Subject

Operations & Cloud

Istio Ingress Gateway

A Chief Architect of cloud applications at Red Hat, Christian Posta, demonstrates why it’s important to have very fine-grained control over what traffic enters your service-mesh cluster and how to use the Istio Gateway to do this.

Secrets Management with Terraform

In this video, Scott Winkler shows you how to manage your secrets securely with Terraform.

Changing Data Classification through Processing

This is an excerpt from a draft of chapter 10 of my book, Azure Data Engineering, which deals with compliance. In this article we’ll look at a few techniques to transform sensitive user data into less sensitive data. In the book, this includes code samples for implementation on Azure Data Explorer, which are omitted from this article. Let’s start with a couple of definitions.

Securing Microservices with Istio Service Mesh

Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.

How to Run Docker Containers More Securely

Co-author of Docker in Action, Second Edition. and the designer of scalable software systems Stephen Kuenzli explains what are Docker containers and showcases how to run them securely.

Learn to Implement Cyber Security

From Making Sense of Cyber Security by Thomas Kranz

Learning from Incidents

From Operations Anti-Patterns, DevOps Solutions by Jeffery D. Smith

Cloud native development with Spring and Kubernetes

From Cloud Native Spring in Action by Thomas Vitale

Learn to Run Data Infrastructure on Azure

From Azure Data Engineering by Vlad Riscutia

Getting Up to Speed with Kubernetes — fast!

From Kubernetes Quickly by William Denniss

© 2021 Manning — Design Credits