Curated articles, resources, tips and trends from the DevOps World.
I’m one of those purists that believes a DevOps Engineer is not a role that should exist, but rather a set of practices adopted by the entire team. Nevertheless I think you gave a good overview of some of the operational capabilities needed to enable a DevOps environment.
DevOps is now a few years old, and needs no introduction. But for the unfamiliar, DevOps is essentially streamlining the journey of a feature from development to market launch. Some of the benefits of bridging development and operations teams include
Developers are being pampered with options when it comes to managing the CD pipeline in conjunction with Kubernetes — one of which is Skaffold. There is no shortage now of development and CI/CD tools for cloud-native application development.
In this article, we'll discuss how to create a basic authorization server that creates tokens given the username and password. We will talk about how to generate OAuth tokens. When using OAuth tokens, passwords are not shared between services. Instead, tokens are used for authentication.
Every once in a while, a new buzzword pops up. Often it fades away shortly after or remains relevant in a few distinct circles. Sometimes though it becomes a fundamental concept and an integral part of our technical lexicon — a prism through which many of the old and new ideas will be observed.
The following example was taken from Python for DevOps with minor modifications. The last time I worked on KMeans was 15 years ago when I studied for master degree in data mining.
Based on a little experience of learning and unlearning things around this very common issue of hardcoded secrets I thought of writing something on this. In this story, I would be discussing the issue related to hardcoded secrets and the ways in which we can effectively resolve the issue.
Secrets are k8s object to manage small amount of sensitive data like password, keys and tokens with less than 1mb size. Secrets encoded and stored inside k8s master etcd data store. Since Secrets will be created outside of pods and containers, these can be used any number of times.
DevOps is a combination of software development and IT operations supported by agile methodologies. Agile has a different approach. It is responsible for planning but moves towards estimations of delivering quality work. This is built with the idea of responding to change.
In this article, we begin to understand the basics and challenges behind Infrastructure as Cod (IaC) Security. Infrastructure as Code and the bigger concept of DevOps for business applications are accelerating the utilization of cloud computing.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com