Operations | Monitoring | ITSM | DevOps | Cloud

Kubernetes Master Class - Thanos and Istio

Rancher simplifies the deployment and management of monitoring (Prometheus) and observability (Istio) on a cluster to cluster basis. Each of these tools have extensions that allow for global view and global access. With the recent introduction of Fleet, Rancher 2.5 has reduced the barrier to entry for these configurations, making them available to organizations running at any scale.

ITOps In 2 Minutes | AIOps vs MLOps | Jay Menon

The OpsRamp IT operations management (ITOM) platform allows you to see everything in your hybrid IT environment, take the right action faster with integrated event and incident management and automate with confidence with AIOps. Learn more about our service-centric AIOps platform. With OpsRamp, you can detect and resolve incidents faster, understand resource dependencies and avoid costly performance issues that result in lost revenue and productivity.

Enhance API security with Apigee and Cloud Armor

APIs are great tools since they provide developers a simplified way to consume data and functionality that resides in backend systems. However, they are targets for malicious attacks because they contain business-critical information. In this video, we demo how Google Cloud can help you better secure your APIs with Apigee and Cloud Armor. Watch to learn how these tools offer security at multiple levels for your APIs!

Kubernetes Master Class: Declarative Security with Rancher, KubeLinter, and StackRox

As companies adopt containers and Kubernetes to accelerate application development, they’re wrestling with securing this new attack surface. Fortunately, the declarative, immutable nature of Kubernetes environments provides inherent security opportunities, and Kubernetes itself offers a broad set of native controls. However, these protections are not enabled by default, and many organizations are learning both the infrastructure aspects and the security aspects of Kubernetes in parallel.

Azure Management Talk: 8 easy steps to improve your security posture in Azure

You've deployed your application on Azure. Instantly hackers are targeting your public IP and the brute forcing of passwords and ports starts. What now? Should I deploy Azure Sentinel, or just enable Azure Security Center as a start? Join MVP and Microsoft RD Maarten Goet as he takes you through the 8 easy steps into improving your security posture on Azure. This is a demo heavy session no cloud engineer or developer should miss!