Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Shift-left And Scale Security With The Power Of JFrog And Google

What does it mean to “shift left”? How can you scale security effectively as you do? These are growing questions corporations and developers are facing in a distributed, global economy. In this webinar you will learn how the amazing combination of GCP and JFrog allows dynamic workflows and automated quarantine processes, continuous scanning of production artifacts, integration with the broader business, and how you can scale all of these solutions rapidly in your fast-paced environment.

The Top Azure blogs we follow

As Microsoft is forever releasing new functionality within Azure and all its offerings its often hard to keep abreast of the latest changes in technology. To do so, we here at SmiKar Software often follow influential and knowledgeable people that are experts in the their fields, to keep up to date ourselves. In no particular order, here are some of the noteworthy Azure Blogs that we follow.

Monitoring CI/CD Pipelines

Continuous Integration (CI) and Continuous Delivery (CD) form the backbone of the product delivery lifecycle. A well tuned, fault tolerant and scalable CI/CD pipeline is very important to support modern Agile teams. Despite obvious business advantages, a rapid release approach combined with continuous change processes resulting from DevOps principles will in the long run generate new challenges. The entire process needs to be carefully examined and controlled.

Detecting Bottlenecks in Virtual Machine Performance

No matter the application or strengths of your Virtual Machine, it must rely on the resources you provide. In such a scenario, it is common to run into bottlenecks and performance issues that can undermine your operations’ productivity. Often, these bottlenecks present challenges to the team as frequent issues pose risks to the operation’s health.

AWS ECU vs vCPU-Everything You Need to Know

If you’ve deployed an application or service to the Amazon Web Service (AWS) cloud, you’ve probably made use of an EC2 instance. One of the decisions that you had to make before you could start a new instance, was which instance type to use. Choosing an EC2 instance type can be a complicated process. AWS organizes their instance types into instance families, and within an instance family, there are varying sizes from micro to 32xlarge.

How to make snaps and configuration management tools work together

In environments with large numbers of client machines, configuration management tools are often used to simplify and standardize the target state of each host in a seamless, automated and consistent manner. Software like CFEngine, Chef, Ansible, and others offer a high degree of granular control over software packaging and system configurations.

Deployment Pipeline Launch

Deploying a stack into AWS is at the core of what Stackery helps you do. So much so that Stackery users deployed over 10,000 times last month! For the most part, this has been a manually executed process in our Web UI or command-line client. As teams grow and take on more work, fast and consistent deployments are key to scaling effectively. That’s why we’ve been working this year on continuous integration and deployment (CI/CD) features, tailor-built for serverless applications.

The Catchpoint Open Source Software (OSS) Program

Catchpoint has always embraced new technologies and ideas. We offer a powerful monitoring platform with advanced features such as tracking digital performance from across the globe, capturing analytical data and the ability to get notified across various channels. With all these inbuilt features in hand, Catchpoint encourages its customers to build new monitors and integration that consumes monitoring data that are tailored to specific use cases.

Restore authority with Token Bandwidth Controls!

Now you can go beyond measuring your bandwidth usage and regain control via Cloudsmith's new bandwidth controls for Entitlement tokens. You can craft tokens with individual usage limits using the UI, API, and CLI, allowing you to decide the exact level of usage for each token. Combining the new and existing limits for entitlement tokens, allowances are configurable to provide fine-grained control for any combination of properties.