Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


From the desk of a brilliant weirdo #1: If you are using Scrum it’s safe to say that you are also using Agile. On the other hand, if you are using an Agile fram...
Join us for live, online presentations led by AWS solutions architects and engineers. AWS Online Tech Talks cover a range of topics and expertise levels, and fe...
This blog post demonstrates how you can use the Operator Lifecycle Manager to deploy a Kubernetes Operator to your cluster. Then, you will use the Operator to s...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
The first thing you need to do is to make sure your machine is setup with your AWS login information. Enter your Access Key ID and your Secret Access K...
Managing a tech startup has its own challenges. But, with time, it became difficult to deploy these small services of the same application in different environm...
It might seem a little difficult at first, but Terraform came to facilitate the creation of code infrastructure (IaC). Virtually everyone sees a lot of me editi...
This week brings us a variety of stories -multistage build pipelines, building lab environments, deployment patterns, cross-cloud ARM64 builds, and using contai...
Digital Ocean Providing developers and businesses a reliable, easy-to-use cloud computing platform of virtual servers (Droplets), object storage ( Spaces), and more.
Let’s be honest, Serverless architecture is everywhere right now thanks to AWS Lambda, and other service providers as well. However, being boldly out there does...
We can’t optimize for everything in software engineering, so we need to start with something, and that something should be simplicity. For example, to over-opti...
When it comes to logging, developers have to go an extra mile by inserting those log lines in their application code and also make sure their infrastructure can...
by SSH protocol also referred to as Secure Shell, provides many functionalities like, In general, there are different ways of logging in to a remote machine, W...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
by Database: Cloud-native database hosted on Kubernetes in HA &FT config. Only this node will have management IP attached and this will connect to oth...
by In a three-tier architecture, APIs lay in the domain or business logic tier and ensure the continuity of data transformation between the two other component...
As machine learning and deep learning models become more sophisticated, hardware acceleration is increasingly required to deliver fast predictions at high throu...
ubernetes Operators has the power to realize the dream of Zero-touch Ops, bringing in AIOps to life… if the application is not “built-for-manage”, its going to...