Easy Ingress Management on the Edge with K3s lightweight Kubernetes and Traefik

K3s and Traefik are partnering to speed up cloud native applications deployment. K3s, by Rancher, is the best way to have a lightweight, fully CNCF conformant Kubernetes cluster running on diverse infrastructures, including possible IoT appliances such as Raspberry Pis. K3s starts in seconds thanks to its light weight nature. As it adds some components to the cluster automatically, k3s is very easy to use and therefore very accessible for new users.


Challenges of Monitoring and Troubleshooting in Kubernetes Environments

Kubernetes is great but complex! Whether to enable hybrid and multi-cloud, promote deeper specialization among development teams, enhance reliability, or simply stay ahead of the curve, organizations are reaping the varied benefits of this technology investment— but it comes at a cost. With each optimization, there are tradeoffs. With each layer of abstraction comes less visibility, resulting in more complexity when something goes wrong.

Kubernetes Master Class Day 2 with Stateful Applications - Implementing a Data Management Strategy

As teams start to onboard mission-critical applications such as databases and NoSQL systems into production, there’s a need to address critical Day 2 concerns. Dealing with regulatory requirements, user error, ransomware and cluster upgrades - requires safeguarding of both data and state. In this master class, we'll describe the challenges associated with implementing a robust data management strategy with Kasten's K10 platform and Rancher's RKE.

VMworld US 2019: Creating a cohesive monitoring strategy with IHS Markit

Learn how IHS Markit is using vRealize Operations with Blue Medora to create a strategy around their monitoring solution that is enabling them to run their business smarter and more efficiently. Discover how implementing a core monitoring strategy can help you troubleshoot faster, gain visibility into the infrastructure supporting your critical applications, and easily share executive level insights all in a single tool.

Study Finds Majority of Port Vulnerabilities are Found in Three Ports

A new study recently conducted by Alert Logic revealed the majority of vulnerabilities in ports are found in just three ports. The Critical Watch Report of 2019 claims that 65% of vulnerabilities found in Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports are linked to SSH (22/TCP), HTTPS (443/TCP), and HTTP (80/TCP). This is followed by RDP/TCP which has been patched numerous times by Microsoft.


How to Overcome Memory Usage Challenges with the Time Series Index

InfluxDB is a leading open source time series databases. In case you’re unfamiliar with InfluxDB, it is designed to be fast but it uses an in-memory index, which comes at the cost of RAM usage as your datasets grow. So, for optimum performance and RAM usage, InfluxData introduced a special indexing mechanism for InfluxDB called time series index (TSI). TSI optimizes the RAM usage saturation for larger data sets.


Developer security best practices: how to validate input data in Python

If you’re building an application that accepts user or third-party input, a crucial consideration for security is ensuring that you properly validate that input. You want to make sure that any data that enters your application is valid and secure. This data can be anything out of your control, such as comments submitted by users on your website. Input can also come from third-party web services that your application requests (like XML documents).


How to Get Stronger Consistency Out of a Datastore

Welcome to our series of blog posts about things Sentry does that perhaps we shouldn’t do. Don’t get us wrong — we don’t regret our decisions. We’re sharing our notes in case you also choose the path less traveled. In this post, we stretch technologies to their limits to see real-time data while handling traffic spikes.