Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Releasing IAM EKS User Mapper in open-source

I'm super excited to share something amazing our team at Qovery has been cooking up lately: the IAM EKS User Mapper. This isn't just any tool – it's our answer to a problem we know so many of you face: managing AWS IAM user access to Kubernetes clusters efficiently and securely. It's open-source and available to everyone now on GitHub.

Learn the Incident Response Life Cycle - Best Practices and Strategies

No company plans for a security breach, major outage, or other cyber incident, but they happen. When an incident occurs, having a standardized, regulated method of managing the fallout is critical. This is where the incident response life cycle comes in ‍

Netdata's Cost Transparency - Unveiling the True Cost of Monitoring

Businesses are increasingly reliant on monitoring tools to ensure the seamless performance and reliability of their systems. However, the true cost of implementing and maintaining these tools is often obscured by hidden expenses. Our previous blog delved into the concealed costs associated with various monitoring solutions, such as Prometheus & Grafana (Open Source Monitoring) and commercial platforms like Datadog, Dynatrace, and NewRelic.

What Is Network Access Control (NAC)? Overview & Implementation

Whether you’re an in-house IT professional or a managed service provider, ensuring the security and integrity of your networks is a crucial part of your bailiwick. In pursuit of greater security, Network Access Control (NAC) serves as a formidable guardian, ready to protect digital assets by regulating who gains entry to a network. Understanding the fundamental concepts and best practices of NAC is essential for any organization that values data security and network integrity.

Azure Savings Plan for Compute Resources

Have you ever struggled with keeping up with the changes in your virtual data center needs and the savvy, precise Reservations you planned and purchased? Realizing that right after you bought them, the application team decided to swap their Kubernetes cluster to the newest model. Suddenly, you are paying a VM twice: the reservation plus the new model!