Prevasio, a cybersecurity startup, has announced that it has completed the scanning of 4 million container images at Docker Hub. Nearly 51% of the images have critical vulnerabilities, and nearly 6,500 of them can be considered malicious. | Continue reading
Amazon Web Services launches new Mac instances that allow running macOS on Amazon Elastic Cloud Compute to build, test, package, and sign XCode applications for Apple platforms. The platforms include macOS, iPadOS, iOS, tvOS, watchOS, and Safari. | Continue reading
In the third quarter of 2020, China’s clouds have grown by a whopping amount of 65%. This boom in China’s clouds has been estimated to have hauled a revenue of over $5 billion. Estimates suggest that when the spending in the third quarter is compared with the spending in the seco … | Continue reading
IBM recently announced a definitive agreement to acquire Instana, a German-American software firm that specializes in developing APM software. With this acquisition, IBM can further advance its Hybrid Cloud and AI technology and reinforce its AI-powered automation capabilities. | Continue reading
Nirmata, a Kubernetes operation and management platform, has announced that CNCF has accepted Kyverno, its Kubernetes-based policy engine, at the sandbox level. With Kyverno, you do not need a new language to write policies as all policies are managed as Kubernetes resources. | Continue reading
Globally-reputed log management and log analysis company Logz.io’s recent DevOps Pulse 2020 Survey reveals great insight into demand and usage of cloud-based devops services. The largest survey of its kind, the DevOps Pulse 2020 saw participation by over 1000 engineers and develo … | Continue reading
Cloud native infrastructure builder Jetstack announces its successful donation of the cert-manager project to the Linux Foundation’s Cloud Native Computing Foundation “Sandbox” project. The donation has been eagerly accepted, and cert-manager is expected to revolutionize the secu … | Continue reading
In a high severity data breach totaling 10,000,000+ files, Prestige Software, a hotel reservation platform based in Spain, exposed the banking details of over a million customers. This company provides automated online booking services to customers looking to reserve hotels for t … | Continue reading
Understanding Kubernetes Autoscaling | Continue reading
This article will focus on the popular monitoring tool Prometheus, and how to use PromQL. Prometheus uses Golang and allows simultaneous monitoring of many services and systems. | Continue reading
Evolution of Kubernetes Worker Nodes and the architecture of CRI-O and Red Hat Openshift 4.x | Continue reading
MLOps vs AIOps, what are the differences? There is a tendency to confuse MLOps and AIOps. While there are some common characteristics between the two, MLOps and AIOps are two different domains, are applied differently, and serve different goals. | Continue reading
The Chief I/O is the IT leaders' source for news and insights about DevOps, Cloud Computing, Monitoring, Observability, Distributed Systems, Cloud Native, AIOps, and other must-follow topics. | Continue reading
In this blog post, we’ll look at some of the many roles an SRE can play, and how to find people with those skill sets. | Continue reading
Identifying security vulnerabilities is part of the PCI DSS requirements that you need to meet if you are involved in payment card processing. In this article, we take a look at the requirements defined by PCI DSS and give suggestions on how your company easier can meet these dem … | Continue reading
When developing for reliability or implementing resilient DevOps practices, the heart of your decision-making is data. Without carefully monitoring key metrics like uptime, network load, and resource usage, you’ll be blind to where to spend development efforts or refine operation … | Continue reading
The world first witnessed an increase in the number of physical machines during the industrial revolution. This steady rise compelled organizations to create a system, which was done by building factories, assembly lines, and other elements of automated manufacturing. Soon after, … | Continue reading
In the first post of a three-part series, get started on understanding CI/CD pipelines for Kubernetes applications. Also take a look at the tools and resources you can use to build CI/CD pipelines. | Continue reading
As the coronavirus or COVID continues to spread around the world, and the World Health Organization calls the outbreak of COVID-19 a pandemic, companies need to assess their work as usual during this time.This raises the question of whether the business continuity plan is also pr … | Continue reading
Resiliency isn’t something that just happens; it’s a result of dedication and hard work. To reach your optimal state of resilience, there are some crucial SRE best practices you should adopt to strengthen your processes.Increase cognitive capacity with runbooksAs you know, failur … | Continue reading
Visuals embedded within in the postmortem benefit readers in two major ways. First, this allows new hires to visualize problem and feel like they’re working through the incident with the engineers who mitigated it. Second, it allows engineers who may deal with a similar issue to … | Continue reading
As reported in the 2020 IBM X-force report, retail is now the second most targeted industry after finance in cyberattacks. This is now being compounded by large efforts led by hackers that profit on the current turbulent times. | Continue reading
Many IT teams are currently working on digital transformation projects. After all, companies want to benefit from current technologies such as the cloud, machine learning (ML), and the Internet of Things (IoT). | Continue reading