Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

What you need to know about regreSSHion: an OpenSSH server remote code execution vulnerability (CVE-2024-6387)

On 1 July 2024 we released a fix for the high-impact CVE-2024-6387 vulnerability, nicknamed regreSSHion, as part of the coordinated release date (CRD). Discovered and responsibly disclosed by Qualys, the unauthenticated, network-exploitable remote code execution flaw affects the OpenSSH server daemon (sshd) starting with version 8.5p1 and before 9.8p1.

3 Reasons to Migrate from Beanstalk to EKS

While AWS Elastic Beanstalk (EB) offers a convenient way to deploy applications, some limitations in customization and control can become a bottleneck for growing businesses. As the need for scalability, flexibility, and fine-grained management increases, Amazon Elastic Kubernetes Service (EKS) emerges as a compelling alternative.

Ribbon Cloud-Native IMS

Your traffic is growing, Your data is slowing Your voice network is bowing, under the stress Don’t get boxed in, avoid vendor lock in, Reliable voice services that drop-in Want a swift solution that costs you less? Enter Ribbon Cloud-Native IMS Four G, five G, we cover them all It's modern, secure on every protocol Micro services, multi-tenancy, Auto scaling and security, welcome network demands and be proud, get Today's network on tomorrow's cloud.

Navigating Kubernetes Contexts and Namespaces with kubectl

We all know that managing multiple Kubernetes clusters and their resources can be challenging. However, kubectl offers several context and namespace commands to simplify this process. This comprehensive guide will walk you through using various kubectl commands to manage your Kubernetes environments more efficiently.

Streamlining Billing Operations: MSP Transforms Billing and Service Management with Galileo

A large government-focused IT solutions provider faced a challenge after securing a lucrative contract with a massive government agency. The contract demanded detailed, usage-based billing calculations, posing a significant operational hurdle. Turning to Galileo proved to be the solution, allowing the provider to meet complex billing requirements, streamline operations, and ensure contract success.

How Meta and Google use AI to improve incident response

The world population in 2024 is approximately 8.12 billion people. Of these, 4.3 billion people use Google regularly, while 3.74 billion are active users on Meta's platforms. Any disturbance involving these tech giants will surely make headlines, as seen in the recent Google’s Unisuper incident. The scale of these tech companies brings fascinating challenges in every aspect of their operations, including incident response.

Enhancing Security Best Practices: Lessons from Puppet's Proactive Approach to GitHub Repository Management

As a part of Perforce, we are committed to maintaining the highest standards of security for our products and our customers. Recently, we had the opportunity to further strengthen our security practices thanks to valuable input from an independent security researcher. This experience has not only reinforced our robust security protocols but also provided insights that we're eager to share with the wider tech community.