Links
AddLinux can send a notification every time a file is added to a directory. Here's how to use that for automation.
Kubernetes for Prod, Tilt for Dev
Join the Internet Storm Center's Slack channel for real-time updates on internet security events.
The latest tips, tutorials, new, and release info about Elasticsearch, Kibana, Beats, and Logstash...
It turns out that professionals are keenly interested in learning new skills (which makes us deliriously happy). And learning tends to spike in January, as people start the year focused on building new habits.
September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. December 2, 2019: Since the author wrote this post, AWS Single Sign On (AWS IAM Identity Center) has launched native features that simplify using […]
One of the most useful features of any version control system is the ability to "undo" your mistakes. In Git, "undo" can mean many slightly different things.
Keep track of where your money is going with HomeBank, the eighth in our series on open source tools that will make you more productive in 2019.
Pen-testing tool aims to protect network access points against a host of threats.
The Faucet software-defined network controller enables users to run networks the same way they run server clusters.
To keep pace with AWS innovation, many customers allow their application teams to experiment with AWS services in sandbox environments as they move toward production-ready architecture. These teams need timely access to various sets of AWS services and resources, which means they also need a mechanism to help ensure least privilege is granted. In other […]
Contribute to ayang64/doomfire development by creating an account on GitHub.
Learn how to build more performant, safe, and secure systems with chaos engineering.
Learn to install and write queries for the Prometheus monitoring and alerting system.
This list of books will help fine-tune your DevOps practice.
In the final section of my series on creating a comprehensive security program around Docker [https://nullsweep.com/building-a-docker-security-program], I'll be looking at some ideas and best practices around patching running containers.
In the previous articles, I talked about running static analysis on containers [https://nullsweep.com/docker-static-analysis-with-clair] and rolling