Operations | Monitoring | ITSM | DevOps | Cloud

Work from home series, part 1: Remote authentication and password management

One of the primary concerns of IT admins when employees start working remotely is authenticating users. How can employees securely log in to their accounts while working remotely? What happens if users get locked out of their accounts? These are some of the questions that organizations are asking themselves when implementing work-from-home policies.

Want resiliency? Be a leader in sustainability

If there’s one thing we’ve learned from the COVID-19 pandemic so far, it’s that existential threats don’t just go away. Not even if you ignore them. (Actually, they get worse if you ignore them.) We’ve all been touched by the events of the past few months and we need a new way forward. Whether it’s climate change or public health, we need to face these threats head-on and solve them.

Protecting Critical Infrastructure in Kubernetes and Rancher

“As we expand, it’s critical for our team to have both a fast and automated rollout process for each customer environment. In the end, each of our user’s access experience must be identical. Rancher is one product that’s critical to that strategy.” – Jeff Klink, VP Engineering, Cloud and Security Specialist, Sera4 Security worries keep many of us awake at night – no matter our industry.

Custom Alerts Using Prometheus in Rancher

This article is a follow up to Custom Alerts Using Prometheus Queries. In this post, we will also demo installing Prometheus and configuring Alertmanager to send emails when alerts are fired, but in a much simpler way – using Rancher all the way through. We’ll see how easy it is to accomplish this without the dependencies used in previous article.

Shipping Multiline Logs with Filebeat

Multiline logs provide valuable information for developers when troubleshooting issues with applications. An example of this is the stack trace. A stack trace is a sequence of method calls that an application was in the middle of when an exception was thrown. The stack trace includes the line in question that encountered the error, as well as the error itself.

You've launched your first Kubernetes cluster, now what?

As Kubernetes continues to grow in popularity at a staggering rate, it’s only natural more and more people want to see what all the fuss is about. We’ve seen first hand how excited people are to try it out since launching #KUBE100 (our Kubernetes beta) – we’ve had tremendous interest and some great feedback so far. If you’re reading this and you have no idea what #KUBE100 is, it’s the name we gave to our k3s-powered, managed Kubernetes beta program.

Complete Winston Logger Guide With Hands-on Examples

Logging is critical for monitoring and troubleshooting your Node.js project. The open-source Winston logger helps take a load off our shoulders by making it easier to centralize, format, enrich, and distribute the logs to fit a particular need. Winston creates custom logger instances which can be configured to act as centralized logging entities. Essentially, the internal architecture of the module decouples the actual event logging from the implementation of the storage logic.

Episode 15: Cookie Authentication in ASP.NET Core

Core Identity is the officially encouraged method of authenticating users in ASP.NET Core. As you might have guessed, we're not fans of the heavy handed, black box approach needed to make Core Identity "Just work". We want to use as much of the existing ASP.NET Authorization framework as we can while avoiding Core Identity. Thankfully, ASP.NET Supports cookie authorization without Core Identity!