How to install KubeSphere, a container platform running on top of Kubernetes with streamlined DevOps workflows, unified multi-cluster management, and more.
Hello Muleys, Here's another interesting article on how to restrict additional queryParams and headers that are sent other than those defined in RAML. We all do the test if the required parameters are working fine or not but we forget to test if unnecessary parameters sent along with required parameters. What happens if unwanted parameters are sent? There are chances that attackers might send some thousands of queryParams and Headers with large content. In that case, your application will crash. So what to do? Here's the solution: I have designed a basic RAML with the below resource : When you download the RAML and generate flows, There's an option to restrict additional parameters or headers in APIkit Router Module configuration : By default the configuration is disabled. You have to enable the strict validation config as below: Now your application will not be allowed to pass additional fields: Removing unnecessary fields will give a successful response: Check out this video for the live demo:
Right now, Apache Kafka utilizes Apache ZooKeeper to store its metadata. Managing a ZooKeeper cluster creates an additional burden on the infrastructure and the admins.
You can use an Azure Front Door to route to both the UI domain and the API to eliminate the (OPTIONS) request; calls from the browser will be directed to the same-origin as the UI.
Learn how to prevent security issues and optimize containerized applications by applying a quick set of Dockerfile best practices in your image builds.
We use CIDR ranges for security-related things. Like to secure the traffic in terms of IP addresses. Usually, it helps us in defining the IP address range.
What does it take to become an SRE from a SysAdmin background? We discuss the growth areas and technical skills needed to successfully transition to an SRE role.
The need for Backup and Disaster Recovery is as important as ever. We cover some of the core reasons why deploying a backup solution is critical for safety and scale.