Operations | Monitoring | ITSM | DevOps | Cloud

Manage Office 365 Outages With ServiceNow Integration

Enterprises continue to invest heavily in modernizing their IT infrastructure. That leaves network administrators and NOC analysts challenged with effectively monitoring an evolving digital landscape. The goal becomes to meet the service needs of customers and ensure the underlying infrastructure is resilient.

Should I Buy or Should I Build; or "When is Free Software Free"?

Pop quiz, hotshot. How much does it cost to build a self-hosted Kubernetes cluster? Quick, no conferring. If you thought the answer was “nothing”, go to the back of the class. According to distributed systems expert Cindy Sridharan, quoted in Cloud Native DevOps with Kubernetes, the answer is “one million dollars”: It takes well over a million dollars just in engineer salary to get Kubernetes up and running from scratch. And you still might not get there.

Nationwide Building Society: Ensuring Continuous Quality for DevOps Success

DevOps promised that we could deliver more, faster, and with confidence. But blockers to adoption and transformation can make those goals hard to achieve. From disjointed toolchains to a lack of predictability and visibility - persistent challenges can make DevOps success elusive and frustrating. Join us for a discussion with Rich Jordan, Test Engineering Manager at Nationwide Building Society, the world’s largest building society.

The Power of Open Source Software: Rancher Academy Issues 1,000th Certificate

The Rancher Academy launched on May 15, 2020. Here we are, 94 days later, and we’ve issued our 1,000th certificate to a graduate of the Certified Rancher Operator: Level 1 course. Rancher is open source software, so anyone can download it and use it. With that freedom, though, comes a cost: we all learn how to use it according to how we need to use it. Through this lens, the actual potential of Rancher becomes distorted, and the experience of each individual varies widely.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to be a successful project owner (without micromanaging)

We’ve all been on two types of projects: ones that ran smoothly, and ones that crumbled to pieces. While there are lots of contributing factors in each case, I’ll go out on a limb and say that project ownership (or lack thereof) is what makes the biggest difference.