Operations | Monitoring | ITSM | DevOps | Cloud

%term

How to shorten your feedback loops (and reduce your team's stress)

You’re working on a project — let’s say it’s a presentation to introduce a new initiative at your company. You have a first draft of the content done, and you send it to your boss for her feedback. She makes a few revisions and then says she’d like to share it with the leadership team to see what they think.

About Mattermost

Mattermost’s mission is to make the world safer and more productive by developing and delivering secure, open source collaboration software that is trusted, flexible and offers fast time-to-value. Mattermost’s first product is a collaboration platform built to accelerate DevOps workflows in high-trust environments by offering secure messaging across web, desktop and native mobile devices.

Mattermost security update 5.7.1/5.6.4/5.5.3/4.10.6 (ESR) released

We are releasing a recommended security update via Mattermost Team Edition 5.7.1, 5.6.4, 5.5.3 and 4.10.6 (ESR) and Mattermost Enterprise Edition 5.7.1, 5.6.4, 5.5.3 and 4.10.6 (ESR). This security update addresses a high-level vulnerability discovered during a security research review by Rohitesh Gupta.

Introducing The PagerDuty Postmortem Guide

Your team had been fighting this major incident for hours, but your investigation was hitting one dead end after another. Finally, you managed to isolate the problem and your graphs started to improve. When all systems went back to normal, everyone let out a collective sigh of relief, shut down the response call, and went back to bed, never to think of this incident again. Or so you thought.

A How-To Guide To SLAs (Service Level Agreements), Best Practices, And Why They Are So Important To Customers

You’ve heard it so many times: Transparent communication is the key to any successful relationship. The banking industry learned this lesson when cyber attacks began to plague their customers, and the official line for many financial institutions was to deny there was a problem. That is until the hacks became so profound and so persistent that it became impossible to cover them up any longer.

Leveraging Service Accounts for Label-based Security

One of the key Kubernetes security concepts is that workload identity is tied back to information that the orchestrator has. The orchestrator is actually the authoritative entity for what the actual workloads are in the platform. Kubernetes uses labels to select objects and to identify collections of objects that satisfy certain conditions. We, and others in the Kubernetes networking space, often talk about using Kubernetes ‘labels’ as identity bearers.