Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Ensure quick and safe IT infrastructure changes with Puppet Impact Analysis

As your DevOps practice matures, and more users make more changes to infrastructure, it's essential that your changes are safe and deliberate. Impact Analysis is an extension of the core Puppet Enterprise installation. Watch our demo to learn how it provides the guardrails to operate quickly and safely at scale.

How Puppet Enterprise Does Desired State Automation at Scale

Learn how Puppet Enterprise keeps infrastructure secure, compliant, and efficient with desired state automation and configuration management. This video demonstrates how Puppet Enterprise simplifies infrastructure management by grouping nodes, using facts to assign servers automatically, and continuously enforcing desired configurations on every server based on system parameters.

When and Why To Adopt Feature Flags

What if there was a way to deploy a new feature into production — and not actually turn it on until you’re ready? There is! These tools are called feature flags (or feature toggles or flippers, depending on whom you ask). Feature flags are a powerful way to fine-tune your control over which features are enabled within a software deployment. Of course, feature flags aren’t the right solution in all cases.

How Does Docker Network Host Work?

Docker is a platform as a service product. With Docker, you can easily deploy applications into Docker containers. Containers are software "packages" that bundle together an application's source code with its libraries, configurations, and dependencies. This helps software run more consistently on different machines. To use Docker containers, you need to understand how Docker networking works. Below, we'll answer the question: "what is Docker network host?". We'll also take a look to see how it works.

Our fully-redesigned incident response experience delivers a more intuitive workflow

Today we’re releasing fully redesigned Slack and Command Center experiences for FireHydrant so anyone on your team can intuitively navigate the incident response process — in the app or on the web. There are many things you can do ahead of an incident to help things run smoothly: design and document your process, automate predictable steps, train the team, and run drills.

Default Pull Request Tasks

There are multiple ways to create a task on a pull request. They can be added from the sidebar, top-level pull request comments, file-level comment or inline comments. Once created, they all appear in the sidebar. On any repository, merge checks can be configured for any branch to only allow merging if all pull request tasks are resolved. This is a very useful functionality if some tasks are critical to be resolved before changes are merged.

Voice Network Fraud: How to Fight Back with Automated Threat Prevention

Telecommunications fraud is estimated to be a $39 billion a year problem according to the Communications Fraud Control Association. Despite that, less than 50% of enterprises* have implemented any sort of strategy to address fraud in their voice infrastructure. Firewalls and SBCs are not enough to provide a secure voice network. Enterprises need a more complete approach to network security—one that encompasses the unique vulnerabilities of real-time communications systems—to preempt issues and protect the organization as a whole.