Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Monitor ECS applications on AWS Fargate with Datadog

AWS Fargate allows you to run applications in Amazon Elastic Container Service without having to manage the underlying infrastructure. With Fargate, you can define containerized tasks, specify the CPU and memory requirements, and launch your applications without spinning up EC2 instances or manually managing a cluster. Datadog has proudly supported Fargate since its launch, and we have continued to collaborate with AWS on best practices for managing serverless container tasks.

Deploy realtime GraphQL APIs in minutes with Qovery and Hasura

Hasura is an open source engine that connects to your databases & microservices and auto-generates a production-ready GraphQL backend. By using Hasura in conjunction with Qovery, you get a blazing fast, auto-scallable and extensible solution to quickly build your applications.

Resilience in Action, Episode 1: Narratives in Incidents with Lorin Hochstein

Resilience in Action is a podcast about all things resilience, from SRE to software engineering, to how it affects our personal lives, and more. Resilience in Action is hosted by Blameless Staff SRE Amy Tobey. Amy has been an SRE and DevOps practitioner since before those names existed. She cares deeply about her community of SREs and wants to take what she’s learned over the 20+ years of her career to help others. In our very first episode, Amy chats with Netflix software engineer Lorin Hochstein.

Privacy Protections, PCI Compliance and Vulnerability Management for Kubernetes

Containers are becoming the new computing standard for many businesses. New technology does not protect you from traditional security concerns. If your containers handle any sensitive data, including personally identifiable information (PII), credit cards or accounts, you’ll need to take a ‘defense in depth’ approach to container security. The CI/CD pipeline is vulnerable at every stage, from build to ship to runtime.

What Makes SSL Fail, and What Can SREs Do About It?

TLS (and the previously used SSL) protocols make the web go round. They are fundamental when establishing a link between two computers, creating a very special mathematical relationship signified by the all-encompassing gesture of friendship: the handshake. So fundamental, in fact, that we probably take them for granted when we shouldn’t. The user relies on TLS encryption every day to protect data and the integrity of a session.

Simplify NFV adoption - Charmed OSM and Managed Apps

Charmed OSM and Managed Apps let telecom operators accelerate adoption of NFV. This is needed because the way we consume data has changed. We want data at a cheaper price with faster speeds and in larger quantities. To meet the challenge, telecom operators are changing the underlying network infrastructure that delivers data. Software-defined networking (SDN) and network function virtualisation (NFV) are enabling this by lowering costs and improving infrastructure flexibility.