Systems | Development | Analytics | API | Testing

Understanding the Basics of Envoy Configuration

Envoy is a key part of a number of service meshes currently on the market, including Istio and the Kuma CNCF Sandbox project. As such, it is often helpful to better understand how Envoy is configured to operate as a data plane in a service mesh. In this session, you’ll learn about the basics of Envoy configuration, like listeners, filters, clusters, and endpoints.

Kubernetes Ingress gRPC Example With a Dune Quote Service

APIs come in all different shapes and forms. In this tutorial, I’ll show you a Kubernetes Ingress gRPC example. I’ll explain how to deploy a gRPC service to Kubernetes and provide external access to the service using Kong’s Kubernetes Ingress Controller. And to hype you up a little bit about the upcoming live-action movie, Dune, based on Frank Herbert’s book, I created a Kubernetes service that delivers Dune quotes.

ThoughtSpot Success Series #9 - Group Design, Privileges & Sharing

Introducing the ThoughtSpot Success Series! Want to expand your knowledge of ThoughtSpot? Want to learn some great tips and tricks? Join ThoughtSpot's Customer Success team and other users like yourself as we discuss various topics in our new Success Series. During this event, we’ll review best practices to implement when creating groups and assigning users to make privilege management easier. In this 1-hr event, you'll learn:

Back by Popular Demand: Why Dell ISG's DevOps Embraces Collaborator

Dell’s ISG division consists of storage, servers and networking, cloud solutions, data protection, and converged/hyper converged infrastructure. With over 50 product groups and over 10k employees, standardization was a barrier to achieving true workforce collaboration and mobility. In order to reduce duplication of effort and increase alignment and collaboration, Dell-ISG created a centralized DevOps group and chose Collaborator as their single code and peer review tool.

The Dark Truth Behind Session Recording

A company is entitled to use session recording or session replaying as long as their marketing and analytics needs require so. However, as enticing the recording of everything the user does at all times can be, even within the existing regulations, there is a high chance that doing so will quickly push the data towards a non-compliant realm. And even in cases where regulations may not be explicit on the matter, we see more and more how the industry is leaning towards discouraging these practices.

The Real Cost of API Downtime

Last week, the digital world experienced a power outage. A major distributed edge computing platform experienced a software bug that led to the collapse of their Domain Name System (DNS), or the Internet’s way to map domain names (i.e. united.com) to IP addresses. The consequences were costly. So what is the real cost of downtime? When a DNS system within a globally recognized edge platform fails, it causes downtime for a huge amount of international enterprises.