Curated articles, resources, tips and trends from the DevOps World.
Explore the Helm community's vital role in simplifying Kubernetes application management through collaboration and learning resources.
If DevOps is about automation and smoothing the relation between different teams responsible for developing the same application, configuration management is one of its pillars.
Istio is by far the most popular service mesh that integrates with Kubernetes very well. For a microservices architecture, Istio is not only useful to have but a necessity. This story is a follow-up to How Istio Works Behind the Scenes on Kubernetes.
Just in case you are an explorer, here I provide you with files. https://github.com/lightninglife/Terraforming-an-AWS-VPC Your team recently launched a brand new project and everything required to be build in AWS from scratch.
Every week the news is full of new exposures of protected health information (PHI) and personally identifiable information (PII). These security incidents are not only more common but also more costly.
What is DevOps? DevOps is a software methodology. It is a software development strategy.It is not technology.
Like most other cloud services providers (CSP) Microsoft (MS) and more specially azure have its own spin or suite of products that are meant to meet a customer’s needs when implementing DevOps in their organization or restructuring existing DevOps or agile infrastructure.
In 2014 (a million years ago in cloud native terms), I decided I wanted to work on technology that was changing the way applications were developed and managed. Pivotal had recently spun out of VMware and was developing something called Cloud Foundry, a Platform-as-a-Service (PaaS).
In this article, we'll learn Adding Method Access Rules using the Spring Security OAuth2 example. In this example, we'll learn Adding Method Access Rules using the Spring Security OAuth2 example. This tutorial is a continuation of my previous article https://dzone.
In this article, we discuss best-practices for developing more secure software as we continue to move into 2020. There is growing evidence that criminals, terrorists, and other malicious actors view vulnerabilities in software systems as a tool to reach their goals.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2026 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com