The DevOps Handbook by Gene Kim, Jez Humble, Patrick Debois, and John Willis is probably the most popular DevOps book available today.
I read the first edition of this book a couple of years ago, but I didn’t write an article here, so I’m taking the opportunity for the recent second edition to publish my review and share my thoughts.
Continue reading “The DevOps Handbook: Book Review”
Monitoring is an important activity in IT operations, it’s essential for correlating the state of all the moving parts of our systems and applications and create a big picture of the health of the whole environment. Before going down the rabbit hole of complicated monitoring tools and techniques let’s start with define a that monitoring can be subjective and on a case-by-case can be very basic or detailed and can let you choose a specific tool or strategy. There is no one-size-fits-all. This week I needed to implement a custom check to monitor the network load/usage on any Windows OS and instead of looking for a third-party tool and deploying maybe another agent on servers I wrote a Powershell script to perform this activity.
Continue reading “Monitoring the Network Load with Powershell”
I started reading this book during the holiday season with high expectations after reading The Phoenix Project a couple of years ago.
I must admit, I recognize myself at least in a couple of characters (Brett and Maxine) of this novel and a couple of my professional experiences are in some sort described in this book.
Continue reading “Book Review: The Unicorn Project by Gene Kim”
In this article, I want to focus on a cybersecurity topic but from an operations perspective and with a pragmatic approach to tactics that users can implement to implement the security strategy or principles with less friction as possible from the end-users. Continue reading “How to Manage Secrets and Passwords with CredentialManager and PowerShell”