Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Shipping Clean Code at Sentry with Linters, Travis CI, Percy, & More

Shipping clean, safe, and correct code is a high priority for engineering at Sentry. Bugs are best discovered before they hit production because afterward they have real user impact and can drain even a high-performing team’s resources quickly. The later in the development cycle a bug is found, the longer it will take to fix.

DevOps Transformation: The PagerDuty Journey

At PagerDuty, reliability is at the heart of everything that we do. But in order to deliver continuous availability, drive a maniacal focus on customer needs with faster innovation, and support exponentially growing scale, over the years we've had to make significant investments and changes in how we develop and operate products.

DevSecOps: Agile Security in the Face of Rapid Change

Security is top of mind for every organization. But with the rapid pace of change that comes with digital transformation, how do organizations keep their products and solutions secure when they are constantly evolving? Learn how a leading organization is using PagerDuty to improve cybersecurity incident response while building security into its products through DevSecOps practices.

AWS CloudWatch Configuration Guide: Getting Started

If you remember getting an Erector Set as a kid, I’m sorry. In a stocking full of toy building systems, an Erector Set is the proverbial lump of coal. The instructions are complicated, and the pieces are made of metal, connected together with tiny screws. Few children have ever completed one of these sets successfully.

Introduction to Kubernetes Network Policy with Use Cases

In Kubernetes, Network Policy allows you to define a policy determining what traffic is allowed to flow to and from specific workloads. By default, Kubernetes permits ingress and egress traffic to and from all pods in a namespace. Without correct configuration your risk of a significant security breach is high. Attend this webinar and learn best practices in configuring Kubernetes network security.