{"version":"1.0","provider_name":"FinOps School","provider_url":"https:\/\/finopsschool.com\/blog","author_name":"priteshgeek","author_url":"https:\/\/finopsschool.com\/blog\/author\/priteshgeek\/","title":"Comprehensive Tutorial on Usage Reports in DevSecOps - FinOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Oxf89RBzyW\"><a href=\"https:\/\/finopsschool.com\/blog\/comprehensive-tutorial-on-usage-reports-in-devsecops\/\">Comprehensive Tutorial on Usage Reports in DevSecOps<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/finopsschool.com\/blog\/comprehensive-tutorial-on-usage-reports-in-devsecops\/embed\/#?secret=Oxf89RBzyW\" width=\"600\" height=\"338\" title=\"&#8220;Comprehensive Tutorial on Usage Reports in DevSecOps&#8221; &#8212; FinOps School\" data-secret=\"Oxf89RBzyW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/finopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"1. Introduction &amp; Overview What is Usage Reports? Usage reports in the context of DevSecOps refer to the systematic collection, analysis, and presentation of data that tracks the performance, security, and operational metrics of software development pipelines, applications, and infrastructure. These reports provide insights into resource utilization, security vulnerabilities, compliance status, and operational efficiency within ... Read more"}