Operations | Monitoring | ITSM | DevOps | Cloud

Effortless Load Testing | Simon Aronsson (Load Impact / k6)

Load testing and performance monitoring used to be really hard and bothersome. Not any more! With modern code-first tools and visualisation, being on top of your service scalability and performance is no longer something that's reserved for the QA department. According to research by Google, 53% of mobile website visitors will leave if the page load duration exceeds three seconds. Armed with this knowledge, We'll go through how to implement load tests and performance monitoring around it as well as how to efficiently visualize it.

KMC - How Helm 3 and Helm Charts Create Reproducible Security

Helm 3 is developing a set of best practices that help make Kubernetes applications more secure. As a recent graduate from incubation to full-fledged project of the Cloud Native Computing Foundation, Helm has been developing its own ecosystem and is working towards mature tooling. Join Rancher and JFrog as they provide more details into updates in Helm 3 and how Helm Charts create reproducible security in the Kubernetes ecosystem.

How to Provision Cloud Infrastructure

One of the best things about cloud computing is how it converts technical efficiencies into cost-savings. Some of those efficiencies are just part of the tool kit, like pay-per-use Lambda jobs. Good DevOps brings a lot of savings to the cloud, as well. It can smooth out high-friction state management challenges. Sprucing up how you provision cloud services, for example, speeds up deployments. That’s where treating infrastructure the same as workflows from the rest of your codebase comes in.

Automatically (or manually) tag your Sleuth deployments

All deployments are not created equal, but you'd never know it from your Slack channel notifications. In reality, some deployments you really care about, as they contain things like API changes or database migrations, and you want that information to surface. We created tags in Sleuth for this very reason. Out of the box, Sleuth matches files in your deployment with known patterns, and if any are found, tags your deployments automatically.

Who's calling - A neighbor or a fraudster?

Once upon a time the telephone system was a trusted method of connecting people. While we now spend more time on our phones than ever, our relationship to phone calls has changed -- we’re hesitant to answer calls from unknown phone numbers, often because we think the call is a con. But what if the caller ID is spoofed/modified and made to look like a telephone number that you may trust or a number with a local area code and familiar prefix?