Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Night of the Runbooks: a DevOps Horror Story

It was a dark and stormy night. Not really, of course; it was warm and pleasantly mild (the weather never seems to co-operate on these occasions), but indulge me by imagining appropriate meteorological conditions for the spine-tingling story I’m about to relate. It was Morgan’s very first night on call, and they were a mite nervous, as you can imagine.

Continuous Integration vs. Continuous Deployment

Thanks to Linus Torvalds, the creator of not only Linux, but also the most popular version control system - Git, multiple developers can simultaneously work on the development of the same application, ramping up the speed of production. Git was revolutionary - it enabled developers to keep track of code changes and collaborate seamlessly across different projects.

Take the Guesswork out of a Secure Kubernetes Deployment

As a Senior Solutions Engineer helping customers deploy cloud-native technologies, I have been using Docker and Rancher for more than five years. Heck, I even helped steer Rancher for offline use when it was the 0.19 release. I have loved the product and company for YEARS. We all know how complicated it is to set up Kubernetes, and customers love Rancher because it simplifies that rollout.

Network Security Monitoring Essential Guide

The conventional monitoring solution focussed primarily on analysing the performance of the network. Gradually, the scope of such tools increased and they are now packed with a host of security features. Focus is now more towards Forensic analysis, security threats analyzer, TCP analyzer, Firewall monitoring, Auditing and Compliances. So, how do you know which network security monitoring tool is essential for you? Which technique will provide the best ROI for your business?

Using Mattermost Operator for Kubernetes to deploy our Community server

One of the key benefits of using Kubernetes is that it’s very flexible and fault tolerant. However, that also means that it has quite a lot of complexity to deal with. A well-built operator abstracts that complexity away and helps manage updates and upgrades seamlessly. The Mattermost Kubernetes operator is basically like having a Mattermost Cloud Engineer running inside your Kubernetes cluster managing Mattermost for you.

Interview with TRI-AD: DevOps & Software Development in the Automotive Industry

Hi, my name is Ayana Yokota and I’m a Developer Advocate at JFrog. I’m excited to introduce the first blog post in my JFrog customers interview series, highlighting unique use-cases and success stories. This fascinating first interview was held with Mr. Yan and Mr. Moriya, from the Infrastructure Engineering team, and Mr. Etourneau from the Arene Tools team, in the Toyota Research Institute – Advanced Development, Inc. (TRI-AD).

Strategically Managing Cloud Resources for Security, Fun, and Profit

The first time I created a cloud compute instance, then still called a “Cloud VM”, was an almost transcendent moment. It was like magic. I was at my first organization which had adopted the cloud, in my first DevOps position, and I immediately knew that the world had changed.

The Cloud Network Security Gap

Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember how it used to be. “Network” was a team. When you needed to open a port on the network, you had to provide an exhaustive definition of the change, explaining what port you needed, what external addresses should be able to reach it, and where it should be routed to internally.

HAProxy and HTTP Strict Transport Security (HSTS)

HAProxy provides an easy and straightforward way to add HTTPS to your website. As a load balancer positioned in front of your web servers, it can handle all of the encryption and decryption duties, offloading those tasks from your upstream servers. That’s good because in today’s age of privacy awareness, the consensus is that every website must implement HTTPS, regardless of whether sensitive or private information is being exchanged.