Now that we have a process that automatically builds a container image whenever changes are committed to the git repository, we need a way to get those changes out, either into a development or test environment, or to the production environment. In the gitops world, a deployment is also initiated by a change to the […]
The first article in this series introduced our objective, which is to create an automated workflow that delivers code to a runtime environment once it has been committed to a Git repository. In this part we will look at the next step, which is to package the app so that it can be run in […]
Never Use Credentials in a CI/CD Pipeline Again
As someone who builds and maintains cloud infrastructure, I have always been leery from a security perspective of giving 3rd party services, such as CI/CD platforms, access to the resources. All the service vendors claim to take stringent precautions and implement foolproof processes, but still, vulnerabilities getexploited and errors happen. Therefore, my preference is to use tools […]
ICICI Bank has launched a new Twitter-based banking service, only the second such service in the world the bank proudly claims. That is two too many. Some things are meant to go together, but banking and social networking are not. While many news and tech sites in India reported on this feature, most outlets faithfully […]
When it comes to security, there is nobody that I trust more than Bruce Schneier. When it comes to being secure in my person and my rights, there is nothing I trust less than government, whether it is the US, Russia, Thailand or India.