Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
How to secure Kubernetes clusters in 7 steps
Kubernetes security is critical for an enterprise's welfare. To protect Kubernetes clusters, create a plan to implement security protocols and control access. Continue Reading
Manage resource use with VMware Horizon application pools
Load balancing is challenging in any environment, but with virtual desktops, uniformity of user experience is high priority. Use VMware Horizon to distribute vital resources. Continue Reading
Follow this 10-point virtualization security checklist
Failover clustering, encryption and prompt patching practices can help admins shore up their VMs in the face of online security threats from sources such as malware and bad actors. Continue Reading
-
Prepare for these common SRE interview questions
To ace that job interview, aspiring SREs should prepare to discuss everything from programming languages to network troubleshooting at varying levels of detail. Continue Reading
How to use Pulumi Automation API, with examples
In this tutorial, integrate Pulumi's Automation API into existing projects -- and remove the need for CLI to perform infrastructure lifecycle changes in a CI/CD pipeline. Continue Reading
6 DevOps soft skills and how they drive success
DevOps is built on collaboration and communication -- and soft skills make that foundation strong. Discover six soft skills to help set you apart.Continue Reading
Use Kubernetes and Terraform together for cluster management
Kubernetes and Terraform provide many container cluster management benefits -- but combining the two makes them even stronger. In this tutorial, discover how to use them together.Continue Reading
Is Kubernetes free as open source software?
Kubernetes is available open source, but also from IT vendors. A complex tool, it enables container orchestration at scale. Which version will pay off for enterprise adopters?Continue Reading
How to use Git to save PowerShell scripts
Git eases scripting by pushing developers into better habits -- especially around change documentation. Get familiar with the technology and how to use it with PowerShell.Continue Reading
host virtual machine (host VM)
A host virtual machine is the server component of a virtual machine (VM), the underlying hardware that provides computing resources to support a particular guest virtual machine (guest VM).Continue Reading
-
Agile operations (AgileOps)
Agile operations, or AgileOps, is a digital business operating model that builds on Agile methodologies and DevOps techniques to help organizations adapt to change quickly and efficiently.Continue Reading
What it means to do 'everything as code' in IT operations
If the concept of 'everything as code' sounds overwhelming, don't worry. Learn what it means, how to get started and ways you might already be using it.Continue Reading
virtual appliance
Considered a software equivalent of a hardware device, a virtual appliance (VA) is a preconfigured software solution.Continue Reading
How to install and deploy Quay on Red Hat OpenShift
Quay enables Red Hat OpenShift users to store and manage container images -- with added advantages. Follow this tutorial to install and deploy the container registry.Continue Reading
How to create a runbook template for uniform documentation
To avoid inconsistencies and disaster, implement a runbook template to strengthen your existing runbooks -- this includes detailed and clear steps for structure and organization.Continue Reading
CI/CD tutorial: How to set up a pipeline
A CI/CD pipeline saves time and ensures software quality during development. Follow this tutorial to level up your project and reduce developer workload with automation.Continue Reading
physical to virtual (P2V)
Physical to virtual (P2V), also called hardware virtualization, refers to the migration of physical machines to virtual machines (VMs).Continue Reading
Xen vs. KVM: What are the differences?
Admins often evaluate Xen vs. KVM as open source options. The main factors to consider in a primary hypervisor are organizational infrastructure and cloud adoption interests.Continue Reading
Create an SSH key with GitHub for network access
SSH keys are a network security method that verifies the identity of the user or application seeking access to a system or other application. Create and store yours in GitHub.Continue Reading
guest OS (guest operating system)
A guest OS is the operating system installed on either a virtual machine (VM) or partitioned disk.Continue Reading
virtual to virtual (V2V)
Virtual to virtual (V2V) refers to the migration of an operating system (OS), application program and data from a virtual machine (VM) or disk partition to another virtual machine or disk partition.Continue Reading
virtual
In computing, the term virtual refers to a digitally replicated version of something real, whether it's a machine, a switch, memory or even reality.Continue Reading
Scalable Processor Architecture (SPARC)
Scalable Processor Architecture (SPARC) is a 32- and 64-bit microprocessor architecture developed by Sun Microsystems in 1987.Continue Reading
The Red Hat ecosystem: Then vs. now
Red Hat remains one of the most influential open source companies. Linux no longer stands at the center of the Red Hat ecosystem -- but it hasn't disappeared from it either.Continue Reading
Look back at the top Kubernetes news of 2021
Kubernetes had many ups and downs over the course of 2021. Read 10 of the top Kubernetes news stories to ensure you're up to date heading into the new year.Continue Reading
IT systems management
Systems management is the administration of the information technology (IT) systems in an enterprise network or data center.Continue Reading
How do you debug a Kubernetes service deployment?
To debug a Kubernetes deployment, IT teams must start by following the basic rules of troubleshooting and then move to the smaller details to find the root cause of the problem.Continue Reading
How to build a Kubernetes operator
Operators unleash the full power of developing complicated offerings or abstractions on Kubernetes. And, while they have a lot of potential, there is a steep learning curve.Continue Reading
virtual to physical (V2P)
Virtual to physical (V2P) involves transferring or porting a virtual machine (VM) onto a physical machine.Continue Reading
Learn how to install MicroK8s for Kubernetes
MicroK8s enables admins to deploy and destroy Kubernetes in a flash. Follow this tutorial to learn how to install MicroK8s and combine with Multipass.Continue Reading
8 key DevOps roles and responsibilities for team success
More than most IT initiatives, DevOps is built around people. Involve the right professionals, and get those people primed to work in concerted ways.Continue Reading
How well do you know container basics?
As containers continue to evolve with IT operations, it's important to have a good grasp of the basics. Test your knowledge and understanding with this container quiz.Continue Reading
live migration
Live migration refers to the process of moving a virtual machine running on one physical host to another host without disrupting normal operations or causing any downtime or other adverse effects for the end user.Continue Reading
Low-cost virtualization courses to build your VMware skills
Online courses are a great option for professional development, but they can be costly. Options from Udemy, LinkedIn and Global Knowledge let you increase skills at minimal cost.Continue Reading
Learn to use Kubernetes CRDs in this tutorial example
Custom resource definitions enable IT organizations to create objects Kubernetes doesn't offer by default. Learn how to use them here.Continue Reading
Update incident response runbooks to meet new requirements
Incident response runbooks provide IT teams with the information needed to resolve common and serious incidents. Break a runbook down into flows to construct documentation.Continue Reading
ModelOps (model operations)
ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.Continue Reading
hardware virtualization
Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.Continue Reading
hardware-assisted virtualization
Hardware-assisted virtualization is the use of a computer's physical components to support the software that creates and manages virtual machines (VMs).Continue Reading
service virtualization
Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.Continue Reading
virtualization
Virtualization is the creation of a virtual -- rather than actual -- version of something, such as an operating system (OS), a server, a storage device or network resources.Continue Reading
COBOL (Common Business Oriented Language)
COBOL (Common Business-Oriented Language) is a high-level programming language for business applications. It was the first popular language designed to be operating system-agnostic and is still in use in many financial and business applications ...Continue Reading
virtual hard drive
A virtual hard drive file is a container file that acts similar to a physical hard drive.Continue Reading
virtual private server (VPS) or virtual dedicated server (VDS)
A virtual private server (VPS), also called a virtual dedicated server (VDS), is a virtual server that appears to the user as a dedicated server, but that is actually installed on a computer serving multiple websites.Continue Reading
Xen
Xen is the open source hypervisor included in the Linux kernel and, as such, it is available in all Linux distributions.Continue Reading
dependency hell
Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.Continue Reading
Boot2Docker
Boot2Docker is a minimalist Linux distribution with the sole purpose to run Docker containers. It was depreciated and is no longer recommended for use.Continue Reading
DevOps 2.0
DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.Continue Reading
declarative programming
Declarative programming is a method to abstract away the control flow for logic required for software to perform an action, and instead involves stating what the task or desired outcome is.Continue Reading
distributed tracing
Distributed tracing, also called distributed request tracing, is a method for IT and DevOps teams to monitor applications, especially those composed of microservices.Continue Reading
branching
Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.Continue Reading
Application Performance Index (Apdex)
Application Performance Index, also known as Apdex, is an open standard intended to simplify reports of application performance.Continue Reading
application containerization (app containerization)
Application containerization is an OS-level virtualization method used to deploy and run distributed applications without launching an entire virtual machine for each app.Continue Reading
blue/green deployment
A blue/green deployment is a change management strategy for releasing software code.Continue Reading
Learn the basics of virtual server security software selection
There are multiple factors in choosing the right security software for VMs and virtual infrastructure. Get familiar with potential threats, features to have and market offerings.Continue Reading
Amazon Elastic Container Registry (Amazon ECR)
Amazon Elastic Container Registry (Amazon ECR) is an Amazon Web Service (AWS) product that stores, manages and deploys Docker images, which are managed clusters of Amazon EC2 instances.Continue Reading
agile test automation pyramid
The agile test automation pyramid is a graphical strategy guide for implementing automated software testing.Continue Reading
Follow 6 key steps to deploy microservices in production
To succeed with microservices, IT organizations need to rethink the way they design and deploy applications -- and not all the necessary changes are technical ones.Continue Reading
Why and how to use eBPF for Kubernetes scaling
Scaling Kubernetes clusters has always been a challenge -- but eBPF makes the process smoother with service-specific monitors and a lack of special instrumentation.Continue Reading
Working with Docker Compose? Use environment variables
Docker Compose streamlines container application deployments. Dig into the tool and see how the use of environment variables can hone the process further.Continue Reading
Blockchain: An immutable ledger to replace the database
Blockchains create a secure encryption beneficial to many businesses. This article offers use cases, benefits and limitations of the electronic database.Continue Reading
service mesh
A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.Continue Reading
An eBPF tutorial to try out the bpftrace framework
You know what eBPF is, but can you run it? This article offers a brief tutorial to demonstrate the bpftrace framework and how to install a simple eBPF program.Continue Reading
An introduction to eBPF and where it shines
With eBPF, developers can customize Linux OS software without changing the kernel. Discover the utility's basics and how it can be used for networking, monitoring and security.Continue Reading
3 FAQs to improve your Hyper-V basic knowledge
It is critical to develop a foundation of Hyper-V knowledge for successful management. These three FAQs can broaden your Hyper-V expertise prior to installation and deployment.Continue Reading
How to use Azure Arc-enabled Kubernetes, step by step
As the use of the cloud expands and becomes more complex, Azure Arc offers a way to manage resources. Learn how to set it up for Kubernetes with this tutorial.Continue Reading
How to keep Docker secrets secret
Secrets greatly increase an environment's security but can take some trial and error to implement correctly. Learn the basics, and then follow this tutorial to create a secret.Continue Reading
11 job interview questions for virtualization engineers
Interviews are your chance to showcase your overall knowledge -- and technical expertise -- of virtualization. Prepare for your next job interview and review typical questions.Continue Reading
Try PSScriptAnalyzer to check PowerShell code best practices
Meeting best practices can be a tough feat. Thankfully, PowerShell Script Analyzer checks the code for you. Follow these examples to learn how it works and get started.Continue Reading
Take this quick DevOps quiz to test your expertise
DevOps as a methodology and cultural movement has been around for years -- but how well do you know its concepts and best practices? Find out here.Continue Reading
Get familiar with the basics of vMotion live migration
VMware's vMotion simplifies the process of VM live migration. To use it properly, familiarize yourself with requirements for network bandwidth, host sizes and how it works.Continue Reading
How and when to use Nexthink remote actions
Data can tell admins a lot about what happens in an environment -- if they can collect it. See how the Nexthink platform and PowerShell scripts can gather end-user data.Continue Reading
Terraform cheat sheet: Notable commands, HCL and more
Terraform has a lot going on. This cheat sheet rounds up the essentials, from configuration settings to the key commands for managing the Terraform directory.Continue Reading
Get the right components for your home lab VM
Home lab VM setups are helpful to test technology and build VM management skills. Be sure to evaluate RAM, CPU, network speeds and management software for a successful deployment.Continue Reading
7 infrastructure as code books for IT pros to dig into
Need some reading material? Check out these books on infrastructure as code -- and popular IaC tools -- to pick up some new skills on the IT management practice.Continue Reading
A beginner's guide to a multistage Docker build
Multistage builds help you manage Dockerfile size during container proliferation. Get the process right with the necessary guidelines and ideal use cases.Continue Reading
Tips to launch VirtualBox nested virtualization
Nested VMs make it easy to expand VM capacity without additional hardware. Take a look at the process to avoid any major issues and get these VMs up and running.Continue Reading
Don't limit observability to 3 pillars
Logs, metrics and tracing are the pillars of observability but fall short in system health comprehension. Learn why data source tracking gives better insight into your environment.Continue Reading
Easily transfer VMs to the cloud with Microsoft Azure Migrate
It takes time to plan, assess and set up a VM migration. Microsoft's Azure Migrate gives you a central dashboard to efficiently get your VMware and Hyper-V VMs into the cloud.Continue Reading
Run servers from anywhere with Hyper-V remote management
Microsoft's Hyper-V Manager makes it easy to set up remote options and standardizes hypervisor resource allocation and deployments.Continue Reading
chaos engineering
Chaos engineering is the process of testing a distributed computing system to ensure that it can withstand unexpected disruptions.Continue Reading
9 advanced IT certifications for operations experts
To be an IT expert requires dedication to the ever-changing technology and processes. Here's a list of certifications to demonstrate that skill and experience.Continue Reading
continuous delivery (CD)
Continuous delivery (CD) is an approach for software delivery in which development teams produce and test code in short but continuous cycles, usually with high degrees of automation.Continue Reading
Build self-healing IT systems for data resilience
With an autonomous approach to system infrastructure, companies can save time and costs. Learn why IT admins should adopt this type of automation and how to implement it.Continue Reading
Use AWS Glue workflows to convert semistructured data
New to AWS Glue? Learn about the tool and how to incorporate it into DevOps workflows with examples that look at data transformation and machine learning.Continue Reading
zero-touch provisioning (ZTP)
Zero-touch provisioning (ZTP) is a method of setting up devices that automatically configures the device using a switch feature.Continue Reading
How to build a CI/CD pipeline -- with examples
Ready to set up a CI/CD pipeline? Follow these general steps, with guidance toward specific examples depending upon your own specific needs and resources.Continue Reading
Learn Docker best practices with this interactive book
The author of The Docker Workshop, Vincent Sesto, discusses Docker's ingenuity and gives tips to IT admins on the leading container creation technology in this Q&A.Continue Reading
Docker image
A Docker image is a file used to execute code in a Docker container.Continue Reading
How to auto scale Kubernetes pods for microservices
In Kubernetes, autoscaling prevents over provisioning resources for microservices running in a cluster. Follow this tutorial to set up horizontal and vertical scaling.Continue Reading
9 ways to infuse security in your CI/CD pipeline
Rapid release cycles need not compromise the security of an application and supporting infrastructure. Follow these guidelines to ensure security throughout your CI/CD pipeline.Continue Reading
Combine PowerShell and Docker to simplify testing across OSes
Run PowerShell scripts in Docker containers to manage multiple environments from the same system. Follow this tutorial to see how to test Linux environments with a Windows host OS.Continue Reading
Kubernetes basics: A step-by-step implementation tutorial
This Kubernetes implementation example demonstrates how to create a single-node cluster on Windows 10 to get a containerized application up and running.Continue Reading
Master containerized microservices monitoring
Before IT teams can enjoy the benefits that containers and microservices bring, they must tackle several monitoring hurdles first.Continue Reading
Kubernetes
Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.Continue Reading
Try out this GitOps tutorial with Flux and Kubernetes
Learn how to implement GitOps with Kubernetes workloads. See the benefits of this approach and follow this Flux tutorial to get started.Continue Reading
How Puppet works: Using the configuration management tool
With Puppet, enterprises can manage configurations and simplify the DevOps process as a whole. Grasp how it works, and see if it's the right choice for your organization.Continue Reading
Tackle Kubernetes observability with the right metrics
Observability is a natural extension of IT monitoring -- and container environments only get more complicated. Use the right metrics for the greatest return.Continue Reading
Type 2 hypervisor (hosted hypervisor)
A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system.Continue Reading
The keys to an efficient help desk staffing model
Hiring skilled staff alone to fill help desk roles is not enough to improve workflows. Learn how to unlock a help desk's full potential with these tips.Continue Reading