Cybersecurity | Cloud | DevelopmentHow monitor memory of your EC2 instances via CloudWatch 2019 May 15, 2021 video 2019accessapacheAWSbeginnercloudwatchEC2lampLinuxlogmemorymonitoringramtutorial
Cybersecurity | Cloud | DevelopmentUsing Pod Security Policies to harden your Kubernetes cluster December 16, 2020 video 2019alertingArchitectureautomatebountybugcertificatecloudclusterdefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeykuberneteslogmaliciousmanagementmanagermonitoringmultinetworkOLAPOLTPOnionOpenopenscapOSINTpodpolarDBPolicyprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemtenantTortrafficusabilityUserVitessWireshark
Cybersecurity | Cloud | DevelopmentScale MySQL beyond limits with ProxySQL November 22, 2020 video 2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark
Cybersecurity | Cloud | DevelopmentWhy observability matters – now and in the future w/ Carl Bergquist (Grafana) July 24, 2020 video ContainersDashboardsDockerGrafanaLinuxmonitoringnetworkingOberservabilitysdnweave
Cybersecurity | Cloud | DevelopmentPromCon 2017: Play with Prometheus – Journey to Make “testing in Production” More Reliable July 8, 2020 video alertingmetricsmonitoringpromconprometheustelemetrytime seriestime series database