Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
How to integrate and monitor Kubernetes with New Relic
New Relic might be best known as a DevOps monitoring tool, but it can also help improve observability into your Kubernetes clusters. Follow this tutorial to get started. Continue Reading
What IT pros need to know about low-code limitations
Low-code environments promise to simplify and speed up software development, but their limitations can create challenges for enterprise IT. Compare models for low-code adoption. Continue Reading
How to manage stateful containers with Kubernetes
Organizations can reap the benefits of containers for stateful applications by using Kubernetes to maintain state in application processes and components. Continue Reading
-
Open core vs. open source: What's the difference?
Open core software has gained attention as an alternative to open source and proprietary models. Learn how open core differs from open source and the two approaches' pros and cons. Continue Reading
Explore the pros and cons of Go for DevOps
Author and Docker engineer Teiva Harsanyi explains the benefits of Golang -- including why he sees it as the future of back-end development -- and how to avoid common pitfalls. Continue Reading
-
Definitions to Get Started
- What is a configuration file?
- What is AIOps (artificial intelligence for IT operations)?
- What is change failure rate (CFR)?
- What are ModelOps (model operations) analytics models?
- What is LXD (Linux container hypervisor)?
- What is a service mesh?
- GitHub
- Type 2 hypervisor (hosted hypervisor)
Learn to manage Kubernetes costs with this Kubecost tutorial
Managing Kubernetes environments can be complex -- and expensive. Find out how to get started with Kubecost, a tool to monitor costs and capacity in Kubernetes clusters.Continue Reading
How to use Kubernetes' self-healing capability
Self-healing is a quality that enables software to autonomously resolve issues based on a desired state. Kubernetes' self-healing is built in, but it demands observation.Continue Reading
How to bolster vulnerability management with DevSecOps
DevSecOps pushes security work into every stage of the software delivery lifecycle. Vulnerability management is a critical element to this security posture.Continue Reading
How to set up external authentication in Rancher with GitHub
Local authentication is the default, but configuring Rancher to use external authentication services makes it easier to manage large, complex Kubernetes environments.Continue Reading
Build AI into the DevOps maturity model for smooth sailing
AI has promising applications in DevOps, but organizations must account for the maturity of their teams, processes and tools to ensure the success of their AI initiatives.Continue Reading
-
What is K3OS and how does it relate to K3s?
Discover the potential benefits of adopting K3OS, a lightweight Linux distribution developed to run Kubernetes workloads in low-resource environments.Continue Reading
What IT admins should consider when licensing a VM
Licensing for virtual machines can be particularly tricky to navigate for IT admins, who must ensure proper licensing for hosts -- as well as software running inside VMs.Continue Reading
How to establish a Kubernetes governance strategy
Because Kubernetes is a large, complex tool that touches so much of the IT ecosystem, governance policies are important to meet both internal and external standards.Continue Reading
Step-by-step guide to working with Crossplane and Kubernetes
Crossplane is built to extend Kubernetes resources to and from external sources like databases, the cloud or the edge. Try out the tool, and learn its processes with this tutorial.Continue Reading
real user monitoring (RUM)
Real user monitoring (RUM) is a technology used by developers and network operators to gain real-world observability into web performance and service availability.Continue Reading
An introduction to SRE documentation best practices
SRE documentation stands distinct from other types of IT documentation, not least because it's a core responsibility for site reliability engineers. What else makes it distinct?Continue Reading
root cause analysis
Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.Continue Reading
Is Kubernetes a hypervisor? How do they differ?
Kubernetes, on the surface, appears to perform the same task as a hypervisor. Does that make Kubernetes a hypervisor? The short answer: No. Let's clarify why it's not.Continue Reading
Putting up DevOps guardrails -- what does that mean?
IT projects without proper communication and collaboration can be risky for organizations to take on -- that's where DevOps guardrails come in. Learn more below.Continue Reading
Observability as code is key to the cloud operating model
Why is everything becoming 'as code'? Believe it or not, it's easier to manage and can save the headache of adopting a new, specialized tool. Use the tools you have for OaC.Continue Reading
Follow this tutorial to get started with Azure Bicep
Azure Bicep enables IT ops teams working with IaC to create and deploy Azure resources in a more streamlined manner. Follow this tutorial to learn how.Continue Reading
Use MicroK8s with Raspberry Pi in this tutorial
Kubernetes is important to tackle, but its resource requirements can balloon dramatically. MicroK8s lets individuals experiment with the platform -- try it on Raspberry Pi 4.Continue Reading
Secure your infrastructure against VM ransomware
More hackers are using VMs as an access point to install and deploy encrypted ransomware. Make sure your security strategy includes prevention, response and analysis.Continue Reading
hardware security
Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system.Continue Reading
distributed applications (distributed apps)
Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms.Continue Reading
Podman: A worthy alternative to Docker for containers
Podman has long stood in Docker's shadow, but 'Podman in Action' author Daniel Walsh hopes to shine a light on Podman within the container market.Continue Reading
Do hypervisors limit vertical scalability?
Knowing hardware maximums and VM limits ensures you don't overload the system. Learn hypervisor scalability limits for Hyper-V, vSphere, ESXi and Red Hat Virtualization.Continue Reading
An introduction to VMware KVM mode
VM management often requires multiple monitors. KVM mode lets you set hot keys to navigate between VMs and the OS, so no task -- or workflow -- is lost among application windows.Continue Reading
Scrum vs. DevOps: Are they intertwined or redundant?
To keep up with a complex CI/CD environment, IT ops teams can choose between Scrum or DevOps -- or use them together. Discover the roles and benefits of each approach.Continue Reading
An overview of hardware support for virtualization
Intel, AMD and Arm processors optimize virtualization in multiple ways. Read up on the features for Intel VT, AMD-V, Armv9, Intel APICv, and AMD AVIC tech, as well as how they support VMs.Continue Reading
Develop a DevOps branching strategy to promote efficiency
Projects in DevOps environments can move quickly, which often creates chaos. To curb the confusion, use a branching strategy to track changes as teams work simultaneously.Continue Reading
7 principles of observability in modern applications
Organizations must keep these seven principles top of mind when monitoring and organizing data to institute observability practices that resolve problems quickly.Continue Reading
Elastic Stack (ELK Stack)
The Elastic Stack is a group of open source products from Elastic designed to help users take data from any type of source and in any format, and search, analyze and visualize that data in real time.Continue Reading
virtual switch (vSwitch)
A virtual switch (vSwitch) is a software program that enables one virtual machine (VM) to communicate with another.Continue Reading
The 3 pillars of observability: Logs, metrics and traces
Logs, metrics and traces offer their individual perspectives on system performance. When analyzed together, they provide a complete picture of your infrastructure.Continue Reading
Ubuntu snap vs. apt: Which package manager to use and when
Choosing an appropriate package manager depends primarily on your organization's specific IT ecosystem. Determine when snap or apt is the better call.Continue Reading
DevOps goals and objectives for a smooth adoption roadmap
Start your organization's DevOps adoption journey with the right set of metrics -- and drill down from there. And while no two orgs are the same, they share some key goals.Continue Reading
How to set up a K3s cluster
Admins have choices when it comes to selecting a Kubernetes distribution. One such option is K3s, which can be used for development or production. Here's how to get started.Continue Reading
How to track -- and measure -- technical debt
Technical debt can grow without an organization's knowledge or control -- unless they address it at the start. Here are different methods and tools to track and manage it.Continue Reading
Whip up recipes with 'Elasticsearch 8.x Cookbook'
Elasticsearch is a powerful and potentially complicated tool. With 'Elasticsearch 8.x Cookbook,' users can split exercises into manageable bites.Continue Reading
How to run Docker on an Azure VM
Microsoft Azure offers a lot of container management services for enterprises to choose from. One of those options is Azure Container Instances. Here's how to get started.Continue Reading
AMD (Advanced Micro Devices)
Advanced Micro Devices (AMD) is a semiconductor company, known for designing and developing computer processors and graphics technologies.Continue Reading
Use Dapr on Kubernetes to build microservices in production
Dapr is an application runtime that targets cloud-native application development. Developers can use it to streamline their workflows. Here's how.Continue Reading
Important DevOps engineer programming languages to learn
We've learned that DevOps demands some code knowledge -- but there are a lot of languages to choose from. Think about CI/CD, object-oriented languages and infrastructure as code.Continue Reading
How to compare Docker images with container-diff
You could pay for a vendor to analyze container images for you, or you could use container-diff for free. Compare container images before deployment to avoid unfortunate mishaps.Continue Reading
How to build a virtual router with VMware Workstation
Virtual networks in testing and development setups require virtual routers. In this step-by-step tutorial, use VMware and Windows tools to set up a virtual router.Continue Reading
Basic virsh network commands to know
It's helpful to know how to use virsh commands to manage VMs and virtual networks; some cloud providers don't support Ansible or VirtualBox. Get started with a few commands.Continue Reading
The future of OpenTelemetry for observability
To collect and analyze telemetry data from cloud-native apps, many organizations use OpenTelemetry for system observability. Discover its benefits and primary components.Continue Reading
How to choose the best CPU for virtualization
Selecting the right CPU for virtual infrastructures depends on many factors, including feature sets and hardware specs. Proper configuration of processor resources is also crucial.Continue Reading
Use Jenkins for deployment, support and provisioning in ops
IT organizations that keep Jenkins on the development side of the house miss out on the orchestrated workflow capabilities it brings to operations tasks.Continue Reading
How to use abstracted repositories in dependency injection
Dependencies in software design can complicate matters. Dependency injection helps simplify it -- but it's not without its faults. Here's what you need to know.Continue Reading
How to secure Kubernetes clusters in 7 steps
Kubernetes security is critical for an enterprise's welfare. To protect Kubernetes clusters, create a plan to implement security protocols and control access.Continue Reading
Manage resource use with VMware Horizon application pools
Load balancing is challenging in any environment, but with virtual desktops, uniformity of user experience is high priority. Use VMware Horizon to distribute vital resources.Continue Reading
Follow this 10-point virtualization security checklist
Failover clustering, encryption and prompt patching practices can help admins shore up their VMs in the face of online security threats from sources such as malware and bad actors.Continue Reading
Prepare for these common SRE interview questions
To ace that job interview, aspiring SREs should prepare to discuss everything from programming languages to network troubleshooting at varying levels of detail.Continue Reading
How to use Pulumi Automation API, with examples
In this tutorial, integrate Pulumi's Automation API into existing projects -- and remove the need for CLI to perform infrastructure lifecycle changes in a CI/CD pipeline.Continue Reading
6 DevOps soft skills and how they drive success
DevOps is built on collaboration and communication -- and soft skills make that foundation strong. Discover six soft skills to help set you apart.Continue Reading
Use Kubernetes and Terraform together for cluster management
Kubernetes and Terraform provide many container cluster management benefits -- but combining the two makes them even stronger. In this tutorial, discover how to use them together.Continue Reading
Is Kubernetes free as open source software?
Kubernetes is available open source, but also from IT vendors. A complex tool, it enables container orchestration at scale. Which version will pay off for enterprise adopters?Continue Reading
How to use Git to save PowerShell scripts
Git eases scripting by pushing developers into better habits -- especially around change documentation. Get familiar with the technology and how to use it with PowerShell.Continue Reading
Agile operations (AgileOps)
Agile operations, or AgileOps, is a digital business operating model that builds on Agile methodologies and DevOps techniques to help organizations adapt to change quickly and efficiently.Continue Reading
What it means to do 'everything as code' in IT operations
If the concept of 'everything as code' sounds overwhelming, don't worry. Learn what it means, how to get started and ways you might already be using it.Continue Reading
virtual appliance
Considered a software equivalent of a hardware device, a virtual appliance (VA) is a preconfigured software solution.Continue Reading
How to install and deploy Quay on Red Hat OpenShift
Quay enables Red Hat OpenShift users to store and manage container images -- with added advantages. Follow this tutorial to install and deploy the container registry.Continue Reading
How to create a runbook template for uniform documentation
To avoid inconsistencies and disaster, implement a runbook template to strengthen your existing runbooks -- this includes detailed and clear steps for structure and organization.Continue Reading
CI/CD tutorial: How to set up a pipeline
A CI/CD pipeline saves time and ensures software quality during development. Follow this tutorial to level up your project and reduce developer workload with automation.Continue Reading
physical to virtual (P2V)
Physical to virtual (P2V), also called hardware virtualization, refers to the migration of physical machines to virtual machines (VMs).Continue Reading
Create an SSH key with GitHub for network access
SSH keys are a network security method that verifies the identity of the user or application seeking access to a system or other application. Create and store yours in GitHub.Continue Reading
virtual to virtual (V2V)
Virtual to virtual (V2V) refers to the migration of an operating system (OS), application program and data from a virtual machine (VM) or disk partition to another virtual machine or disk partition.Continue Reading
virtual
In computing, the term virtual refers to a digitally replicated version of something real, whether it's a machine, a switch, memory or even reality.Continue Reading
Scalable Processor Architecture (SPARC)
Scalable Processor Architecture (SPARC) is a 32- and 64-bit microprocessor architecture developed by Sun Microsystems in 1987.Continue Reading
The Red Hat ecosystem: Then vs. now
Red Hat remains one of the most influential open source companies. Linux no longer stands at the center of the Red Hat ecosystem -- but it hasn't disappeared from it either.Continue Reading
Look back at the top Kubernetes news of 2021
Kubernetes had many ups and downs over the course of 2021. Read 10 of the top Kubernetes news stories to ensure you're up to date heading into the new year.Continue Reading
IT systems management
Systems management is the administration of the information technology (IT) systems in an enterprise network or data center.Continue Reading
How do you debug a Kubernetes service deployment?
To debug a Kubernetes deployment, IT teams must start by following the basic rules of troubleshooting and then move to the smaller details to find the root cause of the problem.Continue Reading
How to build a Kubernetes operator
Operators unleash the full power of developing complicated offerings or abstractions on Kubernetes. And, while they have a lot of potential, there is a steep learning curve.Continue Reading
virtual to physical (V2P)
Virtual to physical (V2P) involves transferring or porting a virtual machine (VM) onto a physical machine.Continue Reading
Learn how to install MicroK8s for Kubernetes
MicroK8s enables admins to deploy and destroy Kubernetes in a flash. Follow this tutorial to learn how to install MicroK8s and combine with Multipass.Continue Reading
8 key DevOps roles and responsibilities for team success
More than most IT initiatives, DevOps is built around people. Involve the right professionals, and get those people primed to work in concerted ways.Continue Reading
How well do you know container basics?
As containers continue to evolve with IT operations, it's important to have a good grasp of the basics. Test your knowledge and understanding with this container quiz.Continue Reading
live migration
Live migration refers to the process of moving a virtual machine running on one physical host to another host without disrupting normal operations or causing any downtime or other adverse effects for the end user.Continue Reading
Low-cost virtualization courses to build your VMware skills
Online courses are a great option for professional development, but they can be costly. Options from Udemy, LinkedIn and Global Knowledge let you increase skills at minimal cost.Continue Reading
Learn to use Kubernetes CRDs in this tutorial example
Custom resource definitions enable IT organizations to create objects Kubernetes doesn't offer by default. Learn how to use them here.Continue Reading
Update incident response runbooks to meet new requirements
Incident response runbooks provide IT teams with the information needed to resolve common and serious incidents. Break a runbook down into flows to construct documentation.Continue Reading
What is hardware virtualization?
Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.Continue Reading
What is hardware-assisted virtualization?
Hardware-assisted virtualization is the use of a computer's physical components to support the software that creates and manages virtual machines (VMs).Continue Reading
COBOL (Common Business Oriented Language)
COBOL (Common Business-Oriented Language) is a high-level programming language for business applications. It was the first popular language designed to be operating system-agnostic and is still in use in many financial and business applications ...Continue Reading
What is a virtual hard drive?
A virtual hard drive file is a container file that acts similar to a physical hard drive.Continue Reading
virtual private server (VPS) or virtual dedicated server (VDS)
A virtual private server (VPS), also called a virtual dedicated server (VDS), is a virtual server that appears to the user as a dedicated server, but that is actually installed on a computer serving multiple websites.Continue Reading
Xen
Xen is the open source hypervisor included in the Linux kernel and, as such, it is available in all Linux distributions.Continue Reading
dependency hell
Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.Continue Reading
Boot2Docker
Boot2Docker is a minimalist Linux distribution with the sole purpose to run Docker containers. It was depreciated and is no longer recommended for use.Continue Reading
What is DevOps 2.0?
DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.Continue Reading
distributed tracing
Distributed tracing, also called distributed request tracing, is a method for IT and DevOps teams to monitor applications, especially those composed of microservices.Continue Reading
branching
Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.Continue Reading
What is Application Performance Index (Apdex)?
Application Performance Index, also known as Apdex, is an open standard intended to simplify reports of application performance.Continue Reading
What is blue/green deployment?
A blue/green deployment is a change management strategy for releasing software code.Continue Reading
Learn the basics of virtual server security software selection
There are multiple factors in choosing the right security software for VMs and virtual infrastructure. Get familiar with potential threats, features to have and market offerings.Continue Reading
What is Amazon Elastic Container Registry (Amazon ECR)?
Amazon Elastic Container Registry (Amazon ECR) is an Amazon Web Service (AWS) product that stores, manages and deploys Docker images, which are managed clusters of Amazon EC2 instances.Continue Reading
agile test automation pyramid
The agile test automation pyramid is a graphical strategy guide for implementing automated software testing.Continue Reading