In this article, readers will get started with policy as code by writing an OPA (Open Policy Agent) policy for a Kubernetes environment with guide code.
SBOM is getting more and more important in the software supply chain. In this blog, you will learn what an SBOM is and how to build the SBOM in an automated way.
Learning how to use the ScyllaDB CDC source connector to push the row-level changes events in the tables of a ScyllaDB NoSQL cluster to a Kafka server.
This article covers the biggest difficulty with the JDBC sink connector: it requires knowledge of the schema of data that has already landed on the Kafka topic.
This article provides tips for implementing a Docker image security scanner and discusses practices other organizations use for reducing security incidents.
In this article, readers will learn how to cross-platform mobile app prototyping with Flutter and AWS Amplify, including guide code and helpful images.
In this article, readers will learn how to configure Spring Cloud Config to use a remote Git repository and refresh the clients’ configuration automatically.
This article describes how to set up a multi-account dashboard using CloudWatch cross-account observability for your AWS Organization using AWS Console.
In this article, walk through some considerations for implementing GitOps in your organization based on team size, composition, and state of your CI/CD tooling.
In this article, readers will learn how to provision an EKS cluster using Terraform and how Terraform Kubernetes deployment helps save time and reduce errors.
During day two of Dynatrace Perform, the company announced new products around observability and security to help make developers more productive and secure.
If you use Windows and want to monitor Windows Events, this article is for you. Readers will learn how to easily monitor Windows Events with OpenTelemetry.
In this article, readers will learn about SaaS, multi-tenant and single-tenant architectures, multi-tenant SaaS best practices, microservices, and more!
This article dives into the technical landscape and challenges that gave rise to the Aserto authorization system and the open-source projects it has built upon.
Cloud outages can be inconvenient, but by preparing for them, you can reduce their negative impacts. This article includes five crucial steps to prepare.