Operations | Monitoring | ITSM | DevOps | Cloud

Live Kubernetes Debugging with the Elastic Stack

Your Kubernetes app is down. Your users start ranting on Twitter. Your boss is standing right behind you. What do you do? We are using the Elastic Stack in this demo with a special focus on its Kubernetes integration with metadata enrichment and autodiscovery in combination with APM / tracing, metrics, logs, and health checks.

Using the Beacon API

Users are so annoying! There they go, leaving the page before we can save the data to the API. Back in the old days, we would attach a `window.unload` handler and try to send an AJAX request, but this was slow and unreliable. Enter the Beacon API to give us a better way. The Beacon provides a reliable way to send a small amount of data *after* the page has been unloaded. It's not bound to the lifetime of the page and it doesn't slow down the user.

#ITConnections - Battle for Bandwidth

The load on cloud-based applications is at an all-time high, with people working from home accessing the same resources, simultaneously. Daytime Internet usage skyrocketed 34.4% between the regular working hours of 9AM-5PM as a result of remote work. A large portion of that online traffic accounted for video conferencing and collaboration tools. Microsoft saw a 34% increase usage of Teams while Skype reported 59 million daily active users and 4.3 million on Zoom.

IT Operations Strategies in an Economic Slowdown

IT leaders will need to rethink and readjust their business plans for 2020 during the Covid-19 pandemic. In a time of record unemployment and widespread remote workforces, businesses are having to adapt operations and marketplace strategies overnight. This interactive webinar will discuss results of a recent survey asking IT operations executives about technology priorities, budgets, and hiring plans needed to succeed in a volatile economic environment.

How to Implement Network Policy in Google GKE to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

Kibana 7 and Beyond Logz io Enhancements for Success

Kibana 7 introduced some new changes to the popular visualization platform, and this webinar will address how those updates are reflected in Logz.io. The recent enhancements included a cross-app dark theme, a new time picker, new filtering, a better dashboarding experience, and a significant boost in performance. But have the changes impacted your Logz.io user experience? We will dig in and detail how you can avoid common pitfalls and challenges. Expect to learn about.