article thumbnail

11 proven, DevOps best-practices for continuous improvement

Audacix

Whether you're about to implement DevOps or searching for ways to make it work better for your team, you must remember that DevOps is all about discipline. But you're in luck, because successful DevOps practitioners leave clues and patterns that you can start implementing today to supercharge the value from your DevOps program.

article thumbnail

Using Tailscale to Access Amazon VPCs, EC2 Instances, and RDS Clusters

Crafty CTO

Inception: Direct Database Access for the Data Team Our immediate need was getting the data science team programatic access to a read replica of our production database, an Amazon RDS Postgres cluster. SMSM has one significant drawback: targeted at dev and devops folks, it is configured and run through the AWS command line interface.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How To Do Software Security Testing Without Security Experts

Audacix

While functional software testing is already regarded as a critical component of the software development lifecycle, unfortunately, automated software security testing remains an afterthought for the majority of software teams. Penetration testing as a service can be done using automated security testing tools like Cyber Chief.

article thumbnail

Stripe’s Will Larson on engineering and infrastructure management

Intercom, Inc.

Will Larson has managed infrastructure teams for some of the biggest names in software. Partnering with the Infrastructure, Data and Developer Productivity teams, his group builds the tools that support every Stripe engineer and keep Stripe reliable and performant. Boss, a build your own search service, and they contacted me.

article thumbnail

This online pentest tool helps you fortify your SaaS & APIs

Audacix

I'm going to reveal to you a specific automated penetration testing tool that not only helps you discover vulnerabilities, but it's one that is actually built to be used by your software development team without the need for help from external security teams. How Do You Automate Penetration Testing? It is simple!

article thumbnail

Moving ChartMogul to AWS and Kubernetes

Chart Mogul

In a series of articles, we will share our experiences about: Our journey to AWS EKS (Kubernetes managed service). Unexplained networking issues with latency between our machines that DigitalOcean’s support team never cleared out (this was critical for our Postgres read-replicas lag, Redis instances, and HA in general).

article thumbnail

A Brief History of SaaSOps (And Why it Matters)

BetterCloud

It’s the same idea as DevOps, but for IT pros,” I said. “Or In fact, there were a lot of people who thought it was a really bad idea. You’re putty in the hands of whoever developed that software.”. Turns out that when you put a sharing link in Slack, those documents were saved in Slack’s databases.