Browsing Tag
				
			devops
			448 posts		
		
Kubernetes-Style Scan Scheduling Comes to Security Tools (JMo Security v0.8.0)
						Running security scans manually gets old fast. You start with good intentions — “I’ll scan every Friday before…					
				
							
						Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails
						🔖 Overview This document outlines the AWS account structure, governance, and control strategy used across our organization. It…					
				
							
						🏡 Why I Built My Own Homelab to Run Kubernetes
						Hey everyone 👋 If you have been following my posts, you might have noticed that I have been…					
				
							
						I Spent 24 Hours Hardening My Stack (and Somehow Made It Friendlier Too)
						I spent the whole day fixing up my backend systems; with the associated front-end accoutrements, as they say.…					
				
							
						Your Infrastructure Will Never Be Idempotent (and That’s OK)
						The promise of infrastructure automation is seductive. Run the same configuration once, run it a thousand times, and…					
				
							
						Decommissioning the Dinosaur: A 4-Phase Playbook for Migrating Your Legacy Data Warehouse to Databricks
						Let’s talk about the dinosaur in your server room. It’s not a fossil, but it might as well…					
				
							
						The Illusions of Quality — Episode 9: 🔨 The Toolsmith, Not the Tool: A Tester’s Role in Modern DevOps
						The shiny new testing suite wasn’t bought because it was the best. It was bought because the vendor…					
				
							
						Speed up Docker image builds with cache management
						Over the past few years I have been working in multiple IT projects where the Docker platform was…					
				
							
						Vector’s VRL introduction (chapter 1)
						Preface There is a program to process events (metrics, logs, traces) from different sources (files, scripts, scraping, HTTP…					
				
							
						How do you get your dev team to shift left by themselves for real?
						Shift-left doesn’t start with scanning the code for security vulnerabilities; it begins with designing it. Play yourself secure…					
				
							
						 
						 
						 
						 
						 
						 
						 
						