Operations | Monitoring | ITSM | DevOps | Cloud

DevOps 101: Introduction to CI/CD

When you’re new to an industry, you encounter a lot of new concepts. We tend to use a lot of jargon, the documentation may be written with someone more experienced in mind or rely on contextual knowledge of the rest of the space, and it often doesn’t explain the “why” for the tool. This can make it really difficult to get your feet underneath you on an unfamiliar landscape, especially for junior engineers.

Kubernetes GitOps with Rancher Continuous Delivery

As the number of Kubernetes clusters under management increases, application owners and cluster operators need a programmatic way to approach cluster management. Rancher CD solves this by creating a git driven engine for applying cluster changes. Declarative code is stored in a git repo. As changes are committed to the repo, linked clusters are automatically updated. Gitops keeps all your clusters consistent, version controlled, and reduces the administrative burden as you scale.

Webinar: Building Serverless Flows with AWS Step Functions

AWS Step Functions are an emerging solution in the field of serverless architectures, as they provide capabilities to coordinate between many services. This webinar takes the "Right to be forgotten" (GDPR) workflow as an example of a hands-on AWS Step Functions tutorial: use-cases, difficulties, and solutions. Combining Cloudway's experience with Lumigo's monitoring and debugging solution, we provide a full framework to manage multiple subsystems into a single serverless flow and get the work done.

Webinar: How to Monitor Serverless Applications

The software we write does not always work as smoothly as we'd like. To know if something went wrong, find the root cause, and fix the problem, we need to monitor our system and get alerts whenever issues pop up. There are many useful tools and practices for non-serverless applications. As we adopt serverless architecture can we continue to use the same approach? Unfortunately, the answer is no.

How to Enable Detection Rules via Elastic Security - Version 7.10

The detection engine brings automated threat detection to the Elastic Stack through the Security app in Kibana. As part of our belief in the power of open-source, Elastic Security has open sourced all our detection rules to work alongside the security community to stop threats at scale and arm every analyst. In this video, you’ll learn more about the detection engine and how to automate the protection of your data.

Cloud Cost Optimization & DevOps

See how leading enterprises are achieving continuous, DevOps-driven cloud and container cost. Our DevOps experts detail methods for embedding cloud cost optimization into DevOps pipelines, demo an extensible, best practice DevOps pipeline supporting continuous cloud FinOps, and showcase case studies of advanced enterprises successfully augmenting their DevOps to embrace systemic optimization.

Secure Your Cloud Transformation with Continuous Intelligence

CrowdStrike and Sumo Logic work together to identify security threats and defend against IOCs in a hybrid environment. Customers gain knowledge on adversaries which may be targeting their assets and organisation via strategic, operational and technical reporting and alerts. During this session, we’ll hear from Australian private health provider, NIB, on how Sumo Logic and CrowdStrike have worked together to help NIB secure its digital transformation and cloud environment.