In this video, Scott Winkler shows you how to manage your secrets securely with Terraform.
This is an excerpt from a draft of chapter 10 of my book, Azure Data Engineering, which deals with compliance. In this article we’ll look at a few techniques to transform sensitive user data into less sensitive data. In the book, this includes code samples for implementation on Azure Data Explorer, which are omitted from this article. Let’s start with a couple of definitions.
Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.
From Making Sense of Cyber Security by Thomas Kranz
From Operations Anti-Patterns, DevOps Solutions by Jeffery D. Smith
From Cloud Native Spring in Action by Thomas Vitale
From Operations Anti-Patterns, DevOps Solutions by Jeffery Smith
This article covers
Longer release cycles and their impact to the team’s deployment confidence
Automation techniques for deployments
The value of code deployment artifacts
Feature flags for releasing incomplete code
From Learn Kubernetes in a Month of Lunches by Elton Stoneman
This article delves into getting started running pods with controllers in Kubernetes.