Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Getting SRE Buy-in from a VP or Director for Automated Metrics and Continuous Learning, Part 2

After getting managerial approval for incident management, your SRE buy-in program is well underway. How can you prove that it’s effective, and that adopting more best practices is necessary? In part 2 of this blog series, we’re going to share how to convince a VP or director to invest in additional SRE practices to strategically improve business results: automated metrics and continuous learning.

Cloud Pro X On AWS

Learn how to set up JFrog Pro X (Artifact Repository and Vulnerability Scanning) on AWS JFrog Cloud Pro X combines JFrog Artifactory & JFrog Xray - Universal binary repository manager & security vulnerability scanning solution empowers DevOps teams to deliver trusted, reliable, higher quality software faster and protects against open source license violations.

Kubernetes on Azure: Deploy and Manage Your First Cluster in AKS

Most Kubernetes deployments live on the cloud. According to the CNCF, while 63 percent of companies use AWS for Kubernetes, 29 percent are deploying Kubernetes on Azure, and the number is rapidly growing. Microsoft Azure provides mature Kubernetes tools, primarily the Azure Kubernetes Service (AKS). In this post, we’ll show you how to run your first Kubernetes cluster on AKS, and how to manage enterprise Kubernetes deployments on AKS with Rancher.

IT and DevOps Resources for COVID-19

We’re all wrestling with less than ideal circumstances during the pandemic of COVID-19. Whether you’re sheltering in place or simply practicing social distancing, it’s safe to say we’re all adjusting to a temporary new normal. One commonality is the need for connectivity. If infrastructure fails, business will screech to a halt and we will find ourselves in a new kind of mess altogether.

The role of shift-left testing in an agile environment

With the rapid growth of security threats to infrastructure, it’s more important than ever to proactively address vulnerabilities. As an open-source project, built on the trust of users and contributors, Netdata has security concerns at its core. Because we’re committed to code security and quality, we apply Agile principles throughout the software development process. A component of this includes regular static analysis.

Kubernetes Logging and Monitoring Explained

Most enterprises already have a reliable logging and monitoring system in place, so why should you worry about it in the context of Kubernetes? Well, traditional logging and monitoring tools are designed for stable infrastructure and application deployments. Cloud native environments, on the other hand, are highly dynamic. The IT world has changed and so must your toolkit.

What is Podman? Docker's successor?

What is Podman? Well, we will start by saying that Podman is a container engine developed by RedHat, and yes, if you thought about Docker when reading container engine, you are on the right track. Podman wants to be the alternative to the well-known container Docker engine, but you may wonder: what does RedHat offer through Podman? Why should I switch to Podman? Is Podman the replacement for Docker or just another competitor?

IBM Z delivers a Trusted Execution Environment with Ubuntu 20.04 LTS and new single frame models

In September 2019, IBM released z15 and LinuxONE III, the most secure cloud environment in the market featuring pervasive encryption built-in at its core with Ubuntu. This offered a solid foundation to launch hardened security offerings for the mainframe across platforms such as MongoDB, Postgres, IDAA, IBM Cloud Private and the IBM Hyper Protect services family.