Operations | Monitoring | ITSM | DevOps | Cloud

Containers

The latest News and Information on Containers, Kubernetes, Docker and related technologies.

Kubernetes Incident Management Best Practices

Creating just any infrastructure on Kubernetes is not enough. There are so many basic configurations you could apply and create the infrastructure for your application for the time being and it might work just fine. The incident responses won’t always remain 100% reliable. You will run into newer potholes, and that’s okay.

GitOps the Planet #16: Using SLOs to Improve Software Delivery

Kit Merker is the one of the original product managers for Kubernetes and now Chief Growth Officer at Nobl9 where they're delivering a new open standard called OpenSlo. SLOs, or service-level-objectives, provide a framework for understanding performance targets and making judgements about software changes and how they impact uptime. But it's not just a standard, it's also code. Come find out about it with Kit in this GitOps the Planet!

How to save on container costs efficiently using Kubernetes cost reporting in CloudSpend

Kubernetes reports in CloudSpend In the current era focused on cloud computing, it is essential for businesses to streamline costs. As containerization and Kubernetes become increasingly popular, efficiently managing costs related to Amazon Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS) is crucial for maintaining a successful infrastructure.

Using Helm Dashboard and Intents-Based Access Control for Pain-Free Network Segmentation

Helm Dashboard is an open-source project which graphically shows installed Helm charts, revisions, and changes to their Kubernetes resources. The intents operator is an open-source Kubernetes operator which makes it possible to roll out network policies in a Kubernetes cluster, chart by chart, and gradually achieve zero trust or network segmentation.

Securing Access to Cloud Native Resources with Certificates - Civo Navigate NA 2023

In this talk, Alan Vailliencourt, a Senior Solutions Engineer with Teleport, discusses the importance of moving away from passwords and securing access to cloud-native resources using short-lived certificates. He highlights the risks associated with passwords and showcases the benefits of identity-native access, incorporating proof of presence, mutual authentication, and device security. The talk provides practical steps for adopting certificate-based authentication and improving security posture for Kubernetes, databases, and other cloud resources.

Kubernetes Troubleshooting Reimagined: Operators and Auto-Tracing

Kubernetes operators help to simplify, streamline, and automate application tasks beyond the conventional Kubernetes offerings. In this webinar, AWS Developer Advocate for Kubernetes, Lukonde Mwila, will delve into the remarkable capabilities of Kubernetes operators and how to leverage them in your applications. You’ll also learn how Lumigo built a Kubernetes operator for seamless distributed tracing leveraging OpenTelemetry. We will also demonstrate how our operator transforms complex processes into a single command, promising an unmatched user experience and exceptional app health insights.

Solving the Never Ending Requirements of Authorization - Civo Navigate NA 2023

In this talk, Alex Olivier shares their personal experience with the challenges of constantly changing authorization requirements in software systems. They discuss the drawbacks of traditional if-else statement-based authorization logic and propose a more efficient and scalable solution using an authorization service called Cerbos. The talk explores the benefits of decoupling authorization logic into policies, providing a centralized and maintainable approach with a clear audit trail.

Exploring AKS networking options

At Kubecon 2023 in Amsterdam, Azure made several exciting announcements and introduced a range of updates and new options to Azure-CNI (Azure Container Networking Interface). These changes will help Azure Kubernetes Services (AKS) users to solve some of the pain points that they used to face in previous iterations of Azure-CNI such as IP exhaustion and big cluster deployments with custom IP address management (IPAM).

An Insider Look at Zero Trust with GDIT DevSecOps Experts

As cyber attacks have become ever more sophisticated, the means of protecting against cyber attacks have had to become more stringent. With zero trust security, the model has changed from “trust but verify” to “never trust, always verify.” Joining D2iQ VP of Product Dan Ciruli for an in-depth discussion of zero trust security was Dr. John Sahlin, VP of Cybersolutions at General Dynamics Information Technology (GDIT), and David Sperbeck, DevSecOps Capability Lead at GDIT.

Enable and use GKE Control plane logs

Are you having any issues with the control plane components in your GKE Cluster? Are you interested in gaining visibility into the control plane side of the cluster to troubleshoot the issues by yourself? Then GKE Control Plane Logs is a great way to gain insights on what's going on with your cluster. In this video, we provide a quick overview about Control Plane components and logs, and show how to enable control plane logs on the new and existing GKE clusters. Watch this video to learn how to use Control plane logs to troubleshoot webhook and control plane latency issues in GKE clusters.