Tracking Token Usage in Azure OpenAI (PAYG vs. PTU)

How Azure OpenAI Tracks Token Usage Azure OpenAI measures usage in terms of tokens processed – counting both prompt tokens (input) and completion tokens (output) for each API call. Every request’s response actually includes a usage breakdown in the JSON (showing prompt tokens, completion tokens, and total tokens). Under the hood, Azure OpenAI aggregates these … Read more

Why We Need to Slow Down When AI Speeds Us Up

AI coding assistants are here, and they’re changing the way we build software fast. Tools like GitHub Copilot, ChatGPT, and Replit’s Ghostwriter can generate boilerplate code in seconds, refactor complex logic on command, and even help debug entire applications. It’s impressive, empowering and, if we’re not careful, dangerous. Because when the pace picks up, experience … Read more

The Ultimate DevOps Security Checklist (2025 Edition)

1. Identity and Access Management (IAM) • Enforce MFA across all platforms (AWS, GitHub, DockerHub, etc.) • Use least privilege IAM roles for CI/CD pipelines • Rotate access keys and secrets regularly • Disable long-lived credentials—use short-lived, ephemeral tokens • Implement SSO wherever possible for unified control 2. GitHub / Git Repositories • Require code … Read more

Managing Slack Effectively: A Guide for DevOps Engineers

Slack is a critical tool for DevOps teams, enabling real-time collaboration, incident response, and workflow automation. However, without proper management, Slack can become a source of distractions and inefficiencies. This guide provides best practices for managing Slack effectively in a DevOps environment. 1. Organizing Channels for DevOps Create Structured Channels Limit Channel Overload 2. Managing … Read more

Ethical Guidelines for Staying Safe Online as a DevOps Engineer

As DevOps Engineers, we manage critical infrastructure, sensitive data, and automation pipelines. While security tools and best practices help, true cybersecurity starts with ethical responsibility. Ethical guidelines not only protect us but also safeguard our companies, customers, and the broader tech ecosystem. Why Ethics Matter in Cybersecurity Many online threats exploit human behavior rather than … Read more

APIM Subscription Management (Cheat Sheet)

1️⃣ List All API Management Subscriptions ✅ Shows: Subscription Name, Display Name, and State. 2️⃣ Get Details of a Specific Subscription ✅ Shows: Creation Date, Scope, Expiry, and Status. 3️⃣ List API Subscription Owners ✅ Shows: Subscription Name, Owner ID, and Status. 4️⃣ List Subscriptions and Their Linked Products ✅ Shows: Subscription Name and the … Read more

PRs: The Silent Victims of DevOps Chaos — And How I’m Fixing My Approach

As a DevOps engineer, my days rarely follow a neat plan. In theory, I’m balancing proactive work automating infrastructure, refining CI/CD pipelines, and improving security with reactive work like fixing broken deployments or helping colleagues troubleshoot oddities in production. Somewhere in that chaos lies pull request reviews and if I’m honest, they’ve often been the … Read more