Operations | Monitoring | ITSM | DevOps | Cloud

A Beginner's Guide to Getting Started with Google Kubernetes Engine (GKE)

There’s no shortage of providers willing to host your containers. Many of the world’s biggest cloud platforms offer Kubernetes as a service, including features such as automatic scalability and high availability. However, Google Cloud Platform (GCP) stands out as perhaps the best tool for building and hosting a Kubernetes cluster for a number of reasons. In this article, we’ll present these reasons and why GCP offers a better Kubernetes experience than other providers.

Sensu Go 5.2: Updates & introducing enterprise features in Sensu Go

We’re thrilled to announce that the latest release of Sensu Go — version 5.2 — is available today! Sensu Go empowers you to automate your monitoring workflows, offering a comprehensive monitoring solution for your infrastructure, applications, and connected devices. Sensu Go is a massive improvement over the original Sensu (version 1.x), with an emphasis on ease of use and quick time to value.

Nexthink - Quality of Service

Win the favor of your employees by helping them win back the 22 minutes a day they lose on IT issues. Nexthink helps proactively prevent the creation of incidents and reduces the MTTR for open incidents while providing deep insight into the end-user experience. With Nexthink, reduce support costs and end-user disruption, increase end-user productivity, and optimize IT investments.

Enable Kubernetes Pod Security Policy with kube-psp-advisor

Kubernetes Pod Security Policy is a mechanism to enforce best security practices in Kubernetes. In this tutorial, we will explain how to enable Kubernetes Pod Security Policy across your cluster using kube-psp-advisor to address the practical challenges of building an adaptive and fine-grained security policy on Kubernetes in production.

Performance monitoring with OpenTracing, OpenCensus, and OpenMetrics

If you are familiar with instrumenting applications, you may have heard of OpenMetrics, OpenTracing, and OpenCensus. These projects aim to create standards for application performance monitoring and collecting metric data. Although the projects do overlap in terms of their goals, they each take a different approach to observability and instrumentation.

Avoiding Junk-Drawer Classes in Ruby

Because Ruby is an object-oriented language, we tend to model the world as a set of objects. We say that two integers (x and y) are a Point, and a Line has two of them. While this approach is often useful, it has one big problem. It privileges one interpretation of the data over all others. It assumes that x, and y will always be a Point and that you'll never need them to act as a Cell or Vector. What happens when you do need a Cell? Well, Point owns the data. So you add a your cell methods to Point.

7 Signs of an Attempted Data Breach- and How to Stop It in Its Tracks

Data breaches come in all shapes, sizes, and levels of exposure. They can range from a couple of log files unintentionally left available to the public to the leak of hundreds of thousands of users’ personally identifiable information (PII). Don’t think that just because you have a secure network, a leak can’t happen to you.