Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

My Criteria for Automated Incident Response Tools

Managing incidents manually isn’t realistic when their number keeps growing. That’s where automated incident response tools come in. They handle routine tasks so you can focus on actual problem-solving. In this blog, I’ve put together a list of the 9 best automated incident response tools for you. I looked at each one based on four key areas of the incident response process. This will help you see how they handle everything from start to finish.

Streamline Software Delivery Right From Your IDE with Amazon Kiro and Harness

The integration of Amazon Kiro and Harness’s MCP server enables developers to manage, troubleshoot, and optimize CI/CD pipelines directly from their IDE using natural language, dramatically reducing manual effort and accelerating software delivery from code generation to production.

Global Online Meetup: K3k

Even though multi-tenancy isn't a new concept, when it comes to Kubernetes, implementing the concept can come with its own set of challenges - noisy neighbours, operational complexities, and, of course, security considerations. Sounds like a lot? Well, that's why it's essential to strike a balance between flexibility and optimising resource utilisation. Join Divya Mohan at 2 PM UTC on 25th September as she hosts Rossella Sblendido and Jean-Phillipe Gouin to explore how the K3k project from SUSE helps us achieve all this and more in this edition of the Global Online Meetup.

Why Security Must Include Cost Accountability In The Cloud

A SaaS team once spotted their first breach not in a SIEM dashboard, but in their AWS bill. Their compute costs spiked by 400% overnight. Turns out, an attacker had spun up dozens of high-powered instances for crypto mining. Logs eventually confirmed the intrusion, but the cost anomaly was the first signal that something was wrong. This incident isn’t unusual. Cloud costs often reflect consumption, but they can also reflect compromise.

Monitor Kubernetes Hosts with OpenTelemetry

It’s 3 AM. API latency just spiked from 200ms to 2s. Alerts are firing, and users are frustrated. You SSH into the first server: top, free -h, iostat — nothing unusual. On to the next host. And the next. That’s how most of us learned to debug. The tools worked, and we got good at using them. But as infrastructure became distributed and dynamic, this approach started to break down. Modern monitoring needs more than SSH and top. It needs unified telemetry.

Densify Talks, CNCF, OpenAPI, and Kubernetes with Dan Ciruli from Nutanix

<span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start"></span> Andrew Hillier sits down with Dan Ciruli, who leads the cloud native product management team at Nutanix.

14: CNCF, OpenAPI, and Kubernetes with Dan Ciruli from Nutanix

Andrew Hillier sits down with Dan Ciruli, who leads the cloud native product management team at Nutanix. Dan’s got some great stories from his days at Google—back when cloud native and Kubernetes were just getting started, in addition to the knowledge and wisdom he picked up along the way.

Build an automated ETL pipeline for cryptocurrency data with CircleCI

To stay ahead in the crypto world, you need latest information about cryptocurrencies. With so many coins out there and prices changing all the time, knowing which ones are doing the best gives you a quick snapshot of what’s hot right now. Whether you’re investing, just curious, or trying to understand the market better, this information makes it easier to spot trends and make smarter decisions.

Cisco ASA and IOS Vulnerabilities Expose Critical Systems, Making Edge Automation Essential for Rapid Remediation

The launch of Puppet Edge this week could not have been more timely. Within a day of its general availability, Cisco disclosed a vulnerability in its IOS and IOS XE software, followed almost immediately by an Event Response detailing two additional critical-severity CVEs affecting its firewalls.