Live Webinar - March 31, 2020 10:00am PDT / 6:00pm GMT

K8s Limits and Requests: Monitoring and Troubleshooting by example

Are your Kubernetes applications not performing well enough? Is your infrastructure oversized? Kubernetes limits and requests dictate the resources available to your applications, so when they aren’t set correctly your cluster suffers from CPU throttling and Out Of Memory Kills. Oversizing your infrastructure is an easy, but expensive, solution — there must be a better way.

Prometheus metrics give you insight on your Kubernetes limits and requests, helping detect and troubleshoot common issues. Learn how to maximize the availability and performance of your Kubernetes infrastructure with proven examples.

Speaker:  

  • Victor Jimenez Cerrada, Technical Marketing Manager

 

You may also be interested in these upcoming live events:

April 2 – Automating Security for DevOps Workflows
Your developers need to be productive as you ramp containers and Kubernetes in production — without security being a blocker. With several software updates a day in a cloud-native environment, legacy tools can’t keep up. Running reliable and secure containers requires that security and DevOps work better together. We’ve got some great tips to share about automating and integrating security and compliance into the DevOps workflow, so your cloud applications ship faster.

April 7 – Owning Secure DevOps for Google’s Anthos & GKE
As cloud-native becomes the standard for application deployment, DevOps teams are being asked to take ownership of security and compliance along with application performance and availability. Join us to hear how this is being addressed by customers across the Kubernetes lifecycle. We’ll also demo best practices for vulnerability management, runtime security, and container forensics with Google’s Anthos and GKE.

April 21 – PCI Compliance in Containers & Kubernetes
Many of your applications are now starting to run on containers in the cloud. This means compliance and managing risk are top priorities. Your security teams understand PCI guidelines, but the challenge is a clear mapping of those PCI controls to container/Kubernetes environments. Ultimately, you need to ensure compliance is not blocking your code from going into production.

April 30 – Top 5 Cloud Native Pipeline Security Considerations
In this webinar, we’ll take a deep dive into Booz Allen Hamilton’s award-winning ways of securing modern software development. Specifically, we’ll share strong learnings and best practices to confidently protect your pipeline at each stage.