Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Real-Time Anomaly Detection For Cloud Cost Monitoring: Why It's The Future (And How It Works)

“Every engineering decision is a cost decision,” notes Ben Johnson, co-founder and CTO of Obsidian Security. That’s the reality of building modern SaaS products in the cloud. But as Ben points out, the answer isn’t to make engineers think long and hard about every dollar they spend. “You don’t want your team hesitating to solve risky technical problems because a choice might add $100 to the bill.

How to test application resiliency by simulating the Cloudflare December 2025 outage

This fall and winter have had their share of major outages (including AWS, Azure, and Cloudflare), and December was no exception. On December 5, 2025, Cloudflare suffered a 25-minute outage that served responses with HTTP 500 errors to about 28% of HTTP traffic served by Cloudflare. Since Cloudflare handles an average of 81 million HTTP requests per second, this represents a substantial chunk of internet traffic, including LinkedIn, Zoom, and Downdetector.

Migrations and Modernization

Learn how Cortex helps engineering organizations manage migrations and modernization—from moving on-prem systems to the cloud, to refactoring legacy services and adopting new architectures. Cortex provides the visibility, automation, and governance teams need to make complex migrations predictable, measurable, and faster. What you'll learn in this video.

Build a FIPS-enabled Ubuntu EKS image with EC2 image builder

A step-by-step demo using Ubuntu Pro and AWS Image Builder. In this video, we show how to create your own FIPS-enabled Ubuntu EKS image using EC2 Image Builder. The demo walks through creating an image pipeline, defining a recipe, and selecting a custom Ubuntu Pro AMI using SSM Parameter Store to automatically pull the latest available image. The process includes enabling FIPS updates on an Ubuntu Pro machine, validating that FIPS is enabled, and testing that the system is running in FIPS mode.

Streamlining Flyway Setup with the Guided Shadow Configuration

Guided Shadow Configuration removes the setup overhead of shadow databases in Flyway Desktop, allowing teams to adopt migrations-based workflows quickly and safely with minimal configuration. A Shadow Database is a disposable, ‘sandbox’ database that Flyway uses to generate and verify migration scripts.

Accelerating Sentinel data lake deployment | Webinar | VirtualMetric & Microsoft

Microsoft Sentinel data lake is becoming a core component of modern security architectures. In this on-demand webinar, Microsoft and VirtualMetric discuss how security teams can approach Sentinel data lake adoption to improve visibility, control cost, and prepare their data for AI-driven security workflows.

Transforming Symfony monolith to multi-apps: a step-by-step guide

This blog post is based on Florent Huck, Developer Advocate at Upsun, at SymfonyCon 2023. We utilized AI tools for transcription and to enhance the structure and clarity of the content. The journey from a single monolithic application to a multi-application architecture doesn't have to be daunting. At a recent developer conference, Florent from Upsun's Developer Relations team shared a practical step-by-step guide on how to refactor a monolith into multiple applications using Upsun.

Rovo Dev Auto Closing Vulnerabilities | Bitbucket Blitz | Atlassian

Learn how Atlassian uses Rovo Dev to automatically find and fix code vulnerabilities with Rovo Dev and Bitbucket. This capability saves our developers thousands of hours over three months and reduces issue resolution time by half, allowing them to focus on building software and solving problems for our customers. This technology is available to all of our customers. Learn how it works, and start using it yourself.