Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Build an automated image processing pipeline with AWS tools
In this guide, learn how to automate image processing with AWS Step Functions. Build an image processing pipeline with example code, then explore ways to expand your new workflow. Continue Reading
Virtual Machine Disk format (VMDK)
VMware Virtual Machine Disk format (VMDK) is a format specification for virtual machine (VM) disk image files. Continue Reading
Is observability as code overhyped?
Is observability as code as transformative as vendors claim or just another IT buzzword? Learn what to keep in mind when evaluating this emerging approach for your organization. Continue Reading
-
NoOps (no operations)
NoOps (no operations) is a concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there's no need for a dedicated team to manage software in-house. Continue Reading
IT service management (ITSM)
IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use IT. Continue Reading
management information systems (MIS)
Management information systems (MIS) is a department within an enterprise responsible for controlling the hardware and software systems that the organization uses to make business-critical decisions.Continue Reading
IT operations management (ITOM)
IT operations management (ITOM) is a strategic approach to managing an organization's information technology needs.Continue Reading
AMD Virtualization (AMD-V)
AMD-V (AMD Virtualization) technology refers to a set of hardware extensions and on-chip features for the AMD family of x86 microprocessors.Continue Reading
Open Container Initiative
The Open Container Initiative (OCI) is a collaborative project hosted under the Linux Foundation that is designed to establish common standards for container formats and runtimes.Continue Reading
bare-metal provisioning
Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hard disk.Continue Reading
-
Ansible
Ansible is an open source IT automation platform from Red Hat.Continue Reading
event stream processing (ESP)
Event stream processing (ESP) is a software programming technique designed to process a continuous stream of device data and take action on it in real time.Continue Reading
early adopter
An early adopter refers to a person who embraces new technology or tries a new product before most others.Continue Reading
Build a PowerShell performance monitoring script step by step
A PowerShell performance monitoring script defines and keeps track of system metrics. Learn to set up and query performance counters and use the results to build an HTML report.Continue Reading
Step-by-step guide: Get started with Weave for Kubernetes
Looking to streamline network management for Kubernetes clusters? Learn when and how to use CNI plugins, then walk through the steps of a Weave installation for Kubernetes.Continue Reading
log analytics
Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.Continue Reading
Kubernetes scheduler
The Kubernetes scheduler is a component of the open source Kubernetes container orchestration platform that controls performance, capacity and availability through policies and topology awareness.Continue Reading
Defining the relationship between SRE and DevOps teams
The lines between site reliability engineering and DevOps aren't always clear, but building a harmonious relationship between teams pays dividends for large cloud initiatives.Continue Reading
million instructions per second (MIPS)
Million instructions per second (MIPS) is a measure of a processor's speed, providing a standard for representing the number of instructions that a CPU can process in 1 second.Continue Reading
ServiceNow
ServiceNow is a software company that provides a cloud-based platform for automating IT management workflows.Continue Reading
IT service delivery
IT service delivery is the way a corporation provides users access to IT services, such as applications, data storage and other business resources.Continue Reading
How to set and manage environment variables in Kubernetes
In this tutorial, learn when to use -- or not use -- environment variables in Kubernetes, and compare methods for setting and updating their values with example code.Continue Reading
Go programming language
Go, also called Golang or Go language, is an open source programming language that Google developed.Continue Reading
Kubernetes node
A Kubernetes node is a logical collection of IT resources that runs workloads for one or more containers in a Kubernetes cluster.Continue Reading
STONITH (Shoot The Other Node In The Head)
STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.Continue Reading
Git
Git is an open source distributed version control system that is available for free under the GNU General Public License version 2.Continue Reading
GitHub
GitHub is a web-based version control and collaboration platform for software developers.Continue Reading
What are hyperautomation use cases for IT operations?
Fully automated NoOps workflows might not be possible, but there's always room to further automate existing processes. An expert explains two hyperautomation use cases for DevOps.Continue Reading
IT incident management
IT incident management is an area of IT service management (ITSM) wherein IT teams return a service to normal as quickly as possible after a disruption with as little negative impact on the business as possible.Continue Reading
How and why PowerShell Linux commands differ from Windows
PowerShell is a popular tool for IT professionals and a broad range of tasks. But PowerShell on Linux is not quite the same as on Windows. Let's explore the differences.Continue Reading
Kubernetes pod
Kubernetes pods are the smallest deployable computing units in Kubernetes, an open source system for container scheduling, orchestration and management.Continue Reading
Considerations when getting started with distributed tracing
Distributed tracing has advantages over traditional logging and monitoring, especially for microservices, but it can also affect application performance through added complexity.Continue Reading
mission-critical application
A mission-critical application is a software program or suite of related programs that must function continuously for a business or business segment to be successful.Continue Reading
container repository
A container repository is a collection of related container images that provide different versions of an application.Continue Reading
Google Kubernetes Engine (GKE)
Google Kubernetes Engine (GKE) is a managed Kubernetes service for containers and container clusters running on Google Cloud infrastructure.Continue Reading
3 key steps when creating a DevOps implementation plan
Shifting to the DevOps model can be complicated and challenging. Set your team up for success by learning which areas to prioritize at the early stages of DevOps adoption.Continue Reading
container image
A container image is an unchangeable, static file that includes executable code so it can run an isolated process on IT infrastructure.Continue Reading
memory paging
Memory paging is a memory management technique used to control sharing of memory resources belonging to a computer or virtual machine (VM).Continue Reading
Try out PowerShell grep equivalents with these examples
Though less well known than grep, PowerShell cmdlets such as Select-String have extensive search capabilities in their own right. Explore use cases for both in this tutorial.Continue Reading
The evolution of containers: Docker, Kubernetes and the future
Container technology is almost as old as VMs, although IT wasn't talking about the topic until Docker, Kubernetes and other tech made waves that caused a frenzy of activity.Continue Reading
Map physical GPUs to VMs with this GPU passthrough guide
Learn how to set up GPU passthrough -- a useful technique to support graphically intensive apps and machine learning models -- with a step-by-step tutorial for VMware environments.Continue Reading
compliance automation
Compliance automation, also known as automated compliance, is the practice of using technology -- such as applications with artificial intelligence features -- to perform and simplify compliance procedures.Continue Reading
YAML (YAML Ain't Markup Language)
YAML (YAML Ain't Markup Language) is a data serialization language used as the input format for diverse software applications.Continue Reading
Demystify the DevOps process, step by step
While varying definitions and vendor marketing spins can make the meaning of DevOps tough to nail down, there are concrete principles and processes that underpin the methodology.Continue Reading
rolling deployment
A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.Continue Reading
ChatOps
ChatOps, sometimes known as conversation-driven collaboration or conversation-driven DevOps, is the use of chat clients, chatbots and other real-time communication tools to facilitate software development and IT operations tasks.Continue Reading
How to deploy Kubernetes on VMware with vSphere Tanzu
Instead of working with Kubernetes with your regular platform, it might be time to give VMware vSphere with Tanzu a try. Follow this tutorial to get started.Continue Reading
friendly name
A friendly name is a term used to refer to a device, application file, certificate or other IT asset instead of its technical name.Continue Reading
log management
Log management is the collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of large volumes of log data created within an information system.Continue Reading
Compare Go vs. Python: What are the differences?
Golang and Python are both versatile, popular languages, but they have some important differences that developers should take into account when planning software projects.Continue Reading
IT automation
IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.Continue Reading
hardware emulation
Hardware emulation is the use of one hardware device to mimic the function of another hardware device.Continue Reading
software asset management (SAM)
Software asset management (SAM) is the administration of processes, policies and procedures that support the procurement, deployment, use, maintenance and disposal of software applications within an organization.Continue Reading
golden image
A golden image is a template for a virtual machine, virtual desktop, server or hard disk drive.Continue Reading
event-driven application
An event-driven application is a computer program written to respond to actions generated by a user or system.Continue Reading
guest virtual machine (guest VM)
A guest virtual machine (VM) is the software component of a VM, an independent instance of an operating system (OS), called a guest OS, and its associated software and information.Continue Reading
How to make and use maps in Golang
Maps are a popular data structure in many programming contexts thanks to their efficiency and speed. But, in Go, some unique features make maps especially useful.Continue Reading
Use the CALMS framework for a smooth DevOps transition
Adopting DevOps can be challenging, especially when communicating across IT and business teams. The five elements of the CALMS framework can help organizations measure progress.Continue Reading
DevSecOps
DevSecOps (development plus security plus operations) is an approach that combines application development, security, operations and infrastructure as code (IaC) in an automated continuous integration/continuous delivery (CI/CD) pipeline.Continue Reading
How does Kubernetes use etcd?
Etcd is a lightweight, highly available key-value store accessible to each node in a Kubernetes cluster. Find out how etcd works and learn how to use it inside Kubernetes.Continue Reading
Kubernetes operator
A Kubernetes operator is a method for application packaging and deployment that extends Kubernetes' capabilities to manage more complex, stateful workloads.Continue Reading
composable infrastructure
Composable infrastructure is a framework that decouples device resources in order to treat them as services.Continue Reading
serverless computing
Serverless computing is a cloud computing execution model that lets software developers build and run applications and servers without having to provision or manage the back-end infrastructure.Continue Reading
Dissect open source ransomware code to understand an attack
To protect your organization from ransomware, it's helpful to know what goes on behind the scenes. Unpack this ransomware code example to understand and defend against attacks.Continue Reading
Make a business case for VMware training
You can outsource infrastructure management to a third party or you can get IT admins the VMware training they need to install, manage and troubleshoot your environment.Continue Reading
Manage VMs with Azure Automation State Configuration
Admins can use the Azure Automation State Configuration tool to manage VMs in Azure, on premises and in other clouds. Follow this step-by-step tutorial to get started.Continue Reading
immutable infrastructure
Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.Continue Reading
legacy system (legacy application)
A legacy system is any outdated computing system, hardware or software that is still in use. Legacy systems include computer hardware, software applications, file formats and programming languages.Continue Reading
Why and how to use container malware scanning software
Malware is on the rise, and containers are potential attack vectors. Learn why it's crucial to check containers for vulnerabilities and compare container malware scanning tools.Continue Reading
Configure Azure Load Balancer for session persistence
Session persistence ensures users connect to the same server for the duration of their session. Find out how and why to set up session persistence in Azure Load Balancer.Continue Reading
What Golang generics support means for code structure
Generics are a relatively recent addition to the strongly and statically typed Go language. Learn the benefits of using generics in Golang and how to get started.Continue Reading
Learn how to bootstrap Kubernetes clusters with kubeadm
In this guide, learn to create, configure and run a Kubernetes cluster from scratch with kubeadm, a command-line tool that simplifies and automates cluster setup and management.Continue Reading
What is a Raspberry Pi used for?
IT infrastructure can get expensive fast, making single-board computers like the Raspberry Pi appealing for small projects. Learn what a Raspberry Pi does and explore IT use cases.Continue Reading
function as a service (FaaS)
Function as a service (FaaS) is a cloud computing model that enables cloud customers to develop applications and deploy functionalities and only be charged when the functionality executes.Continue Reading
How to integrate and monitor Kubernetes with New Relic
New Relic might be best known as a DevOps monitoring tool, but it can also help improve observability into your Kubernetes clusters. Follow this tutorial to get started.Continue Reading
What IT pros need to know about low-code limitations
Low-code environments promise to simplify and speed up software development, but their limitations can create challenges for enterprise IT. Compare models for low-code adoption.Continue Reading
How to manage stateful containers with Kubernetes
Organizations can reap the benefits of containers for stateful applications by using Kubernetes to maintain state in application processes and components.Continue Reading
Open core vs. open source: What's the difference?
Open core software has gained attention as an alternative to open source and proprietary models. Learn how open core differs from open source and the two approaches' pros and cons.Continue Reading
Explore the pros and cons of Go for DevOps
Author and Docker engineer Teiva Harsanyi explains the benefits of Golang -- including why he sees it as the future of back-end development -- and how to avoid common pitfalls.Continue Reading
Learn to manage Kubernetes costs with this Kubecost tutorial
Managing Kubernetes environments can be complex -- and expensive. Find out how to get started with Kubecost, a tool to monitor costs and capacity in Kubernetes clusters.Continue Reading
How to use Kubernetes' self-healing capability
Self-healing is a quality that enables software to autonomously resolve issues based on a desired state. Kubernetes' self-healing is built in, but it demands observation.Continue Reading
How to bolster vulnerability management with DevSecOps
DevSecOps pushes security work into every stage of the software delivery lifecycle. Vulnerability management is a critical element to this security posture.Continue Reading
How to set up external authentication in Rancher with GitHub
Local authentication is the default, but configuring Rancher to use external authentication services makes it easier to manage large, complex Kubernetes environments.Continue Reading
Build AI into the DevOps maturity model for smooth sailing
AI has promising applications in DevOps, but organizations must account for the maturity of their teams, processes and tools to ensure the success of their AI initiatives.Continue Reading
What is K3OS and how does it relate to K3s?
Discover the potential benefits of adopting K3OS, a lightweight Linux distribution developed to run Kubernetes workloads in low-resource environments.Continue Reading
What IT admins should consider when licensing a VM
Licensing for virtual machines can be particularly tricky to navigate for IT admins, who must ensure proper licensing for hosts -- as well as software running inside VMs.Continue Reading
How to establish a Kubernetes governance strategy
Because Kubernetes is a large, complex tool that touches so much of the IT ecosystem, governance policies are important to meet both internal and external standards.Continue Reading
Step-by-step guide to working with Crossplane and Kubernetes
Crossplane is built to extend Kubernetes resources to and from external sources like databases, the cloud or the edge. Try out the tool, and learn its processes with this tutorial.Continue Reading
real user monitoring (RUM)
Real user monitoring (RUM) is a technology used by developers and network operators to gain real-world observability into web performance and service availability.Continue Reading
An introduction to SRE documentation best practices
SRE documentation stands distinct from other types of IT documentation, not least because it's a core responsibility for site reliability engineers. What else makes it distinct?Continue Reading
root cause analysis
Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.Continue Reading
Is Kubernetes a hypervisor? How do they differ?
Kubernetes, on the surface, appears to perform the same task as a hypervisor. Does that make Kubernetes a hypervisor? The short answer: No. Let's clarify why it's not.Continue Reading
Putting up DevOps guardrails -- what does that mean?
IT projects without proper communication and collaboration can be risky for organizations to take on -- that's where DevOps guardrails come in. Learn more below.Continue Reading
Observability as code is key to the cloud operating model
Why is everything becoming 'as code'? Believe it or not, it's easier to manage and can save the headache of adopting a new, specialized tool. Use the tools you have for OaC.Continue Reading
Follow this tutorial to get started with Azure Bicep
Azure Bicep enables IT ops teams working with IaC to create and deploy Azure resources in a more streamlined manner. Follow this tutorial to learn how.Continue Reading
Use MicroK8s with Raspberry Pi in this tutorial
Kubernetes is important to tackle, but its resource requirements can balloon dramatically. MicroK8s lets individuals experiment with the platform -- try it on Raspberry Pi 4.Continue Reading
Secure your infrastructure against VM ransomware
More hackers are using VMs as an access point to install and deploy encrypted ransomware. Make sure your security strategy includes prevention, response and analysis.Continue Reading
hardware security
Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system.Continue Reading
distributed applications (distributed apps)
Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms.Continue Reading
Podman: A worthy alternative to Docker for containers
Podman has long stood in Docker's shadow, but 'Podman in Action' author Daniel Walsh hopes to shine a light on Podman within the container market.Continue Reading