Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

PagerDuty to Acquire Rundeck

Today is a great day for PagerDuty customers, practitioners, partners, and employees as we’ve entered into a definitive agreement to acquire Rundeck, a Californian start-up that’s a leader and innovator in DevOps automation. Before I get into the technicalities of what our solutions can do together, let me first set the scene on why we decided to do this, now.

How to configure HTTPS for an Nginx Docker Container

There are a few ways to effectively configure HTTPs for an Nginx Docker Container. In this guide, we will quickly cover configuration through the use of free certificate authority Let’s Encrypt. For plenty of people, using Let’s Encrypt to configure HTTPS for an Nginx docker container is a good option. A paid version like Comodo’s SSL certificates may make more sense if you want to increase the security of your site and server.

We raised $1M pre-seed round to simplify application deployment in the Cloud

I am thrilled to announce that we have raised a $1M pre-seed round with top notch investors. Among them are top entrepreneurs and Cloud experts like Alexis Lê-Quôc, co-founder and CTO at Datadog, and Sebastien Pahl, Co-founder of Docker. Qovery will use the funds to strengthen its research and development team and extend their offer to technology companies in Europe and in the US.

Accelerating Root Cause Analysis of IT Incidents

The moment after an incident is resolved is perhaps the most relaxing for any IT team. When your system is finally functioning properly it puts the entire organization at ease, but the most daunting task is yet to come: root cause analysis (RCA). Akin to football teams watching previous plays to pinpoint areas of improvement, root cause analysis goes through data and finds what initially caused the incident.

VMware Tanzu Mission Control Expands Its Policy Management Capabilities

We are excited to announce the general availability of security policies and policy insights in Tanzu Mission Control. With the launch of these new capabilities, administrators can easily streamline and manage the security of their Kubernetes cluster fleet. They can also take advantage of the rich policy insights dashboard, which provides a centralized and holistic view of the current state of all policy events in their system.

Monitoring virtualization platforms and networks

Small and large businesses alike, opt for virtualization to optimize resource management. While you have a whole list options such as VMware, Hyper-V and Nutanix, monitoring them for their availability is just as important. Watch this webinar and learn how monitoring virtualization platforms and the underlying network infrastructure works to your benefit.

ECS cluster with customizable blend of on-demand, spot and reserved instances for granular workload placement

Spot by NetApps’s Ocean now makes it easy to run your ECS tasks on any combination of on-demand, spot and reserved instances all within a single cluster. Ocean provides Amazon Elastic Container Service (ECS) users with an automated, serverless container experience. Previously, control over the underlying instances’ pricing model was limited to utilizing reserved instances and spot instances only.

Reserved instances - How to leverage them without needing to predict the future

As we discussed in our previous post, the comprehensive visibility into your cloud spend provided by Cloud Analyzer allows you to confidently make decisions on how to best optimize your cloud. But when it comes time to actually optimizing your cloud compute spend, taking advantage of reserved instances – a pricing model that offers steep discounts in exchange for long-term commitment – many potential users still hesitate and for good cause.

Seamlessly Immunize Binaries Flowing through Artifactory with RunSafe Alkemist

In this webinar, RunSafe and JFrog will introduce cutting-edge security techniques, allowing users to protect both source and binary code flowing through their pipelines from memory based attacks. Includes a walkthrough of a real world exploit where Alkemist was successful at mitigating the attack in Apache/PHP.