Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Ephemeral Environments vs Ephemeral Services: Weighing the Pros and Cons

In today's fast-paced software development world, Ephemeral Environments have emerged as a game-changer. These temporary, mirror-like copies of production environments are invaluable tools for testing code changes, debugging, and various development tasks. They offer developers a safe haven to experiment and test without impacting the stability of the production environment. One of the primary benefits of Ephemeral Environments is their fidelity to the production environment.

Logic App Best Practices, Tips, and Tricks: #28 How to check if a string is Null or Empty

Today I will speak about another useful Best practice, Tips, and Tricks that you must consider while designing your business processes (Logic Apps): How to check if a parameter or a string is Null or Empty.

Mastering Complex Progressive Delivery Challenges with Lightrun

Progressive delivery is a modification of continuous delivery that allows developers to release new features to users in a gradual, controlled fashion. It does this in two ways. Firstly, by using feature flags to turn specific features ‘on’ or ‘off’ in production, based on certain conditions, such as specific subsets of users. This lets developers deploy rapidly to production and perform testing there before turning a feature on.

How to Use Ansible Copy Module: An In-Depth Guide

In this post, we’re going to learn about the Ansible copy module. Before we look at the copy module specifically, let us first remind ourselves what Ansible is. You can install this open-source software on just one Linux machine. Then it can perform a lot of tasks on connected Linux machines without requiring Ansible installation on them. You can do tasks like copying files, fetching files, and a lot of other things all on connected machines, with a single command.

Authentication Failures: Definition, Consequences, and Prevention

Authentication is the security process that verifies a user’s identity in order to grant access to their online account. It also functions as the gateway to your product. It’s a workflow you can’t compromise on without risking negative impacts on your users and your company. Fortunately, there are lots of authentication services that can do the heavy lifting for you. It’s important to understand what you can do in case of an authentication failure, when to do it, and why.

Bad Guys and How They Hack It - Oliver Pinson Roxburgh | Civo Navigate NA 2023

Oliver Pinson Roxburgh from @defensedotcom gave attendees an insight into the world of hacking and taught them how to think like a hacker. Oliver shared stories that illustrated the challenges and techniques used by hackers before attendees were invited to participate in a hack challenge, where they could try to identify an "impossible hack" for a chance to win a prize.

Our social resurgence: activating our social media presence to revamp Incident Management

Over the past year, Spike.sh social media activity has been null. As a bunch of shy nerds in a small team working remotely across the world, we really never bothered with social media and our presence on it. We always kept our heads low and maneuvered around it. But no more. As of today, we are coming back on social media channels like LinkedIn, Twitter, and Reddit as well.