ITSM is a hot topic for people who manage IT infrastructure. There are new developments coming out every few months that tend to show where the industry is headed. ‘Automation’ has been all the craze for the past few years, yet it is still quite relevant even today. Then there is ‘digital transformation’, another significant industry jargon that gets thrown around a lot. Last year was all about the release of ‘ITIL V4’ – a major step towards the future.
Often, when companies are new to Amazon Web Services (AWS), they aren’t focused much on the cost. They’re more likely fixated on taking advantage of the scalability and flexibility offered by the cloud. As a company’s AWS cloud infrastructure grows, it will find that its cloud costs grow as well. As the number of AWS accounts increases over time, there’s a higher chance of overspending on unnecessary cloud resources.
With a huge number of employees around the globe working remotely during the COVID-19 pandemic, delivering uninterrupted business services to customers has become a major challenge. This requires strict monitoring of all critical business applications in order to accommodate an increased amount of requests, which can cause a critical downtime if not monitored appropriately.
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of creating and enforcing a solid cybersecurity strategy for employees who work remotely.
Editor’s note: Rancher Labs’ William Jimenez provides an introduction to CIS Scan. Then Saiyam Pathak takes over with a hands-on demo. Cluster security is critical to any successful Kubernetes strategy. Recent research by AimPoint revealed that 44 percent of respondents had delayed application production due to security concerns around Kubernetes containers. Yet securing Kubernetes is a complex machine with many moving parts, integrations and knobs and levers.
Let's look at the good parts of logging: