Operations | Monitoring | ITSM | DevOps | Cloud

Kubernetes Security - Intrusion Detection and Mitigation

By default, pods are not isolated. This means that malicious actors once inside may wander freely throughout your kubernetes cluster. During this session we’ll discuss the different attack vectors and how to mitigate. Intro to attacking kubernetes and applications Network policies, isolation and quarantining IDS and honeypots concepts

Database Monitoring and Performance

dbaddon.mp4 - Google Drive Sign in Most modern web applications are heavily reliant on persisting data with relational databases, and so it’s no surprise that a large part of application performance monitoring relates to keeping an eye on database performance to ensure that our SQL queries are as efficient as possible. With this in mind, Scout features a Database Add-on module, and in this video, we are going to take a closer look at what it has to offer.

Track, Debug, and Fix Errors with Sleuth and Sentry

Learn how the Sleuth-Sentry integration gives you a complete view into your deployment tracking and health! Join us for a virtual webinar with Sleuth co-founder Don Brown and Sentry Product Marketing lead Rahul Chhabria as we walk you thru the benefits of the integration and the insights the combined solution will bring you.

Achieving CI Velocity at Tigera using Semaphore

Tigera serves the networking and policy enforcement needs of more than 150,000 Kubernetes clusters across the globe and supports two product lines: open source Calico, and Calico Enterprise. Our development team is constantly running smoke, system, unit, and functional verification tests, as well as all our E2Es for these products. Our CI pipelines form an extremely important aspect of the overall IT infrastructure and enable us to test our products and catch bugs before release.

IT Pros on the Future of Automation and AI in ITSM

Think about your last online order. If you’re a frequent online shopper and have created profiles for sites you visit often (*raises hand*), then you’re probably familiar with customized recommendations. Based on your purchase history, location, and other factors, the website may suggest other items you might be interested in buying. And if you’re on the site long enough, chatbots may appear asking if you have questions or need assistance locating something.

What Is IT Asset Management?

Even though ITAM has been around for a long time, there are still some very loose interpretations that claim to define IT asset management (ITAM). But, to be fair, the term asset management has different meanings depending upon the audience. When it comes to IT assets, we are specifically referring to those assets that enable the IT side of the business to run.

Better Than 'Business As Usual': Rethinking How PagerDuty Works in a Post-COVID-19 World

Earlier this year, as COVID-19 appeared, our global community of almost 800 employees became a fully remote workforce—effectively overnight. Now, all of us have had a taste of what it’s like to work from home all the time, from embracing the benefits of less time commuting and more time with our families, to the downsides of feeling isolated and missing seeing our colleagues in “real life.”