Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

GNU Linux commands to inventory computer hardware

In the beginning we, as Humanity, created computers. We said “let it be electricity” and it was the light on our ballistic trajectory calculations. We saw the numbers matched and they were good. And we called the set of calculation instructions as “programs”, which were loaded straight into computer memories. And so was the first computing decade. GNU Linux commands didn’t exist yet, because there were no operating systems either.

Expand your monitoring reach with Datadog's enhanced Azure integration

Microsoft Azure is one of the fastest-growing cloud platforms in the world, offering a wide range of products for deployment, testing, and cloud storage. Datadog is committed to maintaining an extensible monitoring solution for Azure’s growing ecosystem that doesn’t require lots of manual configuration. That’s why we are excited to announce the following enhancements to Datadog’s Azure integration.

Cloud Cost Management with HashiCorp Terraform & Densify

Watch and learn how automated infrastructure management withink HashiCorp Terraform and machine-learning-based cost optimization analytics can be combined as part of DevOps and provisioning processes to continuously make FinOps a part of everyday cloud infrastructure management.

How to deploy the Elastic Stack on Red Hat OpenShift with ECK

Managing hundreds or thousands of containers has quickly become the standard for many organizations. With infrastructures growing more complex, we want every user to find value with Elastic (regardless of where or how they operate). We created Elastic Cloud on Kubernetes (ECK) — the official Operator — to simplify setup, upgrades, scaling, and more for running Elasticsearch and Kibana on Kubernetes.

Cybersecurity defenses for IIoT

Cybersecurity attacks on industrial IoT solutions can have detrimental consequences. This is the case because IoT devices record privacy-sensitive data and control production assets. Therefore, demonstrable trustworthiness is prerequisite to IoT adoption in industrial settings. Fortunately, IT security is a mature field. Experts have identified classes of threats devices may be subject to. Let’s discuss these threat patterns and mitigation strategies in the IIoT context.