Subject

Operations & Cloud

Secrets Management with Terraform

In this video, Scott Winkler shows you how to manage your secrets securely with Terraform.

Changing Data Classification through Processing

This is an excerpt from a draft of chapter 10 of my book, Azure Data Engineering, which deals with compliance. In this article we’ll look at a few techniques to transform sensitive user data into less sensitive data. In the book, this includes code samples for implementation on Azure Data Explorer, which are omitted from this article. Let’s start with a couple of definitions.

Securing Microservices with Istio Service Mesh

Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.

How to Run Docker Containers More Securely

Co-author of Docker in Action, Second Edition. and the designer of scalable software systems Stephen Kuenzli explains what are Docker containers and showcases how to run them securely.

Learn to Implement Cyber Security

From Making Sense of Cyber Security by Thomas Kranz

Learning from Incidents

From Operations Anti-Patterns, DevOps Solutions by Jeffery D. Smith

Cloud native development with Spring and Kubernetes

From Cloud Native Spring in Action by Thomas Vitale

Getting Up to Speed with Kubernetes — fast!

From Kubernetes Quickly by William Denniss

Fear of Deployments

From Operations Anti-Patterns, DevOps Solutions by Jeffery Smith

This article covers

Longer release cycles and their impact to the team’s deployment confidence
Automation techniques for deployments
The value of code deployment artifacts
Feature flags for releasing incomplete code

Running Containers in Kubernetes with Pods and Deployments

From Learn Kubernetes in a Month of Lunches by Elton Stoneman

This article delves into getting started running pods with controllers in Kubernetes.

© 2021 Manning — Design Credits