Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Is observability good for our brain? How about post-mortems?

Your software stack likely consists of web servers, search engines, queues, databases, etc. Each part of your stack emits its own metrics and logs. Depending on the size of your team and structure, different team members might have permissions to look at one set of data, but not the other. Some data is needed for troubleshooting and can be discarded after just a few days, while more important data might need to be kept for months for legal or capacity planning purposes.

Introduction to Kubernetes Network Policy with Use Cases

In Kubernetes, Network Policy allows you to define a policy determining what traffic is allowed to flow to and from specific workloads. By default, Kubernetes permits ingress and egress traffic to and from all pods in a namespace. Without correct configuration your risk of a significant security breach is high. Attend this webinar and learn best practices in configuring Kubernetes network security.

Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3

TLS v1.3 introduces several new security improvements over TLS 1.2 but some of these enhancements have an impact on network-based security solutions such as IDS/IPS. While the goal is to enhance the overall security at the application level, there are a few scenarios that are not easily solved when introducing the new technology, especially in Kubernetes environments. Watch this webinar to learn about security and compliance considerations for Kubernetes when implementing TLS v1.3.

Improving Security Forensics in Kubernetes Environments

The success of Kubernetes has made monitoring and alerting more difficult for traditional Security Information and Event Management (SIEM) tools. Attend this live webinar to learn how implementing the right network security and compliance solution will improve the accuracy and completeness of security forensic monitoring and alerting when using Kubernetes.

Postmortems and Retrospectives (class SRE implements DevOps)

Even after a service has been restored, SREs still have a bit of work to do. In this video, Liz and Seth discuss the postmortem process that SREs follow. Blameless postmortems and retrospectives are key to learning from failures and preventing recurrence. You will learn about the importance of conducting a postmortem, strategies for conducting a blameless postmortem, and techniques for trending retrospectives across your entire organization to gain better insights to prevent service disruptions in the future.

Disruption Detector and Real Time Monitoring with Stackdriver (Cloud Next '18)

Aja built an interactive disruption detector panel for attendees at the Google I/O Conference to intentionally cause errors to happen to the system. This demo highlights the amazing real time monitoring feature of Stackdriver as it tracks all incoming errors and make things easier for developers to pinpoint the issue. Watch the video to learn more.