Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
continuous deployment
Continuous deployment is a strategy for software development and releases in which every code change is automatically run through a pipeline of tests and inspections before being pushed into production. Continue Reading
Manage IT infrastructure with NSX's multi-tenant features
VMware NSX now supports multi-tenancy, which can help admins manage complex IT environments. Explore what's new and get started with this step-by-step walkthrough. Continue Reading
GitOps
GitOps is an operational framework that applies DevOps practices, such as continuous integration/continuous delivery (CI/CD) and version control, to infrastructure automation. Continue Reading
-
Learn how to use the PowerShell Trim method
With the Trim method in your PowerShell toolbox, you can write scripts to remove unwanted characters from strings without using regular expressions. Get started with this tutorial. Continue Reading
SBOMs and security: What IT and DevOps need to know
By integrating software bill of materials creation into the software development lifecycle, IT and DevOps teams can build more secure and maintainable applications. Continue Reading
-
Definitions to Get Started
- What is AIOps (artificial intelligence for IT operations)?
- What is change failure rate (CFR)?
- What are ModelOps (model operations) analytics models?
- What is LXD (Linux container hypervisor)?
- What is a service mesh?
- GitHub
- Type 2 hypervisor (hosted hypervisor)
- Virtual Machine Management Service
5 best practices for building a strong DevOps culture
Under the CALMS framework, establishing an open, collaborative culture from the outset is just as important as tools and technologies when starting out on your DevOps journey.Continue Reading
disaggregated server
A disaggregated server is a server whose components and resources are divided into subsystems.Continue Reading
Can you use Kubernetes without Docker?
Although Docker and Kubernetes are often used together, the two serve different roles in IT environments -- and Docker containers aren't the only option for Kubernetes deployments.Continue Reading
phased rollout
Phased rollout is a hardware or software migration method that involves incrementally implementing a new system.Continue Reading
Improve Kubernetes network performance with Cilium and eBPF
Learn how the Cilium Kubernetes plugin and eBPF framework can improve network efficiency and security, then walk through installing Cilium on a K3s cluster with sample code.Continue Reading
-
cloud orchestration (cloud orchestrator)
Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.Continue Reading
Stay ahead of threats with DevOps security best practices
Unsure where to start when it comes to securing your DevOps environment? Taking these five actions can strengthen your organization's defenses against cyber attacks.Continue Reading
virtual machine (VM)
A virtual machine (VM) is an operating system (OS) or application environment installed on software that imitates dedicated hardware.Continue Reading
IT monitoring
IT monitoring is a process that gathers metrics on the operations of an IT environment.Continue Reading
configuration file
A configuration file, often shortened to 'config file,' defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.Continue Reading
systems operator (sysop)
In IT, a systems operator (sysop) is a person who runs computer servers and other devices on a daily basis in a data center.Continue Reading
Set up a machine learning pipeline in this Kubeflow tutorial
For teams running machine learning workflows with Kubernetes, using Kubeflow can lead to faster, smoother deployments. Get started with this installation guide.Continue Reading
service discovery
Service discovery is the automatic detection of devices and offered services over a network.Continue Reading
open core model (open core software)
The open core model is an approach to software development that combines attributes of both the open source and closed source models.Continue Reading
mutation testing
Mutation testing, also known as code mutation testing, is a form of white box testing in which testers change specific components of an application's source code to ensure a software test suite can detect the changes.Continue Reading
Platform engineering vs. DevOps: What's the difference?
Platform engineering and DevOps both contribute to successful software development, but it's important to understand the nuances between the two functions in an IT organization.Continue Reading
Manage complex IT environments with AIOps and observability
As IT environments grow in complexity, AIOps and observability tools can provide valuable insights and identify problem areas -- but prepare for adoption hurdles along the way.Continue Reading
application release automation (ARA)
Application release automation (ARA) is a process that automatically packages and deploys an application, or application updates, through the stages of development to production.Continue Reading
IT incident report
An IT incident report is documentation of an event that disrupted the normal operations of an IT system or had the potential to do so as well as how the situation was handled.Continue Reading
Automate firewall rules with Terraform and VMware NSX
In this hands-on tutorial, learn how infrastructure-as-code tools such as Terraform can streamline firewall management with automated, standardized configuration of firewall rules.Continue Reading
How to implement FinOps in DevOps pipelines
As cloud costs climb, applying FinOps principles in DevOps practices can optimize cloud spend. Learn how FinOps and DevOps can work together to promote better cloud resource use.Continue Reading
IT performance management
IT performance management is the supervision of an organization's IT infrastructure to ensure key performance indicators, service levels and budgets comply with the organization's goals.Continue Reading
Kubernetes operator vs. controller: What's the difference?
Kubernetes operators and controllers both manage cluster resources but play distinct roles in the Kubernetes ecosystem. Explore their differences and learn when to use each.Continue Reading
trusted execution environment (TEE)
A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system's main operating system (OS).Continue Reading
How to secure passwords with PowerShell
Storing passwords in plain text is bad, but what methods are good? Try one of these approaches, such as secure strings or the SecretManagement module, to encrypt passwords.Continue Reading
Kubernetes volume
A Kubernetes volume is a directory containing data accessible to containers in a given pod, the smallest deployable unit in a Kubernetes cluster.Continue Reading
Simplify code with for_each and dynamic blocks in Terraform
In this tutorial, get hands-on practice using Terraform features like dynamic blocks and the for_each attribute to write cleaner, more reusable code for cloud deployments.Continue Reading
Build an automated image processing pipeline with AWS tools
In this guide, learn how to automate image processing with AWS Step Functions. Build an image processing pipeline with example code, then explore ways to expand your new workflow.Continue Reading
Virtual Machine Disk format (VMDK)
VMware Virtual Machine Disk format (VMDK) is a format specification for virtual machine (VM) disk image files.Continue Reading
Is observability as code overhyped?
Is observability as code as transformative as vendors claim or just another IT buzzword? Learn what to keep in mind when evaluating this emerging approach for your organization.Continue Reading
NoOps (no operations)
NoOps (no operations) is a concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there's no need for a dedicated team to manage software in-house.Continue Reading
IT service management (ITSM)
IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use IT.Continue Reading
management information systems (MIS)
Management information systems (MIS) is a department within an enterprise responsible for controlling the hardware and software systems that the organization uses to make business-critical decisions.Continue Reading
IT operations management (ITOM)
IT operations management (ITOM) is a strategic approach to managing an organization's information technology needs.Continue Reading
AMD Virtualization (AMD-V)
AMD-V (AMD Virtualization) technology refers to a set of hardware extensions and on-chip features for the AMD family of x86 microprocessors.Continue Reading
Open Container Initiative
The Open Container Initiative (OCI) is a collaborative project hosted under the Linux Foundation that is designed to establish common standards for container formats and runtimes.Continue Reading
bare-metal provisioning
Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hard disk.Continue Reading
Ansible
Ansible is an open source IT automation platform from Red Hat.Continue Reading
event stream processing (ESP)
Event stream processing (ESP) is a software programming technique designed to process a continuous stream of device data and take action on it in real time.Continue Reading
early adopter
An early adopter refers to a person who embraces new technology or tries a new product before most others.Continue Reading
Build a PowerShell performance monitoring script step by step
A PowerShell performance monitoring script defines and keeps track of system metrics. Learn to set up and query performance counters and use the results to build an HTML report.Continue Reading
Step-by-step guide: Get started with Weave for Kubernetes
Looking to streamline network management for Kubernetes clusters? Learn when and how to use CNI plugins, then walk through the steps of a Weave installation for Kubernetes.Continue Reading
log analytics
Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.Continue Reading
Kubernetes scheduler
The Kubernetes scheduler is a component of the open source Kubernetes container orchestration platform that controls performance, capacity and availability through policies and topology awareness.Continue Reading
million instructions per second (MIPS)
Million instructions per second (MIPS) is a measure of a processor's speed, providing a standard for representing the number of instructions that a CPU can process in 1 second.Continue Reading
How to set and manage environment variables in Kubernetes
In this tutorial, learn when to use -- or not use -- environment variables in Kubernetes, and compare methods for setting and updating their values with example code.Continue Reading
Go programming language
Go, also called Golang or Go language, is an open source programming language that Google developed.Continue Reading
Kubernetes node
A Kubernetes node is a logical collection of IT resources that runs workloads for one or more containers in a Kubernetes cluster.Continue Reading
STONITH (Shoot The Other Node In The Head)
STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.Continue Reading
Git
Git is an open source distributed version control system that is available for free under the GNU General Public License version 2.Continue Reading
What are hyperautomation use cases for IT operations?
Fully automated NoOps workflows might not be possible, but there's always room to further automate existing processes. An expert explains two hyperautomation use cases for DevOps.Continue Reading
How and why PowerShell Linux commands differ from Windows
PowerShell is a popular tool for IT professionals and a broad range of tasks. But PowerShell on Linux is not quite the same as on Windows. Let's explore the differences.Continue Reading
Kubernetes pod
Kubernetes pods are the smallest deployable computing units in Kubernetes, an open source system for container scheduling, orchestration and management.Continue Reading
Considerations when getting started with distributed tracing
Distributed tracing has advantages over traditional logging and monitoring, especially for microservices, but it can also affect application performance through added complexity.Continue Reading
mission-critical application
A mission-critical application is a software program or suite of related programs that must function continuously for a business or business segment to be successful.Continue Reading
container repository
A container repository is a collection of related container images that provide different versions of an application.Continue Reading
Google Kubernetes Engine (GKE)
Google Kubernetes Engine (GKE) is a managed Kubernetes service for containers and container clusters running on Google Cloud infrastructure.Continue Reading
3 key steps when creating a DevOps implementation plan
Shifting to the DevOps model can be complicated and challenging. Set your team up for success by learning which areas to prioritize at the early stages of DevOps adoption.Continue Reading
container image
A container image is an unchangeable, static file that includes executable code so it can run an isolated process on IT infrastructure.Continue Reading
memory paging
Memory paging is a memory management technique used to control sharing of memory resources belonging to a computer or virtual machine (VM).Continue Reading
Try out PowerShell grep equivalents with these examples
Though less well known than grep, PowerShell cmdlets such as Select-String have extensive search capabilities in their own right. Explore use cases for both in this tutorial.Continue Reading
The evolution of containers: Docker, Kubernetes and the future
Container technology is almost as old as VMs, although IT wasn't talking about the topic until Docker, Kubernetes and other tech made waves that caused a frenzy of activity.Continue Reading
Map physical GPUs to VMs with this GPU passthrough guide
Learn how to set up GPU passthrough -- a useful technique to support graphically intensive apps and machine learning models -- with a step-by-step tutorial for VMware environments.Continue Reading
compliance automation
Compliance automation, also known as automated compliance, is the practice of using technology -- such as applications with artificial intelligence features -- to perform and simplify compliance procedures.Continue Reading
YAML (YAML Ain't Markup Language)
YAML (YAML Ain't Markup Language) is a data serialization language used as the input format for diverse software applications.Continue Reading
Demystify the DevOps process, step by step
While varying definitions and vendor marketing spins can make the meaning of DevOps tough to nail down, there are concrete principles and processes that underpin the methodology.Continue Reading
rolling deployment
A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.Continue Reading
ChatOps
ChatOps, sometimes known as conversation-driven collaboration or conversation-driven DevOps, is the use of chat clients, chatbots and other real-time communication tools to facilitate software development and IT operations tasks.Continue Reading
How to deploy Kubernetes on VMware with vSphere Tanzu
Instead of working with Kubernetes with your regular platform, it might be time to give VMware vSphere with Tanzu a try. Follow this tutorial to get started.Continue Reading
friendly name
A friendly name is a term used to refer to a device, application file, certificate or other IT asset instead of its technical name.Continue Reading
IT automation
IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.Continue Reading
Compare Go vs. Python: What are the differences?
Golang and Python are both versatile, popular languages, but they have some important differences that developers should take into account when planning software projects.Continue Reading
hardware emulation
Hardware emulation is the use of one hardware device to mimic the function of another hardware device.Continue Reading
software asset management (SAM)
Software asset management (SAM) is the administration of processes, policies and procedures that support the procurement, deployment, use, maintenance and disposal of software applications within an organization.Continue Reading
golden image
A golden image is a template for a virtual machine, virtual desktop, server or hard disk drive.Continue Reading
event-driven application
An event-driven application is a computer program written to respond to actions generated by a user or system.Continue Reading
guest virtual machine (guest VM)
A guest virtual machine (VM) is the software component of a VM, an independent instance of an operating system (OS), called a guest OS, and its associated software and information.Continue Reading
How to make and use maps in Golang
Maps are a popular data structure in many programming contexts thanks to their efficiency and speed. But, in Go, some unique features make maps especially useful.Continue Reading
Use the CALMS framework for a smooth DevOps transition
Adopting DevOps can be challenging, especially when communicating across IT and business teams. The five elements of the CALMS framework can help organizations measure progress.Continue Reading
DevSecOps
DevSecOps (development plus security plus operations) is an approach that combines application development, security, operations and infrastructure as code (IaC) in an automated continuous integration/continuous delivery (CI/CD) pipeline.Continue Reading
How does Kubernetes use etcd?
Etcd is a lightweight, highly available key-value store accessible to each node in a Kubernetes cluster. Find out how etcd works and learn how to use it inside Kubernetes.Continue Reading
Kubernetes operator
A Kubernetes operator is a method for application packaging and deployment that extends Kubernetes' capabilities to manage more complex, stateful workloads.Continue Reading
composable infrastructure
Composable infrastructure is a framework that decouples device resources in order to treat them as services.Continue Reading
serverless computing
Serverless computing is a cloud computing execution model that lets software developers build and run applications and servers without having to provision or manage the back-end infrastructure.Continue Reading
Dissect open source ransomware code to understand an attack
To protect your organization from ransomware, it's helpful to know what goes on behind the scenes. Unpack this ransomware code example to understand and defend against attacks.Continue Reading
Make a business case for VMware training
You can outsource infrastructure management to a third party or you can get IT admins the VMware training they need to install, manage and troubleshoot your environment.Continue Reading
Manage VMs with Azure Automation State Configuration
Admins can use the Azure Automation State Configuration tool to manage VMs in Azure, on premises and in other clouds. Follow this step-by-step tutorial to get started.Continue Reading
immutable infrastructure
Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.Continue Reading
legacy system (legacy application)
A legacy system is any outdated computing system, hardware or software that is still in use. Legacy systems include computer hardware, software applications, file formats and programming languages.Continue Reading
Why and how to use container malware scanning software
Malware is on the rise, and containers are potential attack vectors. Learn why it's crucial to check containers for vulnerabilities and compare container malware scanning tools.Continue Reading
Configure Azure Load Balancer for session persistence
Session persistence ensures users connect to the same server for the duration of their session. Find out how and why to set up session persistence in Azure Load Balancer.Continue Reading
What Golang generics support means for code structure
Generics are a relatively recent addition to the strongly and statically typed Go language. Learn the benefits of using generics in Golang and how to get started.Continue Reading
Learn how to bootstrap Kubernetes clusters with kubeadm
In this guide, learn to create, configure and run a Kubernetes cluster from scratch with kubeadm, a command-line tool that simplifies and automates cluster setup and management.Continue Reading
What is a Raspberry Pi used for?
IT infrastructure can get expensive fast, making single-board computers like the Raspberry Pi appealing for small projects. Learn what a Raspberry Pi does and explore IT use cases.Continue Reading
function as a service (FaaS)
Function as a service (FaaS) is a cloud computing model that enables cloud customers to develop applications and deploy functionalities and only be charged when the functionality executes.Continue Reading