Curated articles, resources, tips and trends from the DevOps World.
Note: I will be using an Amazon EKS cluster on AWS and using Amazon ECR for storing images. There will be minor differences for handling other repositories. Jenkins is a hugely popular build tool that has been around for ages and used by many people.
A network outage, software bug or system failure can bring down an entire monolithic application. While a microservices architecture ensures an application functions even when a single service fails, this enhanced fault tolerance comes at a price.
First, let's talk about two common methods for data protection: host-based backups and guest agents. Host-based backups gained favor as virtualization took hold.
Think about the existing technical infrastructure before you start refactoring a monolith into microservices.
XPath is a query language that is widely used by developers and QA automation engineers. Very often, XPath becomes the main engine for querying DOM nodes inside Selenium projects. Its ability to walk up or down to apply different filters and functions makes it a solid choice.
Postgres provides us a way to write queries that are recursive in nature and fetch the data until the termination condition is met. This can be achieved using Common Table Expressions (CTEs). Using the WITH clause, we can create a temporary table scope of which is bound to that query itself.
There are various libraries for parsing and manipulating JSON, like objectMapper, net.sf, and GSON. We will be discussing the JSON library in-depth. We parse the JSON string by creating the object of JsonParser and calling its parse method.
Sometimes it’s hard to be sure that the culture is fully DevOps. After all, this is a path of continuous improvement, and always striving to become better is part of the DNA. There’s also a lot of nuance and opinion on what DevOps means, and a lot of ways to get there.
Today, we are announcing the general availability (GA) of Microsoft Azure Ultra Disk Storage—a new Managed Disks offering that delivers unprecedented and extremely scalable performance with sub-millisecond latency for the most demanding Azure Virtual Machines and container workloads.
A data breach is a security incident where sensitive, protected confidential information is copied, transmitted, viewed, stolen or used by a person or persons with unauthorized access.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2026 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com