Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Secure containerised Ceph with Ubuntu container images

As we announced at Cephalocon 2023 in Amsterdam, Canonical has started to make container images for Ceph available. We received lots of questions at the booth about what it means to the average Ceph user who has or wants to deploy Ceph on Ubuntu. In this blog post, we will cover the benefits to users who are running containerised Ceph on Ubuntu, and specifically how these images can provide an improved security posture.

Traceroute InSession: Catchpoint's effort towards a more reliable network diagnostic tool.

Since its inception in 1988, the traceroute has undergone several variations. You might be wondering, ‘Why so many?’ The answer is simple: achieving traceroute functionality has been a balance between security and utility. Whenever malicious actors exploited firewall and router vulnerabilities, their vendors responded with fixes and solutions which impacted the traceroute algorithms.

5 Immediate Business Benefits of Leveraging Domain-Agnostic AIOps

Legacy systems and point solutions are part of any business. And while they have their history and benefits, it’s critical to find a balance for your organization. IT teams have been acclimated to disparate event management and monitoring tools. Now, with massive and rapidly increasing data flow, this disconnect is slowing and paralyzing IT teams.

How Leading Data Center Managers Leverage Business Rules with DCIM Software

For many data center professionals, the daily operations of a data center require a lot of repetitive manual data entry tasks. Manually entering data about data center assets over and over again is not only time-consuming, but it risks inaccurate information due to human error. However, there is a new way forward.

A guide to static application security testing (SAST)

Static application security testing (SAST) involves analyzing source code to identify and address potential security vulnerabilities. Using SAST early in development identifies threats before they can affect a live environment. SAST is particularly important for continuous integration and continuous deployment (CI/CD) pipelines. These pipelines automate the integration of new code changes into the main codebase and deploy applications to production environments.

The Importance of Compliance for Small and Medium-Size Businesses: What You Need to Know

Navigating compliance requirements can be complex because there are so many of them, and there is a good chance that at least one set of standards applies to you. Standards can be for specific sectors, like The Health Insurance Portability and Accountability Act (HIPAA) for healthcare, or may apply more generally to organizations across industries, like the General Data Protection Regulation (GDPR).

Best Grafana dashboard for Graphite Metrics

It is an old cliche adage, but there is no better statement than “a picture is worth a thousand words” that explains the effectiveness of visuals to deliver a message. Especially, in the data domain where a raw message often exists in numbers, visualizing graphs and charts is the best way to share information. When it comes to visualizing metrics from Graphite, there is no solution that can beat Grafana.

Head-to-Head: Active Directory vs. Azure Active Directory - Which One Wins?

When it comes to identity and access management solutions, two names that often come up are Active Directory (AD) and Azure Active Directory (AAD). While many people are familiar with AD, AAD is still a relatively new concept to some. In this article, we will take a deep dive into both directories and explore their similarities, differences, pros, cons, and everything in between.