Grafana Wants to Help You Avoid Getting Dinged by Kubernetes Costs
Grafana aims to assist in preventing cloud native and Kubernetes-related cost overruns, which are often the result of unused resources — a problem often referred to as “zombie resources.” This issue...
View ArticleA Deep Dive into the Microsoft Radius Architecture
In my previous article, I looked at the high-level workflow involved in using Microsoft’s newly launched Radius to deploy modern applications. Let’s take a look at the architecture and zoom into the...
View ArticleHow AI and Automation Can Improve Operational Resiliency
When asked to define “operational resiliency,” Dormain Drewitz, vice president of platform advocacy at PagerDuty, recalled a recent conversation she had with Sam Newman, the noted O’Reilly author and...
View ArticleInnovating Access Management in a Dynamic Way
Like most technologists, legacy tech has a special place in my heart. And while it’s fun to go back and play an 8-bit NES or drive a classic car, good luck trying to get a Switch cartridge or hook up...
View Article10 Things to Consider When Allowing Access to Production
The perpetual tug of war between security and productivity has been an unresolved challenge for developers. In an ideal scenario, production environments would remain untouched, shielded from all but...
View ArticleHow Measurement Elevation and Aggregation Change Behaviors
In software delivery, conversations about metrics and measurement wax and wane as people discover useful techniques or get hurt by unintended consequences. Understanding how measurement elevation and...
View ArticleThe Next IT Challenge Is All about Speed and Self-Service
As organizations work to meet the ever-changing demands of customers, the spotlight often falls on IT and engineering departments. These are the teams expected to build and deploy innovative solutions...
View ArticleHoliday On-Call Duty: A Present or Punishment?
Imagine this: It’s Thanksgiving Day and you just crossed the finish line at a Turkey Trot 5K, ready to celebrate, when you check your phone to see 10 missed calls from PagerDuty. Yikes. You forgot...
View ArticleIf You’re Remediating This, It’s Too Late
When was the last time you, as an IT operations professional, felt like you were ready for a security problem before it came up? Or even as soon as it came up? If you’re like much of the IT ops world,...
View ArticleKubescape 3.0: The Result of Lessons Learned with eBPF for Security
The rising crest of eBPF’s (Extended Berkeley Packet Filter) hype cycle is largely attributed to its capabilities to help secure applications running on Kubernetes clusters. With its monitoring and...
View ArticleDon’t Rely on eBPF Alone for Kubernetes
eBPF (Extended Berkeley Packet Filter) has garnered significant attention for security, monitoring, observability and other use cases. Indeed, its capability to extend its hooks for security purposes...
View ArticleWhy Is IPv6 Adoption Slow?
IPv6, the most recent version of the Internet Protocol, was designed to overcome the address-space limitations of IPv4, which has been overwhelmed by the explosion of the digital ecosystem. Although...
View ArticleHow Platform Engineering Comes from Complexity
CHICAGO — Platform engineering comes from complexity. It sure seems like it after this week at KubeCon + CloudNativeCon North America, hearing from people like Release CEO Tommy McClung. “I was the...
View Article3 Smart Ways to Use Gen AI for IT Operations Health
It seems generative artificial intelligence (Gen AI) is on everyone’s minds these days — and with good reason. In the current macroeconomic environment, AI can help organizations with fewer resources...
View ArticleA Portal as a Product Approach for Internal Developer Portals
Internal developer portals are a critical asset for organizations looking to implement platform engineering, reduce developer cognitive load, meet standards and increase overall efficacy. However,...
View Article5 Ways to Supercharge Incident Remediation with Automation
For today’s digital-first organizations, software problems often become business problems. As companies’ revenue and customer experience increasingly move online, incidents and disruptions — and their...
View ArticleTwo Easy Ways to Improve Your Website Homepage
I’ve been looking at a lot of websites for software development tools, and I’ve discovered something: Many software website homepages are not very good. I’m sorry, but it’s true — and someone needed...
View ArticleDoes Kubernetes Really Perform Better on Bare Metal vs. VMs?
Many people presume that a Kubernetes cluster deployed on bare metal performs better than one deployed on virtual machines, but until now there hasn’t been any proof of that assumption. At Gcore, we...
View ArticleHow a Popular Combo Provides DDoS Protection
BGP (Border Gateway Protocol) and GRE (Generic Routing Encapsulation) are a popular combination for DDoS (distributed denial of service) protection as they allow rerouting of traffic to dedicated...
View ArticleHow Meta Patches Linux at Hyperscale
RICHMOND, Va. — Anyone with a tech clue can patch a Linux server. But, patching thousands of them without any downtime, that’s not easy. At the Linux Plumbers Conference, the invite-only conference of...
View Article