Forem

# devops

Content centering around the shifting left of responsibility, deconstruction of responsibility silos, and the automation of repetitive work tasks.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Deploy an Open Source LLM Reliably on Kubernetes (Step-by-Step)
Cover image for How to Deploy an Open Source LLM Reliably on Kubernetes (Step-by-Step)

How to Deploy an Open Source LLM Reliably on Kubernetes (Step-by-Step)

Comments
8 min read
Running Python Applications Alongside PHP on Apache

Running Python Applications Alongside PHP on Apache

Comments
3 min read
Linux kernel vulnerabilities without distro notice: what this changes in my Ubuntu/Railway stack
Cover image for Linux kernel vulnerabilities without distro notice: what this changes in my Ubuntu/Railway stack

Linux kernel vulnerabilities without distro notice: what this changes in my Ubuntu/Railway stack

2
Comments
9 min read
Why Your Lab Domain Suddenly Stopped Resolving (DNS Blocklists)
Cover image for Why Your Lab Domain Suddenly Stopped Resolving (DNS Blocklists)

Why Your Lab Domain Suddenly Stopped Resolving (DNS Blocklists)

Comments
5 min read
Your LLM Costs Spiked 400% Last Night — Here's How to Catch It in One API Call

Your LLM Costs Spiked 400% Last Night — Here's How to Catch It in One API Call

Comments
7 min read
Automating MySQL InnoDB Cluster Deployment for HPE Morpheus Enterprise HA
Cover image for Automating MySQL InnoDB Cluster Deployment for HPE Morpheus Enterprise HA

Automating MySQL InnoDB Cluster Deployment for HPE Morpheus Enterprise HA

Comments
13 min read
Let AI fix your CI" is a supply chain attack waiting to happen. Here's how to do it safely

Let AI fix your CI" is a supply chain attack waiting to happen. Here's how to do it safely

Comments
3 min read
I built a natural language cron expression generator – looking for feedback

I built a natural language cron expression generator – looking for feedback

Comments
1 min read
Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025
Cover image for Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025

Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025

Comments
8 min read
Docker for Beginners: Containerize Your App in 30 Minutes

Docker for Beginners: Containerize Your App in 30 Minutes

Comments
1 min read
Wireshark Is Great — Here's Why It's Not Enough for Production Networks

Wireshark Is Great — Here's Why It's Not Enough for Production Networks

Comments
7 min read
How to Fix Kubernetes CrashLoopBackOff (Real Commands)

How to Fix Kubernetes CrashLoopBackOff (Real Commands)

Comments
1 min read
The Hidden Engineering Cost of Infrastructure as Code Providers (And How We Fix It)
Cover image for The Hidden Engineering Cost of Infrastructure as Code Providers (And How We Fix It)

The Hidden Engineering Cost of Infrastructure as Code Providers (And How We Fix It)

5
Comments
9 min read
How to Build Systems That Don’t Collapse at Global Scale

How to Build Systems That Don’t Collapse at Global Scale

2
Comments
2 min read
The AI-First Development Workflow: How We Ship 3x Faster Without Sacrificing Quality

The AI-First Development Workflow: How We Ship 3x Faster Without Sacrificing Quality

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.