Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Kubernetes Unleashed: Mastering Installation, Configuration, and Cluster Management

Join Colin Griffin & Dinesh Majrekar as they dive into Kubernetes Unleashed, exploring the setup and management of Kubernetes clusters using Terraform, IAC, and GitOps. We'll cover essential tools like Rancher, Argo CD, and Helm, providing a hands-on demo of how to automate deployments and maintain infrastructure as code.

How to add feature flags to your Ruby on Rails applications

Feature flags are a way to affect how your application behaves at runtime, without having to deploy new code. As the name suggests, they can be used to switch certain features on or off depending on a specified rule. A type of feature flag you have probably already encountered can be implemented as simple environment variables. Consider the following code you typically find in every Rails app’s production.rb.

10 Reasons to Get a Proxy for Your Home Use

If you're passionate about maintaining privacy in your digital life, understanding the benefits of using a proxy server for home use is crucial. Proxies offer an extra layer of security and anonymity, which can be particularly appealing for those concerned with protecting their online activity. This article outlines ten compelling reasons why integrating a proxy into your home network is a smart move.

Difference Between Views and Tables in SQL

Businesses widely use relational databases because their ability to structure data makes it much easier to manage. Tables and views, among other database objects, can often be found within such a database. In this article, we will discover the fundamental differences between these two concepts in SQL databases, their characteristics, use cases, and how they impact data management and security in your database projects.

How Agile Leadership Transforms IT Operations

Traditional IT operations, with their waterfall processes and lengthy release cycles, can feel sluggish in today's business environment. This constant state of "catch-up" can lead to frustration for developers, ops staff, and business leaders alike. Developers struggle to see their innovative ideas come to life quickly. Operations teams scramble to deploy code that feels outdated before it even hits production. Business leaders see their growth potential hampered by slow IT delivery.

Adding config to AWS ECS tasks

When deploying Docker containers to AWS ECS, you can encounter a situation where you want to run an image that requires some configuration. For example, let's say you wanted to run Vector1 as a sidecar to your main application so you can ship your application's metrics to a service like Honeybadger Insights. To run Vector, you only need to provide one configuration file (/etc/vector/vector.yaml) to the image available on Docker Hub.

INTEGRATE 2024 Day 2 Highlights

Dan Toomey, Senior Integration Architect at Deloitte Australia, kicked off the session by highlighting the essential role of business rules in software development. He emphasized the significance of managing evolving and complex business rules, advocating for the use of effective tools like Business Rules Management Systems (BRMS) to safeguard code and services.

How NaaS is revolutionising network management

Network-as-a-Service (NaaS) is revolutionising network management by helping businesses take greater control of the provisioning, payment and management of network services. In our on-demand webinar, “Unlocking the power of network automation”, Lisa Wright took a deeper look at how network automation, SDN (Software Defined Networking) and NaaS are shaping the future of networking and delivering value for enterprises.