Search Results

Search Results 11 - 20 of 522

On-Demand Webinar

Exploring Kubernetes 1.18 with Alex Ellis

With the release of Kubernetes 1.18, we saw 40 features and updates added. In a recent blog post we collated these together in one place so that you can learn what may affect your clusters and prepare for change. Now, we go one step further, inviting Alex Ellis, CNCF Ambassador and Open Source project founder to share his take on the changes. We saw Alex’s in-depth article on the recent deprecations around “kubectl run” and asked him to pick four of his highlights to share with examples.

On-Demand Webinar

Cloud Native Monitoring: Scaling Prometheus

Challenges abound when it comes to securing and monitoring containers, Kubernetes, and cloud-native applications across development and production. Most notably, scaling Prometheus monitoring beyond a few servers and applications presents issues when trying to troubleshoot problems that span multiple applications and clusters. We’ll share our experience using Prometheus at scale, providing different solutions and highlighting the challenges to solve in each step.

On-Demand Webinar

DevOps Security, Monitoring and Compliance with OpenShift and Sysdig

Ensuring application security and compliance is one of the biggest challenges for any organization deploying applications in production. You need to detect and block vulnerabilities, quickly respond to incidents, and meet compliance standards and policies. With the Sysdig Secure DevOps Platform, you can embed security, maximize availability, and validate compliance—transforming your DevOps workflow into a secure DevOps workflow. In this session, you’ll hear about the Falco open source project, use cases for security in Red Hat OpenShift, and see a real-world demo for securing your OpenShift environment without disrupting application deployments.

Whitepaper

5 Keys to a Secure DevOps Workflow

DevOps is at a crossroads when it comes to securing containers and Kubernetes. You must meet security and compliance requirements before you can deploy new apps—but containers introduce new security challenges that existing DevOps tools and processes simply don’t address. So, how can you secure what you cannot see and further, how can you get the scale and data depth you need to secure your DevOps workflows effectively? Read 5 Keys to a Secure DevOps Workflow for essential recommendations to help you meet security and compliance requirements without adding risk or delay.