Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

3 Ways You Might Have an NOC Process Hangover

NOC, or network operation center, processes have been set in stone for decades. But it’s time for some of these processes to evolve. Digital transformation and the cloud era have led to the rise of DevOps, and with it, service ownership. Service ownership means that developers take responsibility for supporting the software they deliver at every stage of the life cycle. This brings development teams closer to their customers, the business, and the value they deliver.

We're listening! Leveling up how we gather, review, and respond to product feedback.

The Bitbucket Cloud (BCLOUD) project is an invaluable source of customer-requested product features, enhancements, and suggestions. As Bitbucket Cloud has continued to grow, we’ve built up quite a backlog! To streamline the process, we recently implemented an in-product form as a replacement for manual issue submission. Entering feedback about Bitbucket Cloud is now easier than ever!

Using External Dependencies with Conan @ Bay Area C++ User Group Meetup

In the 2022 C++ survey results an overwhelming majority ~80% said managing libraries was painful, nearly 50% called it a major pain. Given this is not even a conversation in another ecosystem, it’s time we solve it once and for all. This talk will give an introduction to Conan and focus on the latest features you can use today to overcome any challenges. You’ll learn how to work on a CMake project, use different generators, and take advantage of multi-config presets. The goal is you give you a clear picture of how Conan fits into your existing workflow.

Scanning Secrets in Environment Variables with Kubewarden

We are thrilled to announce you can now scan your environment variables for secrets with the new env-variable-secrets-scanner-policy in Kubewarden! This policy rejects a Pod or workload resources such as Deployments, ReplicaSets, DaemonSets , ReplicationControllers, Jobs, CronJobs etc. if a secret is found in the environment variable within a container, init container or ephemeral container. Secrets that are leaked in plain text or base64 encoded variables are detected.

Sponsored Post

What Is the Controllability and Observability of Cloud Applications?

There are many computing resources used in different cloud application services to provide online software-as-a-service (SaaS). SaaS differs from traditional applications in that it works from a cloud computing environment. This means that both the application service as well as user data are being hosted by a cloud provider in the cloud. Therefore, the SaaS and data are accessible from anywhere as long as there's online access. This model provides a distinct advantage from a software perspective.

SUSE Rancher and Komodor - Continuous Kubernetes Reliability

With 96% of organizations either using or evaluating Kubernetes and over 7 million developers using Kubernetes around the world, according to a recent CNCF report, it’s safe to say that Kubernetes is eating up the world and has become the de-facto orchestrating system of cloud-native applications. The benefits of adopting K8s are obvious in terms of efficiency, agility, and scalability.

What's new in Ubuntu Desktop 22.10, Kinetic Kudu

Ubuntu Desktop 22.10, codenamed Kinetic Kudu, is here! This is the first release after Ubuntu 22.04 LTS, which means that there are a number of changes in both the underlying technology and the user experience, as well as some previews of what might be on the horizon in future releases. Excited? Let’s jump straight into our highlights.

How to monitor systemd service liveness

The life of a sysadmin or SRE is often difficult, but occasionally very simple things can make a huge difference. Basic monitoring of your systemd services is one of those simple things, which we sometimes overlook. The simplest question one would want to know is if the thing that’s supposed to be running is actually running at all. If you use systemd services, you can guarantee an answer to that question within minutes using Netdata.

7 types of Redis latency and how to fix it

Redis is designed to be fast. In most cases, it is. However, there are times when Redis may be slow, due to network issues, disk latency, or other factors. When this happens, it is important to be able to detect the slow down and investigate the cause. Latency is the maximum delay between the time a client issues a command and the time the reply to the command is received by the client. Redis has strict requirements on average and worst case latency.