Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Mitigating BootHole - 'There's a hole in the boot' - CVE-2020-10713 and related vulnerabilities

Today we released updates for a series of vulnerabilities termed ‘There’s a hole in the boot’ / BootHole in GRUB2 (GRand Unified Bootloader version 2) that could allow an attacker to subvert UEFI Secure Boot. The original vulnerability, CVE-2020-10713, which is a high priority vulnerability was alerted to Canonical in April 2020.

Mitigate risk with rolling deployments

Deploying a new feature to production is a momentous occasion. It's important to ensure that everything goes properly at this stage, as deployments tend to be error-prone when not handled correctly. To examine why this is and how you can avoid it, let's take a look at the different types of deployments available and where some of them fall short.

7 things no one will ever tell you about Kubernetes

Kubernetes is the most popular Open Source technology of the last five years. It was created by Google to allow companies to use container (Docker) applications in production. Today, Kubernetes is the new standard for running applications in the Cloud or on its servers (on-premise). I even heard from a Cloud architect from Azure: "our customers no longer come to us to do Cloud, but to do Kubernetes". That's to say how much a utility software* upsets a whole ecosystem.

Alleviate User Frustrations - IT Troubleshooting Made Easy

Your users have enough to worry about while working remote, and when connectivity issues arise so do frustrations. With LogicMonitor IT team can keep tabs on the tools your users rely on, allowing IT to troubleshoot issues with ease and your users to focus on the things that really matter.

[Hands-on Lab]  - Manage Security and Compliance with JFrog Xray

In this webinar, you will learn how to accelerate your delivery timelines with confidence and ensure vulnerability security and license compliance with JFrog Xray. We will demonstrate how JFrog Xray combines all the benefits of Artifactory’s Universal Artifact Management, with JFrog Xray’s deep recursive scanning for a natively integrated security vulnerability & license compliance experience.

Deploy an Ingress Controller on K3s

Kubernetes provides a powerful networking model for microservices. One of the pillars of this model is that each pod has its own IP address and is directly addressable within the cluster. As a consequence, each Kubernetes cluster usually has a flat virtual network that external hosts can’t reach directly. That means routing traffic from clients outside the cluster to services deployed inside the cluster requires some additional work.

Mitigate Risk With Rolling Deployments

Deploying a new feature to production is a momentous occasion. It's important to ensure that everything goes properly at this stage, as deployments tend to be error-prone when not handled correctly. To examine why this is and how you can avoid it, let's take a look at the different types of deployments available and where some of them fall short.