Operations | Monitoring | ITSM | DevOps | Cloud

Nationwide Building Society: Ensuring Continuous Quality for DevOps Success

DevOps promised that we could deliver more, faster, and with confidence. But blockers to adoption and transformation can make those goals hard to achieve. From disjointed toolchains to a lack of predictability and visibility - persistent challenges can make DevOps success elusive and frustrating. Join us for a discussion with Rich Jordan, Test Engineering Manager at Nationwide Building Society, the world’s largest building society.

The Power of Open Source Software: Rancher Academy Issues 1,000th Certificate

The Rancher Academy launched on May 15, 2020. Here we are, 94 days later, and we’ve issued our 1,000th certificate to a graduate of the Certified Rancher Operator: Level 1 course. Rancher is open source software, so anyone can download it and use it. With that freedom, though, comes a cost: we all learn how to use it according to how we need to use it. Through this lens, the actual potential of Rancher becomes distorted, and the experience of each individual varies widely.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to be a successful project owner (without micromanaging)

We’ve all been on two types of projects: ones that ran smoothly, and ones that crumbled to pieces. While there are lots of contributing factors in each case, I’ll go out on a limb and say that project ownership (or lack thereof) is what makes the biggest difference.

What's new in Kubernetes 1.19?

Kubernetes as a project is maturing, support has been increased from nine to 12 months, and there’s a new protocol in place to ensure a steady progress on feature development. Also, many of its new features are meant to improve the quality of life of its users, like Generic ephemeral inline volumes, or the structured logging.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.