Operations | Monitoring | ITSM | DevOps | Cloud

A Software Developer's Guide to Getting Started With Kubernetes: Part 2

In Part 1 of this series, you learned the core components of Kubernetes, an open-source container orchestrator for deploying and scaling applications in distributed environments. You also saw how to deploy a simple application to your cluster, then change its replica count to scale it up or down. In this article, you’ll get a deeper look at the networking and monitoring features available with Kubernetes.

Building a Reliable and Scalable Infrastructure: Partoo's Journey with Qovery

Discover how Qovery empowered Partoo, a SaaS company focused on enhancing businesses' customer journey, to overcome their infrastructure challenges and achieve exceptional results. We met Antoine Boileau, Engineering Manager at Partoo, that told us more about their journey. With Qovery, Partoo found the ideal platform to integrate seamlessly, scale effortlessly, and receive reliable support.

Start your SNP VMs on Google Cloud

SEV-SNP is a new security feature that is available on AMD’s EPYC processors. It stands for Secure Encrypted Virtualization Secure Nested Pages. SEV-SNP provides a new level of protection for firmware by encrypting the memory pages that contain the firmware code. This makes it much more difficult for attackers to gain access to the firmware and launch attacks.

The Invisible Threat: Understanding Domain Hijacking and Its Consequences

Did you notice when we announced the new domain expiration monitoring feature? Read on to see how it might come in handy to you. Domain names are the equivalent of real estate. But the right domain name can also be a money powerhouse. You probably paid as little as $20 for your domain name, but the biggest names out there cost a lot more than that. Trailing behind are: Shocking, isn’t it?

Why a hyperautomation strategy requires upskilling workers

In a fast-evolving world, adopting a hyperautomation strategy is the best way to future-proof your workplace. But how does hyperautomation affect your workforce, and what will it mean for the future of your business? Hyperautomation is the combination of intelligent technologies to expand automation. It incorporates AI, machine learning, robotic process automation (RPA), integration, document processing, and more.

Relational Databases: Exploring Indexes and Transactions

Indexes serve as the key to unlocking the immense potential of relational databases, enabling swift and optimized data access. They act as a roadmap, allowing the database engine to locate specific data quickly, ultimately enhancing query performance. Understanding the nuances of indexes and employing the appropriate indexing techniques can significantly impact the efficiency of a database system.

14 Critical Log Files You Need to Monitor for System Security

In the realm of Linux system administration, monitoring log files is essential for maintaining a healthy and secure environment. Linux distributions generate a multitude of log files that capture crucial information about system events, errors, and user activities. These log files act as a silent witness, providing valuable insights into the inner workings of a Linux system.

Pinpoint performance issues in downstream services with the Dependency Map Navigator

Visibility into the upstream and downstream dependencies of your services is key to maintaining a performant microservices environment. Application developers and SREs rely on this visibility to quickly trace issues back to the source, which is essential during incidents—when time is of the essence—throughout day-to-day operations, and as systems evolve and scale.