Curated articles, resources, tips and trends from the DevOps World.
It’s the long and repetitive work of the DevOps.Luckily there is a way to automate this! If any of the statements above are true, this article is for you!
This is the second part of our series focusing on Kubernetes Operators, and it shows how you can build a Kubernetes Operator based on the Bitnami Apache Helm chart. Note that you can refer to the steps in this tutorial to build an operator for your own applications.
Today, we are going to build a simple WordCount data pipeline using Apache Kafka for unbounded sources. From the last two weeks, I have been trying around Apache Beam API. I have read this excellent documentation provided by Beam and it helped me to understand the basics.
Alan Shimel: Hey, everyone, it’s Alan Shimel for DevOps.com, and you’re listening to another DevOps Chat. Today’s DevOps Chat is meant to give you a little bit of a flavor, a preview for the upcoming SauceCon put on by Sauce Labs, which will be at the end of April.
Business partnerships require trust, but knowing which vendors you can trust to protect your customer's PII and PHI is difficult. With the rise of information technology, there are countless ways that trust can be broken, whether intentionally or unintentionally.
Each application stack may have several repositories such as for applications, infrastructure code, databases and libraries. In order to keep them all organised, the repository structure should be clearly separated :-
Maybe you are familiar with load balancing, but some information about the deepening of material about load balancing is still lacking, I am thinking of making a piece of deeper information about this technology.
In this article, see a tutorial on how to enable HTTPS on a Spring Boot application.
The intent of this devops series is to follow up and expand on a high level blog I wrote earlier. It is also to list and crystallise ideas which are specific to the DevOps thought process in a cloud environment.
74% of data breaches start with the privileged credential abuse. To minimize breach risks and gain competitive advantage, companies should evaluate and upgrade their privileged access management solutions.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2026 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com