Operations | Monitoring | ITSM | DevOps | Cloud

Microservices

Monitoring microservices: Everything you need to know [2018]

Monitoring remains a critical part of managing any IT system, while the challenges associated with monitoring microservices are especially unique. An example is how traditional monolithic systems, deployed as a single executable or library, have different points of failure and dependencies than those deployed with a microservices architecture.

Microservices Security Summer Camp Session 3 - How to Evaluate Microservices Security Solutions

When evaluating a security solution for modern applications, you’ll need a checklist based on the best practices. Many checklist items are standard and you can adopt those from this webcast. Others may be specific to your environment and compliance requirements and we will be covering those in the Q&A.

Microservices Security Summer Camp Series 2 - Best Practices for Securing Infrastructure

Microservice applications are packaged as containers and require orchestration by infrastructure management software like Kubernetes. Kubernetes will be the focus of this discussion on best practices to secure these dynamic environments. Join us to learn the tips and traps for securing the infrastructure for modern applications.

Gain Full Visibility into Microservices Architectures Using Kubernetes with Sumo Logic and Amazon EKS

Amazon Elastic Container Service for Kubernetes (Amazon EKS) is a managed service that makes it easyfor you to run Kubernetes on AWS without needing to install and operate your own Kubernetes clusters.