Creating a Technology Certification ProgramIn 2020 I was really passionate about the idea of creating the world’s first Chaos Engineering certification. There is a lot of…Aug 30, 20211Aug 30, 20211
Book Review: Accelerate (Part 2)G’Day Mate, this is part 2 of a book review for Accelerate. Pull up a chair and let’s get cracking. If you’re looking for part 1 you can…Aug 19, 2021Aug 19, 2021
Book Review: Accelerate (Part 1)G’Day Mate, how are you? I hope you’re having a beaut day today. My name’s Tammy Bryant Butow and you’ve stumbled across my Medium blog…Aug 19, 2021Aug 19, 2021
Chaos Engineering: What happens when your banking transactions are in a black hole?After 6 years of working on keeping internet banking, mortgage broking, and foreign exchange trading up and running for over 1 million…Jun 4, 2021Jun 4, 2021
Instant Chaos Engineering Wiki (Confluence)It’s really important to create a wiki to establish and grow your Chaos Engineering practice in a scaleable way. But do you lack the time…Apr 16, 2021Apr 16, 2021
Quick Slack and Microsft Teams Integration using Gremlin Webhooks & ZapierWe recently released Webhooks here @ Gremlin. Here’s a quick guide to using Gremlin Webhooks to create your desired integrations.Feb 18, 2021Feb 18, 2021
Chaos Engineering: How to Create an Automated Chaos Gauntlet using Gremlin & JenkinsIn this tutorial, we will demonstrate how to use Jenkins to create an automated chaos gauntlet. This will be done using Jenkins Pipelines…Feb 3, 2021Feb 3, 2021
Chaos Engineering Automation with Drone and GremlinIn this tutorial, we will demonstrate how to use Drone to create an automated chaos gauntlet for our services and applications. This will…Nov 19, 2020Nov 19, 2020
Published inChaos EngineeringChaos Engineering in 60 SecondsThis collection of short videos demonstrate how to run the following attacks in 60 seconds. This is a quick and simple way to share the…Nov 13, 2020Nov 13, 2020
Published inChaos EngineeringHow to use Gremlin to blackhole an external address from a containerIn this tutorial, we’ll be using Gremlin to run a blackhole attack that blocks an external address. In this example, we’ll block access to…Oct 30, 2020Oct 30, 2020