DevOps Operations Practice
Author

DevOps Operations Practice

We share professional insights on cloud-native, DevOps & operations, Kubernetes, observability & monitoring, and Linux systems.

162
Articles
0
Likes
568
Views
0
Comments
Recent Articles

Latest from DevOps Operations Practice

100 recent articles max
DevOps Operations Practice
DevOps Operations Practice
Jul 24, 2024 · Operations

Key Skills Required for DevOps Engineers

DevOps engineers must master programming and scripting, configuration and version control, deployment across hardware and cloud, security practices, performance monitoring, network optimization, and effective communication and team management to ensure rapid, reliable software delivery.

CI/CDDevOpsPerformance Monitoring
0 likes · 5 min read
Key Skills Required for DevOps Engineers
DevOps Operations Practice
DevOps Operations Practice
Jul 21, 2024 · Fundamentals

Global Windows Blue Screen Incident Triggered by CrowdStrike Update: Technical Analysis and Common Causes

A worldwide Windows blue‑screen outage was caused by a CrowdStrike Falcon update that introduced a bug, leading to system crashes across many industries, and the article explains the incident, its impact, a temporary fix, and the typical technical reasons behind blue‑screen errors.

Blue ScreenCrowdStrikeOS fundamentals
0 likes · 6 min read
Global Windows Blue Screen Incident Triggered by CrowdStrike Update: Technical Analysis and Common Causes
DevOps Operations Practice
DevOps Operations Practice
Jul 11, 2024 · Information Security

Top 7 Penetration Testing Tools and Their Key Features

This article introduces seven leading penetration testing tools—including Kali Linux, Metasploit, Wireshark, Nmap, Burp Suite, Acunetix, and Nessus—detailing their primary features and how they help security professionals identify and mitigate vulnerabilities effectively.

Burp SuiteKali LinuxMetasploit
0 likes · 9 min read
Top 7 Penetration Testing Tools and Their Key Features
DevOps Operations Practice
DevOps Operations Practice
Jul 8, 2024 · Operations

Common Linux Log Files and Useful Commands for Log Analysis

This article introduces common Linux log files, essential command‑line utilities such as cat, less, tail, grep, awk, and sed for viewing logs, and powerful analysis tools like logrotate, journalctl, logwatch, and goaccess, providing practical examples for effective system log management.

System Administrationlog analysislog management
0 likes · 7 min read
Common Linux Log Files and Useful Commands for Log Analysis
DevOps Operations Practice
DevOps Operations Practice
Jul 4, 2024 · Operations

Building an Enterprise‑Level Monitoring System: Requirements, Technology Selection, Architecture, Implementation Steps, and Maintenance

This article provides a comprehensive guide to designing and deploying an enterprise‑grade monitoring system, covering requirement analysis, tool selection such as Prometheus and Zabbix, system architecture, step‑by‑step implementation, alerting, visualization, and ongoing maintenance to ensure reliable IT operations.

Enterprise ITGrafanaMonitoring
0 likes · 7 min read
Building an Enterprise‑Level Monitoring System: Requirements, Technology Selection, Architecture, Implementation Steps, and Maintenance
DevOps Operations Practice
DevOps Operations Practice
Jun 20, 2024 · Cloud Native

Three Free Docker Visual Management Tools: Docker Desktop, Portainer, and Docker UI

This article introduces three free and user-friendly Docker visual management tools—Docker Desktop, Portainer, and Docker UI—detailing their key features such as cross‑platform support, graphical interfaces, container and image management, monitoring, and multi‑platform compatibility to help developers simplify container operations.

Container ManagementDevOpsDocker
0 likes · 5 min read
Three Free Docker Visual Management Tools: Docker Desktop, Portainer, and Docker UI
DevOps Operations Practice
DevOps Operations Practice
Jun 18, 2024 · Information Security

Common Types of VPN and Their Characteristics

This article explains VPN technology and outlines four common VPN types—IPSec, SSL/TLS, PPTP, and L2TP/IPSec—detailing their modes, advantages, and security considerations for remote access and site‑to‑site networking, and also compares ease of deployment versus security risks, helping readers choose the appropriate solution for their network environment.

IPSecL2TPPPTP
0 likes · 4 min read
Common Types of VPN and Their Characteristics