Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Bringing multiple windows to Flutter desktop apps

Over the past 5 years, Canonical has been contributing to Flutter, including building out Linux support for Flutter applications, publishing libraries to help integrate into the Linux desktop and building modern applications for Ubuntu, including our software store. Last year we announced at the Ubuntu Summit that we’ve been working on bringing support for multiple windows to Flutter desktop apps.

Announcing HAProxy Enterprise Kubernetes Ingress Controller 3.0

We’re excited to introduce HAProxy Enterprise Kubernetes Ingress Controller 3.0, packed with powerful new features that bring greater control, performance, and observability to managing Kubernetes environments. This release delivers TCP custom resource definitions (CRDs) to improve mapping, structuring, and validation for TCP services within HAProxy Enterprise Kubernetes Ingress Controller.

Azure Blob Storage Pricing Breakdown: Your Guide For 2025

Microsoft Azure Blob Storage stands out as a scalable, reliable, and versatile cloud storage solution for modern businesses. The block storage platform is also popular for replicating data across multiple data centers. This redundancy safeguards your records in case of data center failures or regional disasters. These capabilities come at a cost, which impacts your bottom line. Let’s break down how much Blob Storage costs, including the key factors that influence Azure Blob Storage pricing.

Getting Started with the OpenTelemetry Helm Chart in K8s

Managing observability in cloud-native environments can feel like juggling a thousand things at once. OpenTelemetry makes this easier by becoming a favorite among developers for collecting, processing, and exporting telemetry data without breaking a sweat. Now, let’s talk about the OpenTelemetry Helm Chart. It’s like having a shortcut button for deploying OpenTelemetry in Kubernetes.

A Complete Guide to Threat Hunting: Tools and Techniques

Today, threat hunting has emerged as a proactive defense strategy. No longer is it sufficient to rely solely on reactive measures; identifying and mitigating potential threats before they cause damage is now the name of the game. And the key to effective threat hunting? The right tools. This blog takes you through all about threat-hunting, the right tools, their capabilities, and why they’re indispensable in cybersecurity.

How to Use the Laravel Scheduler for Task Management

We all know time is precious, especially when your application relies on tasks that need to be done repeatedly. The Laravel Scheduler is the tool that helps you automate and manage those tasks effortlessly. But how does it work, and what makes it so powerful? Don’t worry, we’ve got you covered! In this guide, we’ll walk you through everything you need to know to get started.

Top 7 security risks for 2025

The exponential growth of new technologies, such as generative AI, in conjunction with the rapid adoption of cloud technologies and the boom of IoT devices, has created an abundance of data that needs to travel across diverse ecosystems. This proliferation of technology brings many benefits to organisations but simultaneously creates more vulnerabilities and security challenges to manage.

Ultimate Guide to Creating a JSON Mock API for Testing

Using a JSON mock allows you to avoid using fake data or simulating interactions, resulting in better final output and stronger data flows. Today, we’re going to dive into the process of creating a mock API using JSON data and tools like JSON-server. This guide will help you understand the basics of this process and get started quickly with your own mock API, allowing you to speed up development and testing without relying on a live backend.