Technical requirements There are a few technical requirements that may need to be fulfilled if you want to get the most out of this chapter: Well, if you can get
Read MoreCategory: Scaling and autoscaling
Networking – The Simplest Ways to Start Using DevOps in Python Immediately
Networking No, this is not about growing your LinkedIn connections, although that’s something I’d recommend doing too. Computer networks are essential to the functioning of every application these days because
Read MoreScaling and autoscaling – Provisioning Resources
Scaling and autoscaling Scaling is the act of increasing or decreasing the size of a workload or resource depending on the demand for it. Autoscaling is doing this automatically based
Read MoreManaging Kubernetes with Python – Provisioning Resources
Managing Kubernetes with Python There will come a time in your container usage when Kubernetes will be the way that you need to go. At this time, Python can help
Read MoreTesting features on a subset of users – Manipulating Resources
Testing features on a subset of users When an application needs to implement a new feature and the application team wants that feature to be tested in a live environment,
Read MoreAnalyzing data – Manipulating Resources
Analyzing data I have found that – as an adult – I have increasingly become more and more responsible for myself. However, this responsibility and the person that I am
Read MoreRefactoring legacy applications – Manipulating Resources
Refactoring legacy applications A clean slate is one of the most convenient things in the world. I am going to show you two sheets of paper, and you can tell
Read MoreSecuring API keys and passwords – Security and DevSecOps with Python
Securing API keys and passwords API keys and passwords are valuable for the reason most things are valuable: they cost money and the data protected by them are valuable. If
Read MoreExtract and obfuscate PII – Security and DevSecOps with Python
Extract and obfuscate PII A person’s sensitive personal information is one of the most valuable things they have: financially, socially, and intimately. Compromising the security of this information can result
Read MoreRunning runbooks 2 – Security and DevSecOps with Python
We can now create a separate alarm for our test 1 instance and it will be shown graphically to give you an idea of what is happening with the metric
Read More