Operations | Monitoring | ITSM | DevOps | Cloud

Container security on IBM Cloud

If you’re running containers and Kubernetes on IBM Cloud, you can now enable the key security workflows of Sysdig Secure as a service within your IBM Cloud deployments. This makes it easier for you to implement security tools and policies to ensure your containers and your Kubernetes environment are protected and running as intended. The new container and Kubernetes security features are integrated into IBM Cloud Monitoring with Sysdig and offered as an additional service plan.

Kubernetes network policies with Sysdig

Microservices and Kubernetes have completely changed the way we reason about network security. Luckily, Kubernetes network security policies (KNP) are a native mechanism to address this issue at the correct level of abstraction. Implementing a network policy is challenging, as developers and ops need to work together to define proper rules. However, the best approach is to adopt a zero trust framework for network security using Kubernetes native controls.

How small changes to your SLOs can be SMART for your business - A narrative case study

In the second part of his "Choosing SLOs that are appropriate for our customers" blog, Adam Hammond, narrates a fictional case study through Bill Palmer, one of the protagonists of The Phoenix Project and shows "How small changes to your SLOs can be SMART for your business" In our previous blog, we discussed why you need to choose SLOs that are appropriate for your customers. We don’t always write out S M A R T and list our SLOs immediately. The process is organic, and it may take a while.

Secure Chaos Engineering on Kubernetes Clusters Without being a Noisy Neighbor

Get started with Gremlin's Chaos Engineering tools to safely, securely, and simply inject failure into your systems to find weaknesses before they cause customer-facing issues. Kubernetes is a powerful open source platform to build scalable, reliable systems, designed to be extensible and customizable for many use cases. Kubernetes provides the ability to scale individual pods, swap out runtimes, and control access to objects using namespaces.

Finding Zen - How IT Ops and IT Security Can Work Together

It's no secret IT Ops and Security teams don't have the most glowing relationship. The simplistic reason is while Ops is responsible for making work and communication as seamless and accessible as possible (and therefore wants everything open), Security is focused on making it as difficult as possible for the wrong people to get inside (and therefore wants everything closed). But beyond the trite hot takes, fundamentally, both teams want to keep the bad guys out without stifling productivity. And when these two groups work together—Well, it’s magic. Timothy Brown, SolarWinds VP of Security, is here to tell you how to reduce friction with some advice and real-world examples.

Tracing with the Grafana Cloud Agent and Grafana Tempo

Back in March, we introduced the Grafana Cloud Agent, a subset of Prometheus built for hosted metrics. It uses a lot of the same battle-tested code as Prometheus and can save 40 percent on memory usage. Ever since the launch, we’ve been adding features to the Agent. Now, there’s a clustering mechanism, additional Prometheus exporters, and support for Loki. Our latest feature: Grafana Tempo! It’s an easy-to-operate, high-scale, and cost-effective distributed tracing system.