We are thrilled to announce 📢 Kosli is now SOC 2 Type 2 compliant - Read more
✨ New Feature: Kosli Trails is live ✨ Create comprehensive audit trails for any DevOps activity - Read more

Kosli Changelog - October 2023

It’s spooky season and, at least here in my house, we are overflowing with costumes, pumpkins, and sweets. Happily, there’s no tricks from the Kosli team, only treats! Further API Key improvements …

Implementing Backstage 3: Integrating with Existing Tools Using Plugins

Note: This article is part of our Backstage guide series. You can find the complete guide here. Additionally, all articles of the complete Backstage guide are open sourced on GitHub and you can submit …

The DevOps Security and Compliance Guide

The fast-paced nature of modern software development means developers are capable of deploying changes to production multiple times a day. But, while DevOps allows development teams to deliver new …

Implementing Backstage 6: Deploying Backstage on Kubernetes

Note: This article is part of our Backstage guide series. You can find the complete guide here. Additionally, all articles of the complete Backstage guide are open sourced on GitHub and you can submit …

Implementing Backstage Part 5: Kubernetes Plugins

Note: This article is part of our Backstage guide series. You can find the complete guide here. Additionally, all articles of the complete Backstage guide are open sourced on GitHub and you can submit …

Implementing Backstage Part 4: Security and Compliance

Note: This article is part of our Backstage guide series. You can find the complete guide here. Additionally, all articles of the complete Backstage guide are open sourced on GitHub and you can submit …

What Is Continuous Security Monitoring Software?

Many DevOps teams work proactively to meet security and compliance standards. They consider security best practices when developing software with open source components, scanning code for …

Staying Ahead of Threats with Continuous Security Monitoring Tools for DevOps

According to the latest Crowdstrike report, in 2022 cloud-based exploitation increased by 95%, and there was an average eCrime breakout time of 84 minutes. Just as significantly, in 2021, the Biden …

Implementing Backstage: Core Components

This article is the second installment of the “Implementing Backstage” series and focuses on how to use Backstage’s core features. Backstage has an extensible plugin architecture in …