Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Containers, Kubernetes, Docker and related technologies.

Peaking into your container and infrastructure

Containers get shipped by the thousand, but how do you keep track of the health and status of all those individual compute units? You can do it following the principles behind observability, you can see what’s happening with the infrastructure and the applications using open source tools. In this talk, we’ll describe how easy it is to implement the OSS tools required to get full observability and how that’ll improve your operations and your development cycles.

Deploying a Containerized App in Google GKE

Because of its popularity and widespread adoption, Kubernetes has become the industry’s de facto for deploying a containerized app. Google Kubernetes Engine (GKE) is Google Cloud Products’ (GCP) managed Kubernetes service. It provides out-of-the-box features such as auto-scaling nodes, high-availability clusters, and automatic upgrades of masters and nodes. In addition, it offers the most convenient cluster setup workflow and the best overall developer experience.

On-Demand Webinar: Extending Your Fortigate Next-Gen Firewall to Kubernetes

Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls. Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate Next-Gen firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster.

Azure you shot an ARO through our hearts... Confidently observe and secure Azure Red Hat OpenShift with Sysdig and Arctiq

It has arrived! Azure Red Hat OpenShift 4 is here and generally available; now, how do you add even more granular security and faster time to repair (MTTR) for your teams? Sysdig, that’s how!

Kubernetes Network Policy Introduction

Kubernetes Network Policy is the native way to implement network security controls in Kubernetes. Calico Policy is a superset of Kubernetes Network Policy that adds additional capabilities that help meet common real-world use cases. In this talk, we will educate you on the basics of Kubernetes Network Policy, the differences with Calico Policy, example use cases, and demos. You’ll walk away from this session with knowledge that will help you decide which network policy is right for you.

Qovery and the Twelve-Factor App methodology

The Twelve-Factor App methodology is a methodology for building platform-agnostic and resilient applications. It was introduced by Adam Wiggins while working at Heroku in 2011. Nearly 10 years later, this methodology is still considered by the developer community as an excellent practice to follow when building an application. In this article, we will see step by step how Qovery respects and improves the 12-factor methodology. Here we go.