NIST’s DevSecOps guidance: This is what you should know
The NIST DevSecOps guide publication critically highlights technical security rudiments for industry-level DevSecOps integrating with cloud-native applications based on micro-services.
Join us
The NIST DevSecOps guide publication critically highlights technical security rudiments for industry-level DevSecOps integrating with cloud-native applications based on micro-services.
Site Reliability Engineering (SRE) refers to a set of practices incorporated into operations using the same approach used in software building.SRE implementation in a company fast track growth by providing seamless operations between the various teams in the organisation.
Kraken CI is a new Continuous Integration tool. It is a modern, open-source, on-premise CI/CD system that is highly scalable and focused on testing. It is licensed under Apache 2.0 license. Its source code is available on Kraken CI GitHub page.
It's pretty simple to configure EKS Fargate for running Tekton Pipelines, saves you the hassle of having to run nodes just for CI/CD pipelines.
In this Article, I will show you how to host your own Ghost Instance with Docker and use Traefik as a Reverse Proxy.
Here are five tools to level up your Kubernetes journey; no matter if you are just getting started or deep in the K8s, read on to see why I picked them. 🦮
We’ve been talking about DevSecOps and shift-left security for years. Although this approach probably didn’t “cross the chasm” in 2021, we did see some very telling milestones.
In this article we would revisit to see:
- Pre-requisites to configure on the kubernetes cluster deployed on GKE to connect from Jenkins
- Configuration/Plugins Required on the Jenkins
- How we can execute the simple manifest file ( Kind: Deployment/ Pod)
In this blog, I will be explaining the path that I’m following in my DevOps journey.
Continuous delivery (CD) workflows implemented Github Actions help deploy software, create and update cloud infrastructure, or make use of various services of cloud providers like Amazon Web Services (AWS). To do this, a workflow needs to authenticate itself to the cloud provider through credentials to gain access to those resources and services.