Operations | Monitoring | ITSM | DevOps | Cloud

CI CD

The latest News and Information on Continuous Integration and Development, and related technologies.

Optimizing logs for a more effective CI/CD pipeline [Best Practices]

Continuous Integration and Continuous Delivery (CI/CD) delivers services fast, effectively, and accurately. In doing so, CI/CD pipelines have become the mainstay of effective DevOps. But this process needs accurate, timely, contextual data if it’s to operate effectively. This critical data comes in the form of logs and this article will guide you through optimizing logs for CI/CD.

How To Build A Cloud-Native DevSecOps Pipeline With JFrog And AWS

Join us to discover the strategies and tools you can use to ensure you can easily overcome the challenges of securing your software releases. We will share best practices for taking advantage of DevSecOps in the cloud with JFrog and AWS. We’ll share pipeline design and architecture patterns; tips for minimizing setup, re-work and process overhead for developers; shifting-left security testing and remediation, and more.

Kubernetes in Production with Jessica Deen at swampUP 2020

Jessica Deen’s swampUP 2020 talk takes Kubernetes to the next level. If you want to understand how to make your K8s implementation enterprise grade, then this is the session for you. JFrog was proud to announce Jessica Deen, Microsoft Azure Avenger, as the winner of the inaugural swampUP Carl Quinn Speaker Award. Jessica’s talk was full of demos, practical advice, and covered a wide range of real-world situations.

The 2020 SaaS Startup <$100 Essential Toolkit

I’ve recently co-founded a startup, and after working so long in more mature enterprises with diverse toolchains, it was actually massively educational to return to first steps and figure out what our critical needs were, balanced with essentially zero budget. As we’ve grown and raised money, we’ve graduated in some areas to other tools, but I wanted to share what we felt were the absolute can’t-live-without-tools for a team building SaaS software.

Securing Your Kubernetes Journey with ChartCenter

Adopting cloud native technologies like Kubernetes and Helm means your company’s operations can sail swiftly across the globe’s oceans to reach teams and customers. But there are dangers in the deep. With many components in Kubernetes, securing every dimension can be quite challenging and require a bit of learning curve. Let’s identify some important best practices that can help you to steer straight.

[Hands-on Lab]  - Manage Security and Compliance with JFrog Xray

In this webinar, you will learn how to accelerate your delivery timelines with confidence and ensure vulnerability security and license compliance with JFrog Xray. We will demonstrate how JFrog Xray combines all the benefits of Artifactory’s Universal Artifact Management, with JFrog Xray’s deep recursive scanning for a natively integrated security vulnerability & license compliance experience.

Mitigate Risk With Rolling Deployments

Deploying a new feature to production is a momentous occasion. It's important to ensure that everything goes properly at this stage, as deployments tend to be error-prone when not handled correctly. To examine why this is and how you can avoid it, let's take a look at the different types of deployments available and where some of them fall short.

Swampup Leap: Creating an Inner Source Hub at Siemens

In their presentation at the swampUp 2020 conference, IT service manager Marija Kuester and her team at Siemens AG revealed how they use JFrog Artifactory to deploy and scale their Inner Source Hub service, and meet the challenging needs of their key business stakeholders. In the recorded session, the Siemens team outlined the service architecture with rich insights into the IT service deployment and internal developer adoption.

Mitigate risk with rolling deployments

Deploying a new feature to production is a momentous occasion. It's important to ensure that everything goes properly at this stage, as deployments tend to be error-prone when not handled correctly. To examine why this is and how you can avoid it, let's take a look at the different types of deployments available and where some of them fall short.