectual curiosity and passion for all things Kubernetes.

A Detailed Guide to Docker Secrets

This post was written by Talha Khalid, a full-stack developer and data scientist who loves to make the cold and hard topics exciting and easy to understand. No one has any doubt that microservices architecture has already proven to be efficient. However, implementing security, particularly in an immutable infrastructure context, has been quite the challenge.

Elevate the Security of Your Kubernetes Secrets with VMware Application Catalog and Sealed Secrets

Alfredo García, manager R&D, VMware contributed to this blog post. VMware Application Catalog now includes enterprise support for Sealed Secrets, enabling customers to add an asymmetric cryptography-based protection to their Kubernetes Secrets stored in shared repositories.

Docker Container Lifecycle Management

Managing an application's dependencies and tech stack across numerous cloud and development environments is a regular difficulty for DevOps teams. Regardless of the underlying platform it uses, it must maintain the application's stability and functionality as part of its regular duties. However, one possible solution to this problem is to create an OS image that already contains the required libraries and configurations needed to run the application.

Architecting Cloud Instrumentation

Architecting cloud instrumentation to secure a complex and diverse enterprise infrastructure is no small feat. Picture this: you have hundreds of virtual machines, some with specialized purposes and tailor-made configurations, thousands of containers with different images, a plethora of exposed endpoints, s3 buckets with both public and private access policies, backend databases that need to be accessed through secure internet gateways, etc.