Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Use MicroK8s with Raspberry Pi in this tutorial
Kubernetes is important to tackle, but its resource requirements can balloon dramatically. MicroK8s lets individuals experiment with the platform -- try it on Raspberry Pi 4. Continue Reading
Secure your infrastructure against VM ransomware
More hackers are using VMs as an access point to install and deploy encrypted ransomware. Make sure your security strategy includes prevention, response and analysis. Continue Reading
hardware security
Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system. Continue Reading
-
distributed applications (distributed apps)
Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms. Continue Reading
Podman: A worthy alternative to Docker for containers
Podman has long stood in Docker's shadow, but 'Podman in Action' author Daniel Walsh hopes to shine a light on Podman within the container market. Continue Reading
Do hypervisors limit vertical scalability?
Knowing hardware maximums and VM limits ensures you don't overload the system. Learn hypervisor scalability limits for Hyper-V, vSphere, ESXi and Red Hat Virtualization.Continue Reading
An introduction to VMware KVM mode
VM management often requires multiple monitors. KVM mode lets you set hot keys to navigate between VMs and the OS, so no task -- or workflow -- is lost among application windows.Continue Reading
Scrum vs. DevOps: Are they intertwined or redundant?
To keep up with a complex CI/CD environment, IT ops teams can choose between Scrum or DevOps -- or use them together. Discover the roles and benefits of each approach.Continue Reading
An overview of hardware support for virtualization
Intel, AMD and Arm processors optimize virtualization in multiple ways. Read up on the features for Intel VT, AMD-V, Armv9, Intel APICv, and AMD AVIC tech, as well as how they support VMs.Continue Reading
Develop a DevOps branching strategy to promote efficiency
Projects in DevOps environments can move quickly, which often creates chaos. To curb the confusion, use a branching strategy to track changes as teams work simultaneously.Continue Reading
-
7 principles of observability in modern applications
Organizations must keep these seven principles top of mind when monitoring and organizing data to institute observability practices that resolve problems quickly.Continue Reading
Elastic Stack (ELK Stack)
The Elastic Stack is a group of open source products from Elastic designed to help users take data from any type of source and in any format, and search, analyze and visualize that data in real time.Continue Reading
virtual switch (vSwitch)
A virtual switch (vSwitch) is a software program that enables one virtual machine (VM) to communicate with another.Continue Reading
The 3 pillars of observability: Logs, metrics and traces
Logs, metrics and traces offer their individual perspectives on system performance. When analyzed together, they provide a complete picture of your infrastructure.Continue Reading
Ubuntu snap vs. apt: Which package manager to use and when
Choosing an appropriate package manager depends primarily on your organization's specific IT ecosystem. Determine when snap or apt is the better call.Continue Reading
DevOps goals and objectives for a smooth adoption roadmap
Start your organization's DevOps adoption journey with the right set of metrics -- and drill down from there. And while no two orgs are the same, they share some key goals.Continue Reading
How to set up a K3s cluster
Admins have choices when it comes to selecting a Kubernetes distribution. One such option is K3s, which can be used for development or production. Here's how to get started.Continue Reading
How to track -- and measure -- technical debt
Technical debt can grow without an organization's knowledge or control -- unless they address it at the start. Here are different methods and tools to track and manage it.Continue Reading
Whip up recipes with 'Elasticsearch 8.x Cookbook'
Elasticsearch is a powerful and potentially complicated tool. With 'Elasticsearch 8.x Cookbook,' users can split exercises into manageable bites.Continue Reading
How to run Docker on an Azure VM
Microsoft Azure offers a lot of container management services for enterprises to choose from. One of those options is Azure Container Instances. Here's how to get started.Continue Reading
AMD (Advanced Micro Devices)
Advanced Micro Devices (AMD) is a semiconductor company, known for designing and developing computer processors and graphics technologies.Continue Reading
Use Dapr on Kubernetes to build microservices in production
Dapr is an application runtime that targets cloud-native application development. Developers can use it to streamline their workflows. Here's how.Continue Reading
Important DevOps engineer programming languages to learn
We've learned that DevOps demands some code knowledge -- but there are a lot of languages to choose from. Think about CI/CD, object-oriented languages and infrastructure as code.Continue Reading
How to compare Docker images with container-diff
You could pay for a vendor to analyze container images for you, or you could use container-diff for free. Compare container images before deployment to avoid unfortunate mishaps.Continue Reading
How to build a virtual router with VMware Workstation
Virtual networks in testing and development setups require virtual routers. In this step-by-step tutorial, use VMware and Windows tools to set up a virtual router.Continue Reading
Basic virsh network commands to know
It's helpful to know how to use virsh commands to manage VMs and virtual networks; some cloud providers don't support Ansible or VirtualBox. Get started with a few commands.Continue Reading
The future of OpenTelemetry for observability
To collect and analyze telemetry data from cloud-native apps, many organizations use OpenTelemetry for system observability. Discover its benefits and primary components.Continue Reading
How to choose the best CPU for virtualization
Selecting the right CPU for virtual infrastructures depends on many factors, including feature sets and hardware specs. Proper configuration of processor resources is also crucial.Continue Reading
Use Jenkins for deployment, support and provisioning in ops
IT organizations that keep Jenkins on the development side of the house miss out on the orchestrated workflow capabilities it brings to operations tasks.Continue Reading
How to use abstracted repositories in dependency injection
Dependencies in software design can complicate matters. Dependency injection helps simplify it -- but it's not without its faults. Here's what you need to know.Continue Reading
How to secure Kubernetes clusters in 7 steps
Kubernetes security is critical for an enterprise's welfare. To protect Kubernetes clusters, create a plan to implement security protocols and control access.Continue Reading
Manage resource use with VMware Horizon application pools
Load balancing is challenging in any environment, but with virtual desktops, uniformity of user experience is high priority. Use VMware Horizon to distribute vital resources.Continue Reading
Follow this 10-point virtualization security checklist
Failover clustering, encryption and prompt patching practices can help admins shore up their VMs in the face of online security threats from sources such as malware and bad actors.Continue Reading
Prepare for these common SRE interview questions
To ace that job interview, aspiring SREs should prepare to discuss everything from programming languages to network troubleshooting at varying levels of detail.Continue Reading
How to use Pulumi Automation API, with examples
In this tutorial, integrate Pulumi's Automation API into existing projects -- and remove the need for CLI to perform infrastructure lifecycle changes in a CI/CD pipeline.Continue Reading
6 DevOps soft skills and how they drive success
DevOps is built on collaboration and communication -- and soft skills make that foundation strong. Discover six soft skills to help set you apart.Continue Reading
Use Kubernetes and Terraform together for cluster management
Kubernetes and Terraform provide many container cluster management benefits -- but combining the two makes them even stronger. In this tutorial, discover how to use them together.Continue Reading
Is Kubernetes free as open source software?
Kubernetes is available open source, but also from IT vendors. A complex tool, it enables container orchestration at scale. Which version will pay off for enterprise adopters?Continue Reading
How to use Git to save PowerShell scripts
Git eases scripting by pushing developers into better habits -- especially around change documentation. Get familiar with the technology and how to use it with PowerShell.Continue Reading
host virtual machine (host VM)
A host virtual machine is the server component of a virtual machine (VM), the underlying hardware that provides computing resources to support a particular guest virtual machine (guest VM).Continue Reading
Agile operations (AgileOps)
Agile operations, or AgileOps, is a digital business operating model that builds on Agile methodologies and DevOps techniques to help organizations adapt to change quickly and efficiently.Continue Reading
What it means to do 'everything as code' in IT operations
If the concept of 'everything as code' sounds overwhelming, don't worry. Learn what it means, how to get started and ways you might already be using it.Continue Reading
virtual appliance
Considered a software equivalent of a hardware device, a virtual appliance (VA) is a preconfigured software solution.Continue Reading
How to install and deploy Quay on Red Hat OpenShift
Quay enables Red Hat OpenShift users to store and manage container images -- with added advantages. Follow this tutorial to install and deploy the container registry.Continue Reading
How to create a runbook template for uniform documentation
To avoid inconsistencies and disaster, implement a runbook template to strengthen your existing runbooks -- this includes detailed and clear steps for structure and organization.Continue Reading
CI/CD tutorial: How to set up a pipeline
A CI/CD pipeline saves time and ensures software quality during development. Follow this tutorial to level up your project and reduce developer workload with automation.Continue Reading
physical to virtual (P2V)
Physical to virtual (P2V), also called hardware virtualization, refers to the migration of physical machines to virtual machines (VMs).Continue Reading
Create an SSH key with GitHub for network access
SSH keys are a network security method that verifies the identity of the user or application seeking access to a system or other application. Create and store yours in GitHub.Continue Reading
virtual to virtual (V2V)
Virtual to virtual (V2V) refers to the migration of an operating system (OS), application program and data from a virtual machine (VM) or disk partition to another virtual machine or disk partition.Continue Reading
virtual
In computing, the term virtual refers to a digitally replicated version of something real, whether it's a machine, a switch, memory or even reality.Continue Reading
Scalable Processor Architecture (SPARC)
Scalable Processor Architecture (SPARC) is a 32- and 64-bit microprocessor architecture developed by Sun Microsystems in 1987.Continue Reading
The Red Hat ecosystem: Then vs. now
Red Hat remains one of the most influential open source companies. Linux no longer stands at the center of the Red Hat ecosystem -- but it hasn't disappeared from it either.Continue Reading
Look back at the top Kubernetes news of 2021
Kubernetes had many ups and downs over the course of 2021. Read 10 of the top Kubernetes news stories to ensure you're up to date heading into the new year.Continue Reading
IT systems management
Systems management is the administration of the information technology (IT) systems in an enterprise network or data center.Continue Reading
How do you debug a Kubernetes service deployment?
To debug a Kubernetes deployment, IT teams must start by following the basic rules of troubleshooting and then move to the smaller details to find the root cause of the problem.Continue Reading
How to build a Kubernetes operator
Operators unleash the full power of developing complicated offerings or abstractions on Kubernetes. And, while they have a lot of potential, there is a steep learning curve.Continue Reading
virtual to physical (V2P)
Virtual to physical (V2P) involves transferring or porting a virtual machine (VM) onto a physical machine.Continue Reading
Learn how to install MicroK8s for Kubernetes
MicroK8s enables admins to deploy and destroy Kubernetes in a flash. Follow this tutorial to learn how to install MicroK8s and combine with Multipass.Continue Reading
8 key DevOps roles and responsibilities for team success
More than most IT initiatives, DevOps is built around people. Involve the right professionals, and get those people primed to work in concerted ways.Continue Reading
How well do you know container basics?
As containers continue to evolve with IT operations, it's important to have a good grasp of the basics. Test your knowledge and understanding with this container quiz.Continue Reading
live migration
Live migration refers to the process of moving a virtual machine running on one physical host to another host without disrupting normal operations or causing any downtime or other adverse effects for the end user.Continue Reading
Low-cost virtualization courses to build your VMware skills
Online courses are a great option for professional development, but they can be costly. Options from Udemy, LinkedIn and Global Knowledge let you increase skills at minimal cost.Continue Reading
Learn to use Kubernetes CRDs in this tutorial example
Custom resource definitions enable IT organizations to create objects Kubernetes doesn't offer by default. Learn how to use them here.Continue Reading
Update incident response runbooks to meet new requirements
Incident response runbooks provide IT teams with the information needed to resolve common and serious incidents. Break a runbook down into flows to construct documentation.Continue Reading
ModelOps (model operations)
ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.Continue Reading
hardware virtualization
Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.Continue Reading
hardware-assisted virtualization
Hardware-assisted virtualization is the use of a computer's physical components to support the software that creates and manages virtual machines (VMs).Continue Reading
virtualization
Virtualization is the creation of a virtual -- rather than actual -- version of something, such as an operating system (OS), a server, a storage device or network resources.Continue Reading
COBOL (Common Business Oriented Language)
COBOL (Common Business-Oriented Language) is a high-level programming language for business applications. It was the first popular language designed to be operating system-agnostic and is still in use in many financial and business applications ...Continue Reading
virtual hard drive
A virtual hard drive file is a container file that acts similar to a physical hard drive.Continue Reading
virtual private server (VPS) or virtual dedicated server (VDS)
A virtual private server (VPS), also called a virtual dedicated server (VDS), is a virtual server that appears to the user as a dedicated server, but that is actually installed on a computer serving multiple websites.Continue Reading
Xen
Xen is the open source hypervisor included in the Linux kernel and, as such, it is available in all Linux distributions.Continue Reading
dependency hell
Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.Continue Reading
Boot2Docker
Boot2Docker is a minimalist Linux distribution with the sole purpose to run Docker containers. It was depreciated and is no longer recommended for use.Continue Reading
DevOps 2.0
DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.Continue Reading
distributed tracing
Distributed tracing, also called distributed request tracing, is a method for IT and DevOps teams to monitor applications, especially those composed of microservices.Continue Reading
branching
Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.Continue Reading
Application Performance Index (Apdex)
Application Performance Index, also known as Apdex, is an open standard intended to simplify reports of application performance.Continue Reading
blue/green deployment
A blue/green deployment is a change management strategy for releasing software code.Continue Reading
Learn the basics of virtual server security software selection
There are multiple factors in choosing the right security software for VMs and virtual infrastructure. Get familiar with potential threats, features to have and market offerings.Continue Reading
Amazon Elastic Container Registry (Amazon ECR)
Amazon Elastic Container Registry (Amazon ECR) is an Amazon Web Service (AWS) product that stores, manages and deploys Docker images, which are managed clusters of Amazon EC2 instances.Continue Reading
agile test automation pyramid
The agile test automation pyramid is a graphical strategy guide for implementing automated software testing.Continue Reading
Follow 6 key steps to deploy microservices in production
To succeed with microservices, IT organizations need to rethink the way they design and deploy applications -- and not all the necessary changes are technical ones.Continue Reading
Why and how to use eBPF for Kubernetes scaling
Scaling Kubernetes clusters has always been a challenge -- but eBPF makes the process smoother with service-specific monitors and a lack of special instrumentation.Continue Reading
Working with Docker Compose? Use environmental variables
Docker Compose streamlines container application deployments. Dig into the tool and see how the use of environment variables can hone the process further.Continue Reading
Blockchain: An immutable ledger to replace the database
Blockchains create a secure encryption beneficial to many businesses. This article offers use cases, benefits and limitations of the electronic database.Continue Reading
service mesh
A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.Continue Reading
An eBPF tutorial to try out the bpftrace framework
You know what eBPF is, but can you run it? This article offers a brief tutorial to demonstrate the bpftrace framework and how to install a simple eBPF program.Continue Reading
An introduction to eBPF and where it shines
With eBPF, developers can customize Linux OS software without changing the kernel. Discover the utility's basics and how it can be used for networking, monitoring and security.Continue Reading
3 FAQs to improve your Hyper-V basic knowledge
It is critical to develop a foundation of Hyper-V knowledge for successful management. These three FAQs can broaden your Hyper-V expertise prior to installation and deployment.Continue Reading
How to use Azure Arc-enabled Kubernetes, step by step
As the use of the cloud expands and becomes more complex, Azure Arc offers a way to manage resources. Learn how to set it up for Kubernetes with this tutorial.Continue Reading
How to keep Docker secrets secret
Secrets greatly increase an environment's security but can take some trial and error to implement correctly. Learn the basics, and then follow this tutorial to create a secret.Continue Reading
11 job interview questions for virtualization engineers
Interviews are your chance to showcase your overall knowledge -- and technical expertise -- of virtualization. Prepare for your next job interview and review typical questions.Continue Reading
Try PSScriptAnalyzer to check PowerShell code best practices
Meeting best practices can be a tough feat. Thankfully, PowerShell Script Analyzer checks the code for you. Follow these examples to learn how it works and get started.Continue Reading
Take this quick DevOps quiz to test your expertise
DevOps as a methodology and cultural movement has been around for years -- but how well do you know its concepts and best practices? Find out here.Continue Reading
Get familiar with the basics of vMotion live migration
VMware's vMotion simplifies the process of VM live migration. To use it properly, familiarize yourself with requirements for network bandwidth, host sizes and how it works.Continue Reading
How and when to use Nexthink remote actions
Data can tell admins a lot about what happens in an environment -- if they can collect it. See how the Nexthink platform and PowerShell scripts can gather end-user data.Continue Reading
Terraform cheat sheet: Notable commands, HCL and more
Terraform has a lot going on. This cheat sheet rounds up the essentials, from configuration settings to the key commands for managing the Terraform directory.Continue Reading
Get the right components for your home lab VM
Home lab VM setups are helpful to test technology and build VM management skills. Be sure to evaluate RAM, CPU, network speeds and management software for a successful deployment.Continue Reading
7 infrastructure as code books for IT pros to dig into
Need some reading material? Check out these books on infrastructure as code -- and popular IaC tools -- to pick up some new skills on the IT management practice.Continue Reading