Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Rethinking Cyber Security: Air-Gapping in Unconventional Places

Cyber security has become a top priority across all industry sectors, public and private. Securing a Kubernetes environment presents new challenges to organizations that are transitioning from traditional IT infrastructures to container management solutions in the cloud. As D2iQ VP of Product Management Dan Ciruli points out in “ Air-gapped Advantages in a Non-Air-gapped World,” surveys show a large percentage of Kubernetes environments are vulnerable to attack, as high as 87%.

Docker Secrets: An Introductory Guide with Examples

Securing sensitive data is crucial for any application, but managing this data can be complex and error-prone. Docker secrets provide a reliable and secure way to handle sensitive information like passwords, API keys, and certificates in your Docker environment. In this introductory guide, we’ll explore what Docker secrets are, how to use them with practical examples, and share some best practices to help you safeguard your sensitive data effectively.

The Kubernetes Alternative You've Been Looking For

If you’re in DevOps, you know the word ‘Kubernetes’. While saying that mouthful of a word (generally shortened to k8s in text) would have gotten you a weird look and someone asking if you need to lie down before 2017, it’s been sacrilegious to even consider starting a project without architecting your solution on top of it in the last few years.

What Is Broken-Access Control? Examples and Prevention

Access control is a security mechanism that regulates who has access to sensitive data, resources, and systems. It ensures that only authorized users can access sensitive data and activities while keeping unauthorized users out. Access control is critical for protecting sensitive data such as personally identifiable information (PII), financial information, and intellectual property.

AWS Redshift 101: What Is It and When Should You Use It?

Amazon Redshift processes petabytes of data, making it one of the most popular data warehousing solutions on the market. It uses Massively Parallel Processing (MPP) technology to process massive volumes of data at lightning speeds. Plus, Redshift costs a fraction of the cost of other data platforms. This guide will provide a deeper understanding of Redshift to help you determine whether it's the best data warehouse solution for your organization. Table Of Contents.

Platform Engineering: The Key to Successful Digital Transformation for the Enterprise

Explore how Platform Engineering can transform your enterprise and empower individual teams to work and ship independently, while maintaining compliance and governance requirements, through a centralised system. Discover: How CircleCI can help make platform engineering an integral part of their internal development platform. How to easily centralise essential components such as development processes, testing, infrastructure provisioning, project management, and observability. How platform teams operate in large organisations.

Understanding Linux CPU Consumption, Load, and Pressure for Performance Optimization

As a system administrator, understanding how your Linux system's CPU is being utilized is crucial for identifying bottlenecks and optimizing performance. In this blog post, we'll dive deep into the world of Linux CPU consumption, load, and pressure, and discuss how to use these metrics effectively to identify issues and improve your system's performance.

Understanding Context Switching and Its Impact on System Performance

Context switching is the process of switching the CPU from one process, task or thread to another. In a multitasking operating system, such as Linux, the CPU has to switch between multiple processes or threads in order to keep the system running smoothly. This is necessary because each CPU core without hyperthreading can only execute one process or thread at a time.

How to get started with incident management metrics

Tracking incident metrics can help you discover patterns in the causes and costs of incidents and help you understand brittle parts of your organization. We've seen them help teams zero in on things like: But it can be intimidating to get started. Do you really need metrics if you're a small team or just beginning to formalize your incident management program? I say yes. The key is to start with something manageable and grow.