Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Why Change Control for Your Servers Is Important, and How to Do It

The shared responsibility model doesn’t mean cloud customers don't have to worry about changes on their systems. In a brief 10-minute conversation, SolarWinds Head Geek Leon Adato and Technical Content Manager for Community Kevin M. Sparenberg share some statistics highlighting the risks of not managing change in your environment and show a few ways to get control and turn the chore of change control into actionable insights.

Where configuration management falls short: model-driven OpenStack

Have you ever installed OpenStack from scratch? I know, it sounds geeky, unnecessary and maybe even overcomplicated … It is after all 2021, OpenStack is mature, there are hundreds of OpenStack distributions available out there, configuration management tools are all the way around and installing OpenStack from scratch almost sounds like compiling the Linux kernel or using make scripts to install software on Ubuntu.

How Kubernetes 1.22 addresses industry needs

On August 4th 2021, Kubernetes (K8s) upstream announced the general availability of Kubernetes 1.22, the latest version of the most popular container orchestration platform. At Canonical, we actively track upstream releases to ensure our Kubernetes distributions align with the latest innovations that developers and businesses need for their cloud native use cases.

Full visibility of Microsoft Azure cloud service health - resolve issues before they impact on your customers.

For large digital enterprises Microsoft Azure and private cloud offering Azure Stack Hub have emerged as the strategic cloud platforms of choice for many organizations. Azure offers an open and flexible platform on which to quickly build, deploy and manage applications at scale.

Cybersecurity with Ubuntu

The cybersecurity state of affairs can be described as too complex today. There is an enormous number of threats endangering sensitive data for the average IT team to cope with. Threats ranging from exposure of physical assets stored in an office, to “social engineering” attacks resulting in unauthorized access, or even threats that exploit obscure software vulnerabilities.