Operations | Monitoring | ITSM | DevOps | Cloud

Kubernetes Master Class - 2020-04-20 - Detecting Anomalous Kubernetes Activity with Falco

Even when processes are in place for vulnerability scanning and implementing pod security and network policies, not every risk will be addressed. You still need mechanisms to confirm these security barriers are effective and provide a last line of defense when they fail. In order to keep up with threats at runtime, an open-source based approach can help you stay up to date. In this Kubernetes Master Class, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility. By adding Kubernetes application context and Kubernetes API audit events, teams can understand exactly who did what.

Episode 14: Designing and Testing a Data Model

It's time to think about the data model for Request Metrics. We plan to store all customer records in Redis. This requires some thought because Redis is not a relational database. The first thing we need is a user. We'd like to work on authentication soon and we won't get far without a user to login with.

Fault Monitoring vs. Performance Monitoring: What's The Difference? | Obkio

Fault Monitoring vs. Network Monitoring: What are the differences and when do you need either solution? Where do we start when users or employees complain about poor network performance? And what tools are available to help? Check out our video to learn about the differences between Fault Monitoring and Networking Monitoring and what may be the right solution for your needs, in under 2 minutes. Every IT professional knows that users typically complain about two things: Something doesn’t work. Something is slow slow.

Debugging in production with Stackdriver Debugger - Stack Doctor

Did you know you can debug your code while it’s still in production? In this video, Yuri Grinshteyn speaks about the Stackdriver Debugger, and how you can use it with Node.js. More importantly, he talks about the two ways in which this tool can debug by creating snapshots, or logging in real-time. Product: Google Cloud Operation Suite; fullname: Yuri Grinshteyn;

SEMplicity: Scaling Large ECE Deployments

From the trenches: what does it really take to scale up a large Elastic security log deployment? Elasticsearch for enterprise security log storage & management is a hot topic today. Specular gains in performance, functionality and cost are ready for harvest. But what exactly does it take to create a large Elastic log storage infrastructure? This talk will present war stories related to at 150,000 events per second Elastic log storage implementation with 2 month retention built at a large commercial client.