Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

How to prevent accidental load balancer deletions

The worst thing you could do after successfully deploying to a new environment is to accidentally delete critical infrastructure. Unfortunately, that happened to one Google Cloud customer when their private cloud subscription was accidentally deleted, resulting in nearly two weeks of downtime. This isn’t an isolated problem either: Microsoft Azure had a similar problem when a typo inadvertently deleted an entire SQL Server instance rather than a specific database.

An Introduction to CivoStack Enterprise

Traditional cloud solutions are typically bogged down by increasing costs, complex licensing, and vendor lock-in. From this, CivoStack Enterprise was developed as an innovative alternative that promises simplicity, speed, and exceptional value for money. Through this blog, we will take a look at the key aspects of CivoStack Enterprise and why it is the ideal choice for modern enterprises.

From Code To Cloud: Streamlining DevOps Workflows with Will Stewart

In this workshop, Will Stewart, co-founder and CEO of Northflank, walks you through deploying a web application with a Redis database to Civo Kubernetes using the Northflank platform. Learn how to set up a Kubernetes cluster, link GitHub for CI/CD, create production and preview environments, and streamline your DevOps workflows. Perfect for engineering teams looking to enhance their deployment processes.

Navigating Kubernetes Contexts and Namespaces with kubectl

We all know that managing multiple Kubernetes clusters and their resources can be challenging. However, kubectl offers several context and namespace commands to simplify this process. This comprehensive guide will walk you through using various kubectl commands to manage your Kubernetes environments more efficiently.

Demystifying the cloud: Elasticity vs. scalability

Elasticity and scalability are essential aspects of cloud computing and crucial for optimizing resource management and ensuring seamless operations. However, despite their importance, these concepts are often confused. Understanding their distinct purposes and functionalities is essential for fully leveraging the power of cloud technology. This article explores what cloud elasticity and scalability are, their key differences, and why both matter for efficient cloud environments.

Ribbon Cloud-Native IMS

Your traffic is growing, Your data is slowing Your voice network is bowing, under the stress Don’t get boxed in, avoid vendor lock in, Reliable voice services that drop-in Want a swift solution that costs you less? Enter Ribbon Cloud-Native IMS Four G, five G, we cover them all It's modern, secure on every protocol Micro services, multi-tenancy, Auto scaling and security, welcome network demands and be proud, get Today's network on tomorrow's cloud.

Relax, recharge and let Pulseway handle IT

In the demanding world of IT management, taking a proper vacation can seem like an impossible dream. Among other challenges, IT professionals must juggle multiple tasks, fend off cybercriminals and manage a high-pressure environment. How can anyone truly unwind when constantly worrying about endpoints? Pulseway understands this need and makes it possible to step away from work without worry. Enter Pulseway's remote monitoring and management (RMM) solution— the ultimate endpoint management tool.

3 Reasons to Migrate from Beanstalk to EKS

While AWS Elastic Beanstalk (EB) offers a convenient way to deploy applications, some limitations in customization and control can become a bottleneck for growing businesses. As the need for scalability, flexibility, and fine-grained management increases, Amazon Elastic Kubernetes Service (EKS) emerges as a compelling alternative.

What you need to know about regreSSHion: an OpenSSH server remote code execution vulnerability (CVE-2024-6387)

On 1 July 2024 we released a fix for the high-impact CVE-2024-6387 vulnerability, nicknamed regreSSHion, as part of the coordinated release date (CRD). Discovered and responsibly disclosed by Qualys, the unauthenticated, network-exploitable remote code execution flaw affects the OpenSSH server daemon (sshd) starting with version 8.5p1 and before 9.8p1.