Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


This article goes through some of the initial steps to installing Kubernetes Operator and some additional tools to help add it to the product. This blog post de...
See how you can minimize non-critical database workload costs in AWS. One of the major challenges in Cloud is controlling costs effectively. With an on-premise...
A replica set in mongo instance is a group of mongod processes that maintain the same data set. Replica sets provide redundancy and high availability of data, a...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
If you live in the downtown areas of Pittsburgh, Palo Alto, Miami or other AV hot spots, you’ve probably been missing the Ford Fusion Hybrids with the bulky lid...
Perhaps many of you who read this quick little blurb will say, “yeah, duh” but until now I have been struggling with an unwieldy $HOME/.kube/config file.
A replica set in mongo instance is a group of mongod processes that maintain the same data set. Replica sets provide redundancy and high availability of data, a...
Docker came as great and easy solution to overcome many problems, such as dependencies, isolation, agility, etc. However, time passes and it becomes more and mo...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
If your application needs to consume a microservice or a set of microservices, this implies that your application depends on these microservices.
CI Jobs are used to automate your release process. These all require a git repository and an Enterprise license. These CI/CD jobs will test, validate, or deploy...
I write this as some sort of public note that I can refer to for when I need to do this again and I forget. Funny enough, this is what did happen as I did not w...
Vulnerability assessment is the process of identifying, classifying, and prioritizing security vulnerabilities in IT infrastructure.
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
%%excerpt%%
This is a big one for my workflow, you can now install lex (lucee extensions) files directly, either via http or via file using the lex endpoint! This just down...
Hello everyone, hope you all are doing well in these quarantine days.Recently i added a new word to my dictionary i.e. hyper-parameter.Initially i was not quite...
Datical today announced that it will now operate under the moniker Liquibase to better reflect the open source tool it provides for automating database releases...