Operations | Monitoring | ITSM | DevOps | Cloud

Kubernetes Master Class HA Rancher Managing EKS, GKE and AKS

In this Master Class session, we will focus on some of the challenges that exist when trying to create consistent alignment across multi-cloud clusters, and then demonstrate how SUSE Rancher can be used to not only close the gaps, but optimize standardization for managing multiple clusters (specifically Amazon EKS, Google Cloud Platform GKE and Microsoft Azure AKS) at scale.

D2iQ: The Smart Way to Get to Day 2

Leveraging the cloud for business can be rewarding, but getting from cloud to cloud-native is easier said than done. The reality is that in today’s dynamic IT environment, while experiencing the creation of truly amazing technology, forces organizations to choose from an excessive number of options—from cloud providers, to orchestration platforms, to setup tools. Graduating from day 0 means figuring out operational efficiency, security, and long-term costs. So how do you ensure a successful Day 2?

Observability 101 using OpenTelemetry & SigNoz @ Kubernetes Community Day

In this workshop, we will learn about the basics of observability and its benefits. We will take a hands on approach and actually instrument an application with OpenTelemetry, which is a vendor neutral instrumentation library. Then we will visualise the data sent by open telemetry with SigNoz, which is a full stack observability platform. In the last section, we will take an example of a real world issue and how this observability stack can be used to find the root cause of the issue.

5 Best Practices to Simplify Kubernetes Troubleshooting - DevOps.com Webinar

Kubernetes is agile, flexible and scalable. It is also complex, with a multitude of moving parts on and underneath the surface. When things go wrong, as they always (eventually) do, understanding what caused the problem could be stressful and time-consuming. But does it have to be? Join Mickael Alliel, DevOps engineer at Komodor, as he deep-dives into.

Expedited Introduction to Cloud Computing

In this webcast, we have covered the journey from physical computers to serverless technology: The evolution of cloud computing and what it could mean for your business. The difference between IaaS, PaaS, and SaaS models, and how to choose which is best for your organization. Principles of serverless computing and containers technology and the distinct benefits of each.

Risk Mitigation Strategies for Tcp/IP Vulnerabilities in OT

JFrog in collaboration with Forescout Research Labs recently released the fourth study from Project Memoria - the industry’s most comprehensive study of TCP/IP vulnerabilities. INFRA:HALT covers 14 vulnerabilities affecting the popular closed source TCP/IP stack NicheStack. These vulnerabilities can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted OT and ICS devices offline or take control of them.