Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Preventing Kubernetes misconfigurations and deprecations with Datree

Join Datree’s Shimon Tolts and Civo’s Kunal Kushwaha and as they talk about preventing Kubernetes misconfigurations and deprecations. Shimon walks through why you should automate your Kubernetes cluster upgrades and scan for deprecations regularly, and ultimately, how to do this easily with open source tooling. Kunal focuses on minimizing Kubernetes misconfigurations that can cause clusters to fail in production with Datree. Including setup and installation of the tool, some of the key features, policy management, tokens, and more.

DevOps and monitoring: the perfect pair when they work together

Organizations throughout the globe have been working for years trying to find more efficient ways to remove the barriers hindering the speed at which computing services and applications are rolled out to market. These barriers often present challenges for how DevOps and monitoring work together. Between the requirements-and-design phase, to planning and development, to testing, software projects can take between 4 to 9 months to complete depending on their size and complexity.

Secure HashiCorp Vault with Datadog Cloud SIEM

HashiCorp Vault provides centralized storage and management of passwords, API keys, tokens, and other secrets that distributed applications can use to operate securely. Vault clients—services and applications that access secrets programmatically, as well as users who interact with a Vault server—can create, update, and read secrets based on the permissions you grant them.

IT Ops' role in strengthening security and achieving compliance

It wouldn’t be Cybersecurity Awareness month without some spooky-themed blogs with language focused on Fear, Uncertainty, and Doubt (FUD). Luckily, it’s the end of November now, and this isn’t that kind of blog, but what was true in October is still true today. I won’t tell you that you need to be afraid of bad actors infiltrating your security defenses and wreaking havoc in your infrastructure. Why? Because you are likely stressed enough already. Don’t you think?

How Sentry Fed the Code Observability Revolution at Shift

What happens when you have to evolve a monolithic application into a microservices architecture in order to scale a doubling Engineering staff while meeting the expectations of a growing business? Join Aaron Chu, Senior Director of Technical Operations and Karan Gupta, CTO at Shift, a modern tech company disrupting the used car industry, as they share Shift’s journey to define their Observability culture. They’ll walk through how Shift uses Sentry to ensure accountability and empower engineers to improve overall outcomes.

Day 2 Apps Deployed, the Database is on Fire

Use DevOps practices to deploy your database changes seamlessly! Join Robert Reeves of Liquibase and Melissa McKay of JFrog as they discuss the advantages of using tried and true DevOps methodologies and automation to keep your database driven application up and running in production. The 2021 State of DevOps Report tells us that elite performers are 3.4 times more likely to adopt database change management practices. DevOps is for everyone including our database professional friends.

Where's the best place to live as a DBA? | Infographic

Perhaps because so few of us have been able to travel recently, or perhaps because wanderlust is just good fun, we’ve been wondering as to where the best place to live is as a DBA. And not just where pays the most, or where the opportunities are, but where would truly be the best place to live day-to-day. Some of the findings might surprise you! If you live in any of the places mentioned, we’d love to hear about your experience of living there in a comment below.

Malicious npm Packages Are After Your Discord Tokens - 17 New Packages Disclosed

The JFrog Security research team continuously monitors popular open source software (OSS) repositories with our automated tooling, and reports any vulnerabilities or malicious packages discovered to repository maintainers and the wider community. Most recently we disclosed 11 malicious packages in the PyPI repository, a discovery that shows attacks are getting more sophisticated in their approach.