Curated articles, resources, tips and trends from the DevOps World.
Hey all! Terraform has this great concept of “modules” which have a ton of uses. One of the most common is to have a resource-specific module that builds a resource with the required security and operational settings your org has standardized on.
Welcome to a new series exploring a retail architecture blueprint. It's focusing on presenting access to ways of mapping successful implementations for specific use cases. It's an interesting challenge creating architectural content based on common customer adoption patterns.
In this blog I would like to showcase the power of Ansible Content Collections to build powerful abstractions. Collections are a distribution format for Ansible content that can include playbooks, roles, modules and plugins.
Apache Airflow is essentially a scheduling tool. One defines workflows that are used to trigger individual pieces of code you want to run on your machine/system. It also provides you with a set of CLI tools + a neat UI to monitor, trigger and debug processes.
We’re continuing our series on Terraform AWS with a post that breaks down the basics. The world of Terraform AWS can be described as complex — from AWS storage to AWS best practices, there’s a depth of knowledge necessary to get familiar with Terraform AWS.
The cloud has provided the world with a new consumption model for information technology, significantly changing the way that software and servers are procured and deployed. But is it worth risking the familiarity, security, and control that on-premise systems provide?
Threat modelling is a process for identifying potential threats to an organization's network security and all the vulnerabilities that could be exploited by those threats. Most security protocols are reactive - threats are isolated and patched after they've been injected into a system.
While having a mature digital enterprise helped organizations to better survive – and even thrive, in some cases – the pandemic, that’s not the primary reason why organizations will continue to invest in their digital transformation efforts.
Misconfigurations are a major security concern when running business applications in the public cloud. Errors in how infrastructure, applications and policies are set up can have significantly different impacts, but they all get labeled under the heading of “misconfiguration.”
The majority of most of the industrial use cases have leveraged Elasticsearch for observability of the high volume user traffic or server-side interactions. Introduction Elasticsearch clusters have been around for a while, scaling petabytes of data & billions of requests.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com