Allow loading remote contents and showing images to get the best out of this email.FAUN.dev's DevOps Weekly Newsletter
 
🔗 View in your browser.   |  ✍️ Publish on FAUN.dev   |  🦄 Become a sponsor
 
Allow loading remote contents and showing images to get the best out of this email.
DevOpsLinks
 
#DevOps #SRE #PlatformEngineering
 
 
🔍 Inside this Issue
 
 
Governance grows teeth without killing velocity: policy-enforced health alerts, approvable env configs, and zero‑downtime flips alongside eBPF‑native tracing and pipelines that auto‑lock compromised accounts. AI writes tests and unmasks malware, Perplexity tests your robots.txt, and Terraform reminds us the docs can lie—the details are where the wins are, so dig in.
🚨 Azure Service Health Built-In Policy (Preview) – Now Available!🔄 Blue‑Green Deployment in 1 diagram and 195 words🔬 Building on the foundation of OpenTelemetry eBPF Instrumentation: what’s new in Grafana Beyla 2.5🤖 From Manual Testing to AI-Generated Automation: Our Azure DevOps MCP + Playwright Success Story🛡️ How to automatically disable users in AWS Managed Microsoft AD based on GuardDuty findings✅ Introducing Approvals in Pulumi ESC🕷️ Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives🧠 Project Ire autonomously identifies malware at scale⚠️ Terraform Validate Disagrees with Terraform Docs🛠️ Writing an internal Terraform provider from A to Z

Less guesswork, more guardrails—go build.

Have a great week!
FAUN.dev Team
 
 
ℹ️ News, Updates & Announcements
 
techcommunity.microsoft.com techcommunity.microsoft.com
 
🚨 Azure Service Health Built-In Policy (Preview) – Now Available! 
 
 
Microsoft just dropped Azure Service Health Built-In Policy (Preview). It lets teams push Service Health alerts across every Azure subscription—automatically—using Azure Policy. No more piecemeal setup.

It folds in AMBA lessons, supports custom rules and action groups, and locks in alert coverage at the management group level. Scale? Check. Consistency? Finally.
 
 
bleepingcomputer.com bleepingcomputer.com
 
Kali Linux can now run in Apple containers on macOS systems
 
 
Cybersecurity professionals can now launch Kali Linux in a virtualized container on macOS Sequoia using Apple's new containerization framework. Apple announced a new framework at WWDC 2025, allowing Apple Silicon hardware to run isolated Linux distros in a virtualized environment. There are limitations to the feature, as it's only available on Apple Silicon and has bugs related to networking.
 
 
microsoft.com microsoft.com
 
Project Ire autonomously identifies malware at scale
 
 
Microsoft just dropped Project Ire, an autonomous AI that tears through software like a experienced reverse engineer. It decompiles, analyzes, classifies malware—all on its own. Under the hood: LLMs, decompilers, and a tool-use API running the show.

On public Windows driver datasets, it scored 0.98 precision and 0.83 recall, and even called out APT malware that slipped past older detection tools.
 
 
pulumi.com pulumi.com
 
Introducing Approvals in Pulumi ESC
 
 
Pulumi ESC just leveled up with Approvals—structured reviews for environment config changes, straight from Console, CLI, SDK, or VS Code. Think pull requests, but for your infra settings. No more YOLO updates.

Teams can now lock down config changes with required sign-offs. More control. Cleaner logs. Real governance.

What’s the big deal?
Config management finally plays by the same rules as code: reviewable, auditable, and access-controlled.
 
 
grafana.com grafana.com
 
Building on the foundation of OpenTelemetry eBPF Instrumentation: what’s new in Grafana Beyla 2.5
 
 
Grafana Beyla 2.5 goes all-in on upstream OpenTelemetry eBPF Instrumentation, baking it right into the core. This release adds auto-instrumentation for MongoDB and JSON-RPC, manual spans in Go, and tighter trace correlation for NodeJS.

New in town: survey mode. Think lightweight service discovery—no full-blown instrumentation needed.
 
 
aws.amazon.com aws.amazon.com
 
How to automatically disable users in AWS Managed Microsoft AD based on GuardDuty findings
 
 
AWS just dropped a new threat-response setup that ties GuardDuty, EventBridge, Step Functions, and Systems Manager Run Command into one clean pipeline. The goal? Hunt for EC2 threats and lock down Active Directory accounts—automatically.

GuardDuty kicks off the flow when it spots trouble. From there, EventBridge routes the signal, Step Functions handles the logic, and Systems Manager hits AD with the lockout.

Bigger picture: This isn’t just a clever workflow. It’s part of the shift toward wiring security into your stack—natively, instantly, and without humans in the loop.
 
 
blog.cloudflare.com blog.cloudflare.com
 
Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
 
 
In observing Perplexity's stealth crawling behavior, it was noted that they obscure their crawling identity in an attempt to circumvent website preferences by modifying user agents and changing ASNs. Despite being blocked, Perplexity's crawlers continued to try to access restricted content, using undisclosed IPs and user agents.
 
 
👉 Enjoyed this?Read more news on FAUN.dev/news
 
🐾 From FAUNers
 
faun.pub faun.pub
 
ICMP: The Network’s Diagnostic and Control Protocol
 
 
ICMP runs behind the scenes of tools like ping and traceroute, tossing out control messages—Echo, TTL Expired, Destination Unreachable—that help map out networks. But it trusts too easily. That leaves it open to DDoS amplification, MITM through Redirect, and fingerprinting via Timestamps.
 
 

👉 Got something to share? Create your FAUN Page and start publishing your blog posts, tools, and updates. Grow your audience, and get discovered by the developer community.

 
🔗 Stories, Tutorials & Articles
 
medium.com medium.com
 
Terraform Validate Disagrees with Terraform Docs
 
 
Terraform’s CLI will throw errors on configs that match the docs—because your local provider schema might be stale or out of sync. Docs follow the latest release. Your machine might not.

So even supported fields can break validation. Love that for us.
 
 
medium.com medium.com
 
Writing an internal Terraform provider from A to Z
 
 
Typeform rolled their own Terraform provider to wrangle runtime data through an internal API. Built with HashiCorp’s Go SDK, the official scaffolding framework, and wired up with acceptance tests for full lifecycle muscle.

They skipped the public Terraform Registry entirely. Instead, they shipped provider binaries as GitHub release artifacts, then rigged installs through a local filesystem mirror with a custom Terraform CLI config.

System shift: More teams are ditching private registries, going lean with internal providers tailored to their stack. Easier infra-as-code. No middleman.
 
 
devblogs.microsoft.com devblogs.microsoft.com
 
From Manual Testing to AI-Generated Automation: Our Azure DevOps MCP + Playwright Success Story
 
 
A team wired up Azure DevOps’ MCP server with GitHub Copilot to crank out Playwright end-to-end tests from manual test cases. They now run tests on demand from Azure Test Plans, convert entire test suites in bulk, and drop the results into CI pipelines—no hand-holding required.

System shift: AI's not just helping QA. It's rewriting it—turning old-school manual test cases into prompt-powered automation.
 
 
systemdesignbutsimple.com systemdesignbutsimple.com
 
Blue‑Green Deployment in 1 diagram and 195 words
 
 
Blue-Green deployment runs two matching environments so you can flip traffic with zero downtime—and yank it back fast if something breaks.

Kubernetes + Istio and Spinnaker handle the heavy lifting. They steer traffic between versions and keep infra lean.
 
 

👉 Got something to share? Create your FAUN Page and start publishing your blog posts, tools, and updates. Grow your audience, and get discovered by the developer community.

 
⚙️ Tools, Apps & Software
 
github.com github.com
 
superagent-ai/grok-cli
 
 
An open-source AI agent that brings the power of Grok directly into your terminal.
 
 
github.com github.com
 
operacle/checkcle
 
 
CheckCle is a self-hosted, open-source monitoring platform for seamless, real-time full-stack systems, applications, and infrastructure. It provides real-time uptime monitoring, distributed checks, incident tracking, and alerts. All deployable anywhere.
 
 
github.com github.com
 
IHATEGIVINGAUSERNAME/theProtector
 
 
Linux Bash Script for the Paranoid Admin on a Budget - real-time monitoring and active threat response
 
 
github.com github.com
 
apitally/apitally-go
 
 
Simple API monitoring & analytics for Go apps
 
 

👉 Spread the word and help developers find and follow your Open Source project by promoting it on FAUN. Get in touch for more information.

 
🤔 Did you know?
 
 
Google’s Site Reliability Engineering approach to error-budget monitoring often employs multi-window, multi-burn-rate alerting, rather than relying solely on raw error percentages. For a typical 30-day SLO, a fast-burn alert might trigger when the error budget is consumed at 14.4× the expected rate over both a short (5 min) and a long (1 h) window, while a slow-burn alert might fire for 6× over 30 min and 6 h, or even 2% in 1 h and 5% in 6 h—all based on the corresponding burn-rate thresholds. This design catches sudden degradations swiftly without alert fatigue from short blips. You can implement this logic using Prometheus recording rules or tools such as Grafana, Sloth, or OpenSLO.
 
 
👤 This Week's Human
 
 
This Week’s Human is Andrew Foe, founder building NVIDIA-powered edge datacenters at HyperAI and a 20+ year cloud/AI practitioner. He’s helped hosting partners become cloud providers, led IoDis to NVIDIA Elite Partner status, and ships sustainable GPU infrastructure (A100/H100/L40S). Previously with Dell, HP, Lenovo, and more, he’s worked with teams at Booking.com, Leaseweb, and AMS-IX to turn complex infrastructure into systems that actually run.
 
💡 Engage with FAUN.dev on LinkedIn — like, comment on, or share any of our posts on LinkedIn — you might be our next “This Week’s Human”!
 
😂 Meme of the week
 
 
 
 
❤️ Thanks for reading
 
 
👋 Keep in touch and follow us on social media:
- 💼LinkedIn
- 📝Medium
- 🐦Twitter
- 👥Facebook
- 📰Reddit
- 📸Instagram

👌 Was this newsletter helpful?
We'd really appreciate it if you could forward it to your friends!

🙏 Never miss an issue!
To receive our future emails in your inbox, don't forget to add community@faun.dev to your contacts.

🤩 Want to sponsor our newsletter?
Reach out to us at sponsors@faun.dev and we'll get back to you as soon as possible.
 

DevOpsLinks #489: Perplexity Accused of Using Stealth Crawlers to Bypass Robots No-Crawl
Legend: ✅ = Editor's Choice / ♻️ = Old but Gold / ⭐ = Promoted / 🔰 = Beginner Friendly

You received this email because you are subscribed to FAUN.dev.
We (🐾) help developers (👣) learn and grow by keeping them up with what matters.

You can manage your subscription options here (recommended) or use the old way here (legacy). If you have any problem, read this or reply to this email.