Operations | Monitoring | ITSM | DevOps | Cloud

Our Top 10 Kubernetes and Cloud Native Guides For 2019

2019 has been a great year for cloud native technologies. This year we launched the world's first managed Kubernetes service back-ended by Rancher's k3s distribution, opened the #KUBE100 beta, and watched our users create some really neat things on our platform. To that end, we wanted to highlight some of our top posts from the wider Civo community, and posts that showcase the exciting state of play of the cloud native landscape at the moment.

Create your own Docker containers to test and deploy applications

If you are a developer, a systems administrator, you work in the information technology sector or you are simply a technology enthusiast who has ever deployed some type of application, surely you will have faced the same problem we all ran into. If you are thinking of dependencies, bingo!

Prometheus monitoring at scale with the Elastic Stack

Tools. As engineers we all love great tools that help our teams work productively, resolve problems faster, be better. But tools can tend to grow in number, require additional maintenance, and most importantly, create silos. Each team has certain responsibilities and is constantly searching for tools that can address specific requirements in the best possible way.

Strengthening cybersecurity with log forensic analysis

Any system connected to the Internet is vulnerable to malicious attacks and breaches. If it’s online, there’s someone out there trying to break into it and do something bad with it (usually stealing data). Plain and simple. To protect your most valuable assets, you need bulletproof security measures, a skilled SecOps team, robust investigation tools, and reliable prevention/mitigation strategies.

Building Business with Cybersecurity

Cybersecurity is a hot topic. With high profile breaches making headlines on almost a monthly basis, combined with a far more restrictive regulatory environment, the need to responsibly protect your customers’ data has never been felt more keenly. It is estimated that a business is subjected to a ransomware attack every 14 seconds, predicted to drop to eleven seconds by 2021.

What Is Log Correlation? Making Sense of Disparate Logs

Before the need for log correlation, there was a time not so long ago when reading software application logs was simple. Your application would output log files in sequential order, and you’d read through them. In the event of a bug, software outage, or security incident, you could easily parse what happened and when. It was a tedious process, but it was simple.