Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Getting SRE Buy-in from a VP or Director for Automated Metrics and Continuous Learning, Part 2

After getting managerial approval for incident management, your SRE buy-in program is well underway. How can you prove that it’s effective, and that adopting more best practices is necessary? In part 2 of this blog series, we’re going to share how to convince a VP or director to invest in additional SRE practices to strategically improve business results: automated metrics and continuous learning.

Kubernetes on Azure: Deploy and Manage Your First Cluster in AKS

Most Kubernetes deployments live on the cloud. According to the CNCF, while 63 percent of companies use AWS for Kubernetes, 29 percent are deploying Kubernetes on Azure, and the number is rapidly growing. Microsoft Azure provides mature Kubernetes tools, primarily the Azure Kubernetes Service (AKS). In this post, we’ll show you how to run your first Kubernetes cluster on AKS, and how to manage enterprise Kubernetes deployments on AKS with Rancher.

IT and DevOps Resources for COVID-19

We’re all wrestling with less than ideal circumstances during the pandemic of COVID-19. Whether you’re sheltering in place or simply practicing social distancing, it’s safe to say we’re all adjusting to a temporary new normal. One commonality is the need for connectivity. If infrastructure fails, business will screech to a halt and we will find ourselves in a new kind of mess altogether.

The role of shift-left testing in an agile environment

With the rapid growth of security threats to infrastructure, it’s more important than ever to proactively address vulnerabilities. As an open-source project, built on the trust of users and contributors, Netdata has security concerns at its core. Because we’re committed to code security and quality, we apply Agile principles throughout the software development process. A component of this includes regular static analysis.

Kubernetes Logging and Monitoring Explained

Most enterprises already have a reliable logging and monitoring system in place, so why should you worry about it in the context of Kubernetes? Well, traditional logging and monitoring tools are designed for stable infrastructure and application deployments. Cloud native environments, on the other hand, are highly dynamic. The IT world has changed and so must your toolkit.

What is Podman? Docker's successor?

What is Podman? Well, we will start by saying that Podman is a container engine developed by RedHat, and yes, if you thought about Docker when reading container engine, you are on the right track. Podman wants to be the alternative to the well-known container Docker engine, but you may wonder: what does RedHat offer through Podman? Why should I switch to Podman? Is Podman the replacement for Docker or just another competitor?

IBM Z delivers a Trusted Execution Environment with Ubuntu 20.04 LTS and new single frame models

In September 2019, IBM released z15 and LinuxONE III, the most secure cloud environment in the market featuring pervasive encryption built-in at its core with Ubuntu. This offered a solid foundation to launch hardened security offerings for the mainframe across platforms such as MongoDB, Postgres, IDAA, IBM Cloud Private and the IBM Hyper Protect services family.

The Anatomy of a Secure Serverless Platform - Delivery

I recently joined Stackery from Puppet: a company that specializes in great automation software for the globe’s biggest enterprise IT operations teams. I had the privilege of learning from folks doing the best work of their life to automate the provisioning, configuration, and maintenance of infrastructure that enables teams of developers to move fast and make a difference for their business.

ANNOUNCEMENT - Stackery Expands Serverless Security and Continuous Delivery Capabilities

Today, Stackery is announcing enhanced security and continuous integration and delivery (CI/CD) capabilities that enable teams to automate delivery best practices from laptop to production. With additional audit capabilities, scoped IAM permissions, and secrets management for automated verification and deployment pipelines, Stackery helps teams scale serverless usage and accelerate modernization and innovation projects.