Search
Blog posts
Outage on octopus.com - report and learnings
Public incident report and our learnings about the octopus.com DNS disruption from January 25 – 26, 2023.Infrastructure as code in Azure with Octopus Deploy and Pulumi: Part one
Learn how to define infrastructure as code with Pulumi.The ultimate guide to Kubernetes microservice deployments
Learn how to deploy microservices into a Kubernetes cluster with Octopus Deploy.Have you designed your application for deployment?
Strategies and ideas to simplify the deployment process of applications.Deploy and consume ZIP files from Maven
Learn how to deploy ZIP files to Maven and consume them in an Octopus project.Lessons learned implementing database deployments
Exploring the pitfalls of implementing database deploymentsResetting RavenDB indexes
Sometimes in order to troubleshoot Octopus, you'll need to reset your RavenDB indexes.Octopus 2.0 Task Output: RFC
The tasks screen will get an update in Octopus 2.0. Here are some mockups.Maven repositories explained
Learn how Maven repositories are structured and how to access artifacts stored in them.Octopus 2.0 UI: Angular, Grunt and responsiveness
Some screenshots of the Octopus 2.0 progress
Loading...
Documentation
Octopus reporting with an excel template
Octopus reporting with an excel templateSubscription webhook notifications
Set up a Slack notification from a subscriptionGitHub Actions
GitHub Actions can leverage the Octopus CLI to pack, build, push, and create releases for Octopus Deploy.Security
Security considerations for Octopus Administrators.Authentication providers
Authentication options for Octopus Deploy including our internal provider, Active Directory, Azure AD, Okta, and GoogleApps.Active Directory authentication
Octopus Deploy can use Windows credentials to identify users.Specify a custom container for AD authentication
How to specifying a custom container to use for AD Authentication.Moving your Octopus Server to another Active Directory domain
the steps and considerations to move your Octopus Server from one Active Directory domain to another.Troubleshooting Active Directory integration
Information on troubleshooting common Active Directory integration issues.Authentication automation with OctopusDSC
Authentication automation resources with OctopusDSC.Automatic user creation
User can be automatically created using some providers.Azure Active Directory authentication
Octopus Deploy can use Azure AD authentication to identify users.GoogleApps authentication
Octopus Deploy can use GoogleApps authentication to identify users.Guest login
Octopus Deploy supports a guest login if enabled.Octopus ID authentication
Octopus Deploy can use Octopus accounts to identify users.Okta authentication
Octopus Deploy can use Okta authentication to identify users.Troubleshooting authentication problems
A guide for troubleshooting authentication problems in Octopus Deploy.Built-in Worker
The built-in worker is enabled by default in your Octopus Server. This is very convenient when getting started with Octopus, but comes with several security implications.Common security vulnerabilities and exploits
This section describes how Octopus Deploy prevents attackers from leveraging common vulnerabilities and exploits.Cross-Site Request Forgery (CSRF) and Octopus Deploy
Octopus Server actively prevents Cross-Site Request Forgery (CSRF) using anti-forgery tokens.Can't find what you are looking for? You can also search our support forum.