Operations | Monitoring | ITSM | DevOps | Cloud

Blog

If the best of the best can be bested, what chance do the rest of us have?

This is a very relevant question as news of the FireEye and SolarWinds breaches aired. FireEye is a major player in the cybersecurity world. They are one of the top choices to be brought in to respond to a data breach. If they can be hit how can the average company hope to stay safe? The reality is, none of us are safe. No amount of technology, personnel or caliber of skills in the world can guarantee you will never have a data breach or be the victim of ransomware.

Helm vs. Ketch when Deploying Applications

Kubernetes has become the de-facto standard for deploying microservices and containerized applications. Still, there is a learning curve for a developer to get familiar with Kubernetes concepts and objects, how to write and manage the required YAML files, etc. While there is undoubtedly value in learning these concepts and tasks, I believe there is even greater value in getting your applications deployed faster and spending more time on your application code than on infrastructure-related objects.

Using Hybrid and Multi-Cloud Service Mesh Based Applications for Distributed Deployments

Service Mesh is an emerging architecture pattern gaining traction today. Along with Kubernetes, Service Mesh can form a powerful platform which addresses the technical requirements that arise in a highly distributed environment typically found on a microservices cluster and/or service infrastructure. A Service Mesh is a dedicated infrastructure layer for facilitating service-to-service communications between microservices.

Where does the tech sector go in 2021?

Like every industry sector, 2020 has been a tough year in tech. The pandemic has changed the way we work, it’s changed the way our customers work, and it’s been a rollercoaster ride. In August 2020, IDC’s Global ICT Spending Forecast 2020 – 2023 predicted 2020 revenue in the sector would fall to $4.8 trillion compared to its original estimate of $5.2 trillion.

Deep Learning Toolkit 3.4: Grid Search, Causal Inference and Process Mining

With a turbulent year and 2020 coming to its end, I’d like to thank you for your continued interest in my blog posts. In my last .conf talks I received a lot of positive feedback combined with the ask to have more posts with such content, so thanks for motivating me and here we go! Recently, my colleague Dimitris wrote about how you can set up DLTK on a AWS GPU Instance.

Set up K3s in High Availability using k3d

Have you ever wanted to try K3s high availability cluster “mode,” and you either did not have the minimum three “spare nodes” or the time required to set up the same amount of VMs? Then you are in for a good treat: meet k3d! If you’re not familiar with k3d, its name gives you a hint to what it’s all about: K3s in Docker.

Splunk AR: Object Detection

The Splunk Augmented Reality (AR) team is excited to share more with you. In our first AR post, "Splunk AR: Taking Remote Collaboration To The Future is Already Here," from .conf20, we talked about our new Remote Collaboration feature, which helps field workers and remote experts collaborate in AR. In today’s post, we'll talk about our advancements in Object Detection. This new feature makes it even easier to deploy Splunk AR with your assets.

How to Choose Your Web Monitoring Provider | Advice from Uptime.com for 2021

Waking up at 3 AM to deal with a downed service is a special kind of pain, isn’t it? A cross between annoyance, fury, and half-asleep melodrama. Maybe you curse yourself or your team. It’s ok. We’ve all been there. Here at Uptime.com we want to help you get through life’s painful little moments with some advice on how to choose a web monitoring provider. It’s what we do, so we hope our advice and suggestions will lead you to a good fit.

I'm a VMware Admin: What Do I Do with Tanzu Kubernetes Clusters?

In previous blog posts, we’ve talked about the process of setting up vSphere with Tanzu (see our quick start guide) and creating your first Tanzu Kubernetes Cluster (TKC). As a vSphere Administrator, you might be saying to yourself, “This is cool and all, but what’s next? What’s an easy application to deploy?” The easiest target is the standard NGINX Kubernetes deployment, but that’s very basic.

How to Expose and protect Logic App using Azure API Management (Part 5) - API operation documentation: Descriptions (Part 1)

There is no doubt that organizations have a difficult task to address the current requirements for building and managing APIs, especially if they don’t use tools like API Management. APIs require up-to-date and strong documentation, increased security levels, comprehensive testing, routine versioning, and high-reliability to be appropriately utilized.