Operations | Monitoring | ITSM | DevOps | Cloud

Automation

Change in behavior: Directory permissions and the execute bit

rxdirs has provided a convenient default when setting permissions recursively. When enabled (the default prior to version 3.20.0) a promise to grant read access on a directory is extended to also include execution since quite commonly if you want to read a directory you also want to be able to list the files in the directory. However, the convenience comes with the cost of complicating security reviews since the state requested on the surface is more strict than what is actually granted.

Get your Puppet fundamentals free with new instructor-led training

Want to land one of the 20,000 jobs calling for Puppet experience? Or perhaps you already know Puppet but want to advance your skills in order to scale your infrastructure even more quickly and securely? Starting this May, we’re making it easier than ever for you to learn Puppet with an all-new instructor-led curriculum and the opportunity to take all of our Fundamental Core instructor-led training for free.

3 Reasons Your CMDB Strategy Isn't Working

A well-maintained, accurate configuration management database (CMDB) is the cornerstone of successful IT operations, offering clarity about what’s in your environment and how it all works in tandem. Yet, statistics indicate that only 25% of organizations are actually receiving meaningful value from their CMDB investments. This is due in large part to ever-changing IT assets and the increasing complexity of infrastructure and applications.

Rundeck + Squadcast Integration: Simplifying Alert Routing

Rundeck is an automation tool that helps to make existing automation, scripts, and commands more secure, auditable, and easier to run. It is a software Job scheduler and Run Book Automation system that automates routine processes across development and production environments. It brings together tasks scheduling, multi-node command execution, workflow orchestration. It also logs everything that happens in the system. Squadcast is an end-to-end incident response tool.

Quick reads from the Value and Adoption team: The Importance Self-Healing (and How It Works)

Most folks familiar with BigPanda know that automation is a foundational block of our technology. Our platform automates the entire events pipeline with functions including standardizing and deduplicating alerts, cutting down on the volume of incidents, and automated enrichment that provides better context and alert payloads. But these are all part of an inbound flow of events through integrations.

How to Use Automation to Streamline IT Support

Though change is not a new concept in IT -- one might say it is intrinsic to the very nature of it -- the rate of change has accelerated dramatically over the last few years. We’ve recognized that people are everything and that we need to use technology to do more of the heavy lifting. This blog will look at how to automate customer service, streamlining IT support and improving your organization’s overall service delivery.
Sponsored Post

Orchestration vs Automation: Which Does Your Business Need?

Digital transformation is accelerating rapidly to include virtually all enterprise functions. Organizations of all size, across all industries, are leveraging digital technology to enhance customer service and improve work efficiency. Integrating automation into core business functions has become a must to stay aligned with the ongoing digital revolution. The growing migration to the cloud has resulted in the distribution of company data and applications across multiple locations. This means that many complex business processes must leverage IT resources from the cloud and on-premises. This is where automation and orchestration can greatly improve the performance and efficiency of these complex tasks.

Automated Zero Trust: The Only Thing to Put Your Trust in

There’s no question that centralized identity and access management (IAM) helps companies reduce risk and prevent attacks. But, as this week’s Okta attack shows, centralized IAM doesn’t eliminate all risks. Attackers with access to IAM data can use this information to easily access downstream systems or modify permissions to grant elevated access to malicious parties.