Operations | Monitoring | ITSM | DevOps | Cloud

%term

Detecting the Kubernetes API Server DoS Vulnerability (CVE-2019-1002100)

Recently, a new Kubernetes related vulnerability was announced that affected the kube-apiserver. This was a denial of service vulnerability where authorized users with write permissions could overload the API server as it is handling requests. The issue is categorized as a medium severity (CVSS score of 6.5) and can be resolved by upgrading the kube-apiserver to v1.11.8, v1.12.6, or v1.13.4.

Setting Up Your PagerDuty For Sweet Victory

Congratulations! You’ve just purchased PagerDuty, meaning you’ve decided to make an investment in your incident management process. However, in order to maximize your investment, you will need to understand all the moving pieces within PagerDuty. Today, we’ll be setting up PagerDuty for one team: the Bikini Bottom Team.

NetFlow Basics: An Introduction to Monitoring Network Traffic

To fully understand what NetFlow is and why it’s used for network monitoring, we first need to know what a flow is. When computers need to talk to one another they establish communication channels, commonly referred to as connections. (Technically speaking, these communication channels can only be called connections when the TCP protocol is involved.) A flow refers to any connection or connection-like communication channel.

Quantifying the Digital Employee Experience

We’ve talked to a lot of people about their company’s digital employee experience the past few years – from C-suite executives and board members looking to make sure they’re doing what they can to make work lives better and retain staff, to the actual CIOs and IT managers tasked with changing and improving their employees’ workplace experience. We’ve even heard from employees on the front lines every day about what works and what doesn’t at their companies.