Identify IaC Violations and Revert Misconfigured Resources Using GitHub
Identifying violations in your infrastructure as code (and applications) by creating policy-as-code standards is a pathway to shifting your security left.
Join us
Identifying violations in your infrastructure as code (and applications) by creating policy-as-code standards is a pathway to shifting your security left.
This unisex heavy blend Hooded Sweatshirt is relaxation itself. It's made with a thick blend of Cotton and Polyester, which makes it plush, soft and warm. The spacious Kangaroo Pocket adds daily pract...
Holiday season's peak traffic is the most challenging period for SREs and on-call engineers. In this blog, we have highlighted the things that SREs can do to make the holiday season less chaotic.
Learn how to use SSH keys to securely communicate with remote code servers like GitHub, GitLab, and Bitbucket
Configurations are attributes needed by an application when it runs.
Provisioning Kubernetes cluster using terraform. In this article, I am going describe the requirements to provision a Kubernetes cluster on OCI using terraform and deploying an application on Kubernetes cluster
Example of implementing an API using Spring Boot, Elasticsearch, Logstash, Kibana, and Docker.
Pythonic way of expressing iterative logic
GitOps is a āfast and secure method for developers and cluster operators to maintain and update complex applications running in Kubernetes.ā
Pub/Sub, which stands for Publisher/Subscriber, allows services to communicate asynchronously, with latencies on the order of 100 milliseconds.
The first thing you need to understand about the cloud is that it is not always part of the body.