Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

How To Ensure Healthy SaaS Metrics As Your Cloud Costs Grow

Typically, startup founders and executives must meet with their board of directors each quarter to review the progress of the company. They may talk about broad topics such as total costs and total revenue, and use these numbers as a guide to determine which moves the company should make in the near future. Often missing from the conversation, however, is a clear and detailed discussion of SaaS metrics.

Why 'owning Services' is critical for effective Incident Response

There is a famous quote that goes like this…‘For every minute spent organizing, an hour is earned.’ At least in the world of incident response, nothing is more apt than this. Digital infrastructure these days is made up of multiple services, an outage could result from either one impacted service or multiple impacted services. So it's essential to have a catalog of all the services along with the point of contact (service owner) responsible for maintaining it.

On Building a Platform Team

It may surprise you to hear, but Honeycomb doesn’t currently have a platform team. We have a platform org, and my title is Director of Platform Engineering. We have engineers doing platform work. And, we even have an SRE team and a core services team. But a platform team? Nope. I’ve been thinking about what it might mean to build a platform team up from scratch—a situation some of you may also be in—and it led me to asking crucial questions. What should such a team own?

Confidential computing in public clouds: isolation and remote attestation explained

In the first part of this blog series, we discussed the run-time (in)security challenge, which can leave your code and data vulnerable to attacks by both the privileged system software of the public cloud infrastructure, as well as its administrators. We also introduced the concept of trusted execution environments and confidential computing, (CC), as a paradigm to address this challenge.

The Power of IT Automation Empowers You | Puppet Enterprise

With Puppet, the power of IT automation empowers you. Learn more at puppet.com. Too many companies use patchwork solutions for configuration management and IT automation, leading to unmanageable complexity and huge security risks. IT operators are on-call day and night to address security breaches, and toil for weeks manually provisioning servers. But no one would expect you to wash 10,000 dishes by hand – so why are IT operators expected to configure 10,000 servers manually?

incident.fm, post-incident processes, and Crocs

As usual, it’s been all systems go at incident.io this month. New joiners, new features and new swag (yes, you heard right!). But most excitingly, we launched our new podcast this week. We had a blast recording it - we hope you enjoy listening to it just as much. Here’s a round-up of some of this month's highlights…