Have you ever compiled something from source? If so, you have likely used a Makefile. Have you ever written a Makefile? Makefiles are extremely powerful,…
Let’s Talk About Stealth Mode Startups
As I have mentioned in the past, I left VMware to join a stealth-mode startup. In this post, I would like to describe my definition…
Must Have Kubernetes Tools
I figured I would wrap up my three-part mini-series on Kubernetes by talking about some tools that make interacting with Kubernetes easier. Read on to…
Running Kubernetes Locally
In my last post, I covered some basic information about k8s. In this post, I would like to cover how to run k8s locally. I…
An Intro To Kuberenetes
Since I have left VMware, multiple people have pinged me to find out what I am working on. While the startup is still stealth, I…
Syslog and what protocol to send events over
Logs are a powerful way to investigate system issues as well as perform system auditing, but what protocol should you send events over? In this…
Salesforce SAML Authentication with Google
I recently attempted to authenticate to Salesforce via SAML provided by G Suite. I ran into a ton of issues so I thought I would…
O'Reilly OSCON Agenda
I will be attending the O’Reilly OSCON event in Portland, Oregon from July 16 through 19. If you will be attending or in the area,…
Log Intelligence versus Log Insight
Here it is, the blog post you have all been waiting for — Log Intelligence versus Log Insight. Well, actually, it is Log Intelligence and…
Log Intelligence: Alerts
I have already touched on alerts, but I really want to deep-dive into them, including some of the features I have not discussed yet. Read…