Operations | Monitoring | ITSM | DevOps | Cloud

March 2020 Online Meetup: Automating K3s Cluster Upgrades

While developing K3s to run at the edge we had to change our assumptions about how to manage these clusters at scale. A key assumption in a data center is that you have stable network connectivity, but this may not be true at the edge. You may have unreliable cellular service or limited time during the day in which you can connect. In these environments, operations such as upgrading Kubernetes or patching an operating system require a different paradigm.

IDC Overview: Adopting BizOps to Accelerate Digital Transformation Results

Stephen Elliot, IDC Program Vice President, walks through BizOps, a new framework for data driven decision making that's aligned to business outcomes. Learn how BizOps extends DevOps to include continuous measurement and strategic business planning to enable digital transformation at the speed of business change in this video.

How to Find and Stop SQL Injection Attempts on Your Websites With SolarWinds Security Event Manager

Your public-facing websites can be a secret backdoor to personally identifiable data. Simple SQL queries executed on your website search bar could create a data breach. In this video, we'll cover how you can can identify and stop this malicious activity with SolarWinds Security Event Manager.

Popular integrations in Confluence Cloud

Chapter 4 and the final installment in Atlassian's "How To Get The Most Out Of Confluence Cloud" series. In just under 5 mins, this video demonstrates how to use popular integrations in Confluence. Get an overview of Atlassian’s Marketplace and learn how to use the Jira, Trello, Google Drive, Slack, Gliffy, and Draw.io integrations and apps with Confluence.

Kubernetes Master Class: How to implement Network Policy to secure your cluster

By default, pods are non-isolated; they accept traffic from any source. The Kubernetes solution to this security concern is Network Policy that lets developers control network access to their services. Rancher comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.