Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


From conceptualization to deployment, the process of developing software applications or web applications is complex. By going through several intricate phases...
I’m looking to create a Stream from Account “A” Cloudwatch log group to Account “B” Elastic Search cluster. The Elastic search cluster in Account “B” is running...
Jenkins executes jobs? …So people tell me. Apparently it does other things too? Jenkins can deploy, run tests, build containers, Jenkins can do everything. Yep...
Digital Ocean Providing developers and businesses a reliable, easy-to-use cloud computing platform of virtual servers (Droplets), object storage ( Spaces), and more.
In this article, we discuss how to stop DDoS attacks with MuleSoft by limiting the number of time a user can hit a certain API endpoint.
To the newly initiated, learning about how Torus works can feel like information overload. We’ve written about the Torus Network at a high level in our docs, bu...
As the line between physical and digital lives continues to blur, the significance of Information Technology automation escalates in terms of cost and time effi...
If you read my stories often, you may find a pattern, I always show concerns about the current state of DevOps. This article bit different and nonetheless will...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
Sometimes it is useful to inspect API calls in order to debug a user related issue and reproduce end to end flow. This could be achieved by checking the server...
If you’ve never used (or heard of) GitHub Actions, this post is for you. I’m going to give you a brief overview of what GitHub Actions is, and we’ll see it in a...
The Best Resources and tutorial are here. After i had a conversation with my senior developer , I was forced myself to learn Docker, Because as a backend develo...
My team implement non-business logic platform. It means that we provide IaaS, PaaS, and some clould managed services. Of course, we provide as a secure environm...
Achieve superior email deliverability with ToastMail! Our AI-driven tool warms up inboxes, monitors reputation, and ensures emails reach their intended destination. Sign up today for a spam-free future. Achieve superior email deliverability with ToastMail! Our AI-driven tool warms up inboxes, monitors reputation, and ensures emails reach their intended destination. Sign up today for a spam-free future.
Now some of you may have already made some prejudgements. But I ask that you hold your conclusions, and take a listen. Join 35,000 others and follow Sean Hull o...
RabbitMQ is the most widely deployed open source message broker. RabbitMQ is lightweight and easy to deploy on premises and in the cloud. It supports multiple m...
A whaling attack is a type of phishing attack that targets high-level executives, such as the CEO or CFO, to steal sensitive information from a company. This co...
Jenkins X is not Jenkins, it’s completely rewritten from scratch. Jenkins X is much more specific and “opinionated” than Jenkins. It provides one way using spec...