Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Using Argo CDs new Config Management Plugins to Build Kustomize, Helm, and More

Starting with Argo CD 2.4, creating config management plugins or CMPs via configmap has been deprecated, with support fully removed in Argo CD 2.8. While many folks have been using their own config management plugins to do things like `kustomize –enable-helm`, or specify specific version of Helm, etc – most of these seem to have not noticed the old way of doing things has been removed until just now!

Azure Key Vault: A Comprehensive Overview

Azure Key Vault is Microsoft’s dedicated cloud service, designed to safeguard cryptographic keys, application secrets, and other sensitive data. In an era where digital security is paramount, it functions as a centralized repository. Here, sensitive data is encrypted, ensuring that only designated applications or users can access them. Imagine having a hyper-secure, digital vault where you can store all your essential digital assets.

How to Monitor Multi-layer Huawei Switch with MetricFire

Monitoring your network infrastructure plays a pivotal role in identifying potential bottlenecks, optimizing performance, and ensuring seamless operations. By implementing a comprehensive monitoring solution like MetricFire, you gain access to a wide range of features and functionalities designed to simplify the process of monitoring and managing your Huawei switches.

Azure: The Ultimate Guide to Microsoft's Cloud Computing Platform

Cloud computing has revolutionized the way businesses operate and manage their data. With the vast amounts of information being generated daily, traditional on-premises infrastructure struggles to keep up with the demands of scalability, security, and cost-effectiveness. This is where Azure, Microsoft's cloud computing platform, comes into play. Azure provides a comprehensive set of tools and services that enable organizations to build, deploy, and manage applications and services on a global scale.

How to ensure your Kubernetes Pods have enough CPU

Gremlin's Detected Risks feature immediately detects any high-priority reliability concerns in your environment. These can include misconfigurations, bad default values, or reliability anti-patterns. A common risk is deploying Pods without setting a CPU request. While it may seem like a low-impact, low-severity issue, not using CPU requests can have a big impact, including preventing your Pod from running.

IT Operations: Making IT Work Better with IT Ops Automation

IT ops is often so focused on solving problems that it can be easy to miss how IT ops contributes to an organization’s overall success, even if you’ve been in IT for a long time. When things get tossed over the wall from development to ops, anyone not in IT ops starts to ask, “What is IT ops?” and “What does IT operations do?” So let’s set the record straight.

Automation to Take Airlines to High Altitudes During Unexpected Challenges

President Casey Murray of the Southwest Airlines Pilot Association in February 2023 made it very clear that the airline’s outdated technology had failed miserably during the winter storm of 2022. And that the IT and “infrastructure from the 1990s” allowed the wild weather to destroy travel plans for thousands of Southwest passengers, keeping them from spending the holidays with family, friends, and loved ones.