Feedback

Chat Icon

DevSecOps in Practice

A Hands-On Guide to Operationalizing DevSecOps at Scale

Setting Up the Foundation: Kubernetes Manifests
42%

Rewriting the Git History to Remove Sensitive Data

Error is human, and sometimes we may push sensitive data to the repository. If you have already pushed a sensitive file to the repository (e.g., menu-secret.yaml), you can remove it using filter-repo, a tool that allows you to rewrite the repository history:

cd $HOME/RestQR

# Install git-filter-repo on your machine
# Deactivate the virtual environment if you are using one
deactivate
# Launch the installation
pip install \
  git-filter-repo \
  --break-system-packages

# To complete remove the file from the repository history, 
# you need to run the following command:

DevSecOps in Practice

A Hands-On Guide to Operationalizing DevSecOps at Scale

Enroll now to unlock current content and receive all future updates for free. Your purchase supports the author and fuels the creation of more exciting content. Act fast, as the price will rise as the course nears completion!