Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

AI-Powered Chaos Engineering with Harness MCP Server and Cursor

The Harness MCP Server integration with Cursor transforms chaos engineering from a complex, specialized discipline into an accessible, conversational workflow that any developer can leverage directly within their AI-powered IDE. By combining natural language prompts with comprehensive resilience testing tools, teams can discover, execute, and analyze chaos experiments without vendor-specific expertise, democratizing system reliability across DevOps, QA, and SRE functions.

Harness GitOps: Scaling Argo CD with Enterprise-Grade Control

Harness GitOps extends Argo CD by preserving its reconciliation loop while adding governance, audit, and RBAC through the GitOps Agent’s secure connection to Harness SaaS. Teams can choose Harness-managed or bring-your-own Argo CD and scale to multi-cluster fleets with unified dashboards, promotion pipelines, and true rollback, while Git stays the single source of truth.

My Criteria for Automated Incident Response Tools

Managing incidents manually isn’t realistic when their number keeps growing. That’s where automated incident response tools come in. They handle routine tasks so you can focus on actual problem-solving. In this blog, I’ve put together a list of the 9 best automated incident response tools for you. I looked at each one based on four key areas of the incident response process. This will help you see how they handle everything from start to finish.

Streamline Software Delivery Right From Your IDE with Amazon Kiro and Harness

The integration of Amazon Kiro and Harness’s MCP server enables developers to manage, troubleshoot, and optimize CI/CD pipelines directly from their IDE using natural language, dramatically reducing manual effort and accelerating software delivery from code generation to production.

Global Online Meetup: K3k

Even though multi-tenancy isn't a new concept, when it comes to Kubernetes, implementing the concept can come with its own set of challenges - noisy neighbours, operational complexities, and, of course, security considerations. Sounds like a lot? Well, that's why it's essential to strike a balance between flexibility and optimising resource utilisation. Join Divya Mohan at 2 PM UTC on 25th September as she hosts Rossella Sblendido and Jean-Phillipe Gouin to explore how the K3k project from SUSE helps us achieve all this and more in this edition of the Global Online Meetup.

Why Security Must Include Cost Accountability In The Cloud

A SaaS team once spotted their first breach not in a SIEM dashboard, but in their AWS bill. Their compute costs spiked by 400% overnight. Turns out, an attacker had spun up dozens of high-powered instances for crypto mining. Logs eventually confirmed the intrusion, but the cost anomaly was the first signal that something was wrong. This incident isn’t unusual. Cloud costs often reflect consumption, but they can also reflect compromise.

Monitor Kubernetes Hosts with OpenTelemetry

It’s 3 AM. API latency just spiked from 200ms to 2s. Alerts are firing, and users are frustrated. You SSH into the first server: top, free -h, iostat — nothing unusual. On to the next host. And the next. That’s how most of us learned to debug. The tools worked, and we got good at using them. But as infrastructure became distributed and dynamic, this approach started to break down. Modern monitoring needs more than SSH and top. It needs unified telemetry.

SQL NTILE Function Explained with Practical Examples

NTILE in SQL transforms raw lists into structured distributions before they reach a dashboard. By pushing distribution logic upstream, it divides ordered rows at the query level, so the insights in Power BI, Tableau, or Excel are accurate, not just polished visuals. This guide explores its syntax, practical examples, and comparisons with other ranking functions. It also highlights how database IDEs bring NTILE insights directly into analysis and reporting workflows. Table of contents.

Audit log streaming for real-time security visibility in your CI/CD pipeline

Security and compliance teams face a critical challenge: by the time they discover suspicious activity in their development pipeline, it’s often too late to prevent damage. Manual audit log requests create bottlenecks that delay incident response, and gaps in visibility leave organizations vulnerable to insider threats and compliance violations. If your team struggles with any of these issues, you need a systematic approach to real-time audit monitoring.

Complete Guide to HAProxy Visibility Using Promtail and Loki

HAProxy is the workhorse in front of countless APIs and apps because it’s fast, lean, and flexible. Because it sits on the traffic hot path, it’s also your earliest warning system when something slows down or breaks entirely. This means that monitoring it isn’t optional. You need to see connection queues and retries, per-stage timings, health-check failures, and spikes in error statuses to catch incidents before users do.