Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
WebAssembly
WebAssembly (Wasm) is a binary instruction format for compiling and executing code in a client-side web browser. Continue Reading
VM BIOS (virtual machine basic input/output system)
A VM BIOS (virtual machine basic input/output system) is the set of instructions that controls the booting process of a VM. Continue Reading
Knative
Knative is an open source project based on the Kubernetes platform for building, deploying and managing serverless workloads that can run in the cloud, on premises or in a third-party data center. Continue Reading
-
Install Calico for Kubernetes in this video walkthrough
In this video tutorial and demo, a DevOps engineer explains how to manage network traffic in Kubernetes clusters with Calico, a Container Network Interface plugin. Continue Reading
storage pool
A storage pool is capacity aggregated from disparate physical storage resources in a shared storage environment. Continue Reading
Kubernetes networking 101: Best practices and challenges
Before jumping into the landscape of CNI plugins for Kubernetes, it's important to understand the basic elements of Kubernetes networking. Follow this guide to get started.Continue Reading
Manage multiple environments with Terraform workspaces
Terraform workspaces let DevOps teams manage configurations for different environments in a centralized way. Get started with workspaces through hands-on examples in this tutorial.Continue Reading
Docker Engine
Docker Engine is the underlying client-server technology that supports the tasks and workflows involved in building, shipping and running containerized applications using Docker's components and services.Continue Reading
continual service improvement
Continual service improvement (CSI) is a method to identify and execute opportunities to improve IT processes and services, and to objectively measure the effects of these efforts over time.Continue Reading
mean time to detect (MTTD)
Mean time to detect (MTTD) is a measure of how long a problem exists in an IT deployment before the appropriate parties become aware of it.Continue Reading
-
Ansible playbook
An Ansible playbook is an organized unit of scripts that defines the tasks involved in managing a system configuration using the automation tool Ansible.Continue Reading
continuous deployment
Continuous deployment is a strategy for software development and releases in which every code change is automatically run through a pipeline of tests and inspections before being pushed into production.Continue Reading
AIOps (artificial intelligence for IT operations)
Artificial intelligence for IT operations (AIOps) is an umbrella term for the use of big data analytics, machine learning and other AI technologies to automate the identification and resolution of common IT issues.Continue Reading
Manage IT infrastructure with NSX's multi-tenant features
VMware NSX now supports multi-tenancy, which can help admins manage complex IT environments. Explore what's new and get started with this step-by-step walkthrough.Continue Reading
GitOps
GitOps is an operational framework that applies DevOps practices, such as continuous integration/continuous delivery (CI/CD) and version control, to infrastructure automation.Continue Reading
IT operations (IT ops)
The term IT operations (IT ops) describes the many processes and services that an IT department administers.Continue Reading
Learn how to use the PowerShell Trim method
With the Trim method in your PowerShell toolbox, you can write scripts to remove unwanted characters from strings without using regular expressions. Get started with this tutorial.Continue Reading
SBOMs and security: What IT and DevOps need to know
By integrating software bill of materials creation into the software development lifecycle, IT and DevOps teams can build more secure and maintainable applications.Continue Reading
Red Hat Summit 2023 news and conference guide
Use this Red Hat Summit conference guide to stay up to date on current trends, emerging technologies and information from keynote speakers and industry experts.Continue Reading
5 best practices for building a strong DevOps culture
Under the CALMS framework, establishing an open, collaborative culture from the outset is just as important as tools and technologies when starting out on your DevOps journey.Continue Reading
disaggregated server
A disaggregated server is a server whose components and resources are divided into subsystems.Continue Reading
Can you use Kubernetes without Docker?
Although Docker and Kubernetes are often used together, the two serve different roles in IT environments -- and Docker containers aren't the only option for Kubernetes deployments.Continue Reading
phased rollout
Phased rollout is a hardware or software migration method that involves incrementally implementing a new system.Continue Reading
Improve Kubernetes network performance with Cilium and eBPF
Learn how the Cilium Kubernetes plugin and eBPF framework can improve network efficiency and security, then walk through installing Cilium on a K3s cluster with sample code.Continue Reading
cloud orchestration (cloud orchestrator)
Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.Continue Reading
Stay ahead of threats with DevOps security best practices
Unsure where to start when it comes to securing your DevOps environment? Taking these five actions can strengthen your organization's defenses against cyber attacks.Continue Reading
virtual machine (VM)
A virtual machine (VM) is an operating system (OS) or application environment installed on software that imitates dedicated hardware.Continue Reading
IT monitoring
IT monitoring is a process that gathers metrics on the operations of an IT environment.Continue Reading
configuration file
A configuration file, often shortened to 'config file,' defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.Continue Reading
systems operator (sysop)
In IT, a systems operator (sysop) is a person who runs computer servers and other devices on a daily basis in a data center.Continue Reading
Set up a machine learning pipeline in this Kubeflow tutorial
For teams running machine learning workflows with Kubernetes, using Kubeflow can lead to faster, smoother deployments. Get started with this installation guide.Continue Reading
service discovery
Service discovery is the automatic detection of devices and offered services over a network.Continue Reading
open core model (open core software)
The open core model is an approach to software development that combines attributes of both the open source and closed source models.Continue Reading
mutation testing
Mutation testing, also known as code mutation testing, is a form of white box testing in which testers change specific components of an application's source code to ensure a software test suite can detect the changes.Continue Reading
Platform engineering vs. DevOps: What's the difference?
Platform engineering and DevOps both contribute to successful software development, but it's important to understand the nuances between the two functions in an IT organization.Continue Reading
Manage complex IT environments with AIOps and observability
As IT environments grow in complexity, AIOps and observability tools can provide valuable insights and identify problem areas -- but prepare for adoption hurdles along the way.Continue Reading
application release automation (ARA)
Application release automation (ARA) is a process that automatically packages and deploys an application, or application updates, through the stages of development to production.Continue Reading
IT incident report
An IT incident report is documentation of an event that disrupted the normal operations of an IT system or had the potential to do so as well as how the situation was handled.Continue Reading
Automate firewall rules with Terraform and VMware NSX
In this hands-on tutorial, learn how infrastructure-as-code tools such as Terraform can streamline firewall management with automated, standardized configuration of firewall rules.Continue Reading
How to implement FinOps in DevOps pipelines
As cloud costs climb, applying FinOps principles in DevOps practices can optimize cloud spend. Learn how FinOps and DevOps can work together to promote better cloud resource use.Continue Reading
IT performance management
IT performance management is the supervision of an organization's IT infrastructure to ensure key performance indicators, service levels and budgets comply with the organization's goals.Continue Reading
Kubernetes operator vs. controller: What's the difference?
Kubernetes operators and controllers both manage cluster resources but play distinct roles in the Kubernetes ecosystem. Explore their differences and learn when to use each.Continue Reading
trusted execution environment (TEE)
A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system's main operating system (OS).Continue Reading
How to secure passwords with PowerShell
Storing passwords in plain text is bad, but what methods are good? Try one of these approaches, such as secure strings or the SecretManagement module, to encrypt passwords.Continue Reading
Kubernetes volume
A Kubernetes volume is a directory containing data accessible to containers in a given pod, the smallest deployable unit in a Kubernetes cluster.Continue Reading
Simplify code with for_each and dynamic blocks in Terraform
In this tutorial, get hands-on practice using Terraform features like dynamic blocks and the for_each attribute to write cleaner, more reusable code for cloud deployments.Continue Reading
Build an automated image processing pipeline with AWS tools
In this guide, learn how to automate image processing with AWS Step Functions. Build an image processing pipeline with example code, then explore ways to expand your new workflow.Continue Reading
Virtual Machine Disk format (VMDK)
VMware Virtual Machine Disk format (VMDK) is a format specification for virtual machine (VM) disk image files.Continue Reading
Is observability as code overhyped?
Is observability as code as transformative as vendors claim or just another IT buzzword? Learn what to keep in mind when evaluating this emerging approach for your organization.Continue Reading
NoOps (no operations)
NoOps (no operations) is a concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there's no need for a dedicated team to manage software in-house.Continue Reading
IT service management (ITSM)
IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use IT.Continue Reading
management information systems (MIS)
Management information systems (MIS) is a department within an enterprise responsible for controlling the hardware and software systems that the organization uses to make business-critical decisions.Continue Reading
IT operations management (ITOM)
IT operations management (ITOM) is a strategic approach to managing an organization's information technology needs.Continue Reading
AMD Virtualization (AMD-V)
AMD-V (AMD Virtualization) technology refers to a set of hardware extensions and on-chip features for the AMD family of x86 microprocessors.Continue Reading
Open Container Initiative
The Open Container Initiative (OCI) is a collaborative project hosted under the Linux Foundation that is designed to establish common standards for container formats and runtimes.Continue Reading
bare-metal provisioning
Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hard disk.Continue Reading
Ansible
Ansible is an open source IT automation platform from Red Hat.Continue Reading
event stream processing (ESP)
Event stream processing (ESP) is a software programming technique designed to process a continuous stream of device data and take action on it in real time.Continue Reading
early adopter
An early adopter refers to a person who embraces new technology or tries a new product before most others.Continue Reading
Build a PowerShell performance monitoring script step by step
A PowerShell performance monitoring script defines and keeps track of system metrics. Learn to set up and query performance counters and use the results to build an HTML report.Continue Reading
Step-by-step guide: Get started with Weave for Kubernetes
Looking to streamline network management for Kubernetes clusters? Learn when and how to use CNI plugins, then walk through the steps of a Weave installation for Kubernetes.Continue Reading
log analytics
Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.Continue Reading
Kubernetes scheduler
The Kubernetes scheduler is a component of the open source Kubernetes container orchestration platform that controls performance, capacity and availability through policies and topology awareness.Continue Reading
Defining the relationship between SRE and DevOps teams
The lines between site reliability engineering and DevOps aren't always clear, but building a harmonious relationship between teams pays dividends for large cloud initiatives.Continue Reading
million instructions per second (MIPS)
Million instructions per second (MIPS) is a measure of a processor's speed, providing a standard for representing the number of instructions that a CPU can process in 1 second.Continue Reading
ServiceNow
ServiceNow is a software company that provides a cloud-based platform for automating IT management workflows.Continue Reading
IT service delivery
IT service delivery is the way a corporation provides users access to IT services, such as applications, data storage and other business resources.Continue Reading
How to set and manage environment variables in Kubernetes
In this tutorial, learn when to use -- or not use -- environment variables in Kubernetes, and compare methods for setting and updating their values with example code.Continue Reading
Go programming language
Go, also called Golang or Go language, is an open source programming language that Google developed.Continue Reading
Kubernetes node
A Kubernetes node is a logical collection of IT resources that runs workloads for one or more containers in a Kubernetes cluster.Continue Reading
STONITH (Shoot The Other Node In The Head)
STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.Continue Reading
Git
Git is an open source distributed version control system that is available for free under the GNU General Public License version 2.Continue Reading
GitHub
GitHub is a web-based version control and collaboration platform for software developers.Continue Reading
What are hyperautomation use cases for IT operations?
Fully automated NoOps workflows might not be possible, but there's always room to further automate existing processes. An expert explains two hyperautomation use cases for DevOps.Continue Reading
IT incident management
IT incident management is an area of IT service management (ITSM) wherein IT teams return a service to normal as quickly as possible after a disruption with as little negative impact on the business as possible.Continue Reading
How and why PowerShell Linux commands differ from Windows
PowerShell is a popular tool for IT professionals and a broad range of tasks. But PowerShell on Linux is not quite the same as on Windows. Let's explore the differences.Continue Reading
Kubernetes pod
Kubernetes pods are the smallest deployable computing units in Kubernetes, an open source system for container scheduling, orchestration and management.Continue Reading
Considerations when getting started with distributed tracing
Distributed tracing has advantages over traditional logging and monitoring, especially for microservices, but it can also affect application performance through added complexity.Continue Reading
mission-critical application
A mission-critical application is a software program or suite of related programs that must function continuously for a business or business segment to be successful.Continue Reading
container repository
A container repository is a collection of related container images that provide different versions of an application.Continue Reading
Google Kubernetes Engine (GKE)
Google Kubernetes Engine (GKE) is a managed Kubernetes service for containers and container clusters running on Google Cloud infrastructure.Continue Reading
3 key steps when creating a DevOps implementation plan
Shifting to the DevOps model can be complicated and challenging. Set your team up for success by learning which areas to prioritize at the early stages of DevOps adoption.Continue Reading
container image
A container image is an unchangeable, static file that includes executable code so it can run an isolated process on IT infrastructure.Continue Reading
memory paging
Memory paging is a memory management technique used to control sharing of memory resources belonging to a computer or virtual machine (VM).Continue Reading
Try out PowerShell grep equivalents with these examples
Though less well known than grep, PowerShell cmdlets such as Select-String have extensive search capabilities in their own right. Explore use cases for both in this tutorial.Continue Reading
The evolution of containers: Docker, Kubernetes and the future
Container technology is almost as old as VMs, although IT wasn't talking about the topic until Docker, Kubernetes and other tech made waves that caused a frenzy of activity.Continue Reading
Map physical GPUs to VMs with this GPU passthrough guide
Learn how to set up GPU passthrough -- a useful technique to support graphically intensive apps and machine learning models -- with a step-by-step tutorial for VMware environments.Continue Reading
compliance automation
Compliance automation, also known as automated compliance, is the practice of using technology -- such as applications with artificial intelligence features -- to perform and simplify compliance procedures.Continue Reading
YAML (YAML Ain't Markup Language)
YAML (YAML Ain't Markup Language) is a data serialization language used as the input format for diverse software applications.Continue Reading
Demystify the DevOps process, step by step
While varying definitions and vendor marketing spins can make the meaning of DevOps tough to nail down, there are concrete principles and processes that underpin the methodology.Continue Reading
rolling deployment
A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.Continue Reading
ChatOps
ChatOps, sometimes known as conversation-driven collaboration or conversation-driven DevOps, is the use of chat clients, chatbots and other real-time communication tools to facilitate software development and IT operations tasks.Continue Reading
How to deploy Kubernetes on VMware with vSphere Tanzu
Instead of working with Kubernetes with your regular platform, it might be time to give VMware vSphere with Tanzu a try. Follow this tutorial to get started.Continue Reading
friendly name
A friendly name is a term used to refer to a device, application file, certificate or other IT asset instead of its technical name.Continue Reading
log management
Log management is the collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of large volumes of log data created within an information system.Continue Reading
Compare Go vs. Python: What are the differences?
Golang and Python are both versatile, popular languages, but they have some important differences that developers should take into account when planning software projects.Continue Reading
IT automation
IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.Continue Reading
hardware emulation
Hardware emulation is the use of one hardware device to mimic the function of another hardware device.Continue Reading
software asset management (SAM)
Software asset management (SAM) is the administration of processes, policies and procedures that support the procurement, deployment, use, maintenance and disposal of software applications within an organization.Continue Reading
golden image
A golden image is a template for a virtual machine, virtual desktop, server or hard disk drive.Continue Reading