Technical requirements There are a few technical requirements that may need to be fulfilled if you want to get the most out of this chapter: Well, if you can get
Read MoreCategory: Securing API keys and passwords
Exercise 2 – generating a routing table for your device – The Simplest Ways to Start Using DevOps in Python Immediately
Exercise 2 – generating a routing table for your device Routing tables define the routes that certain web traffic takes within your devices. These tables exist in practically every device,
Read MoreAutoscaling with Python based on a trigger – Provisioning Resources
Autoscaling with Python based on a trigger Autoscaling requires automating the process of increasing the available compute resources according to some sort of metric or statistic. In order to autoscale,
Read MoreEvent-based resource adjustment – Manipulating Resources
Event-based resource adjustment Resources are money. Literally. In the world of DevOps, the norm is that the more resources you use, the more money that you spend. That’s simple enough,
Read MoreTesting features on a subset of users – Manipulating Resources
Testing features on a subset of users When an application needs to implement a new feature and the application team wants that feature to be tested in a live environment,
Read MoreAnalysis of historical data – Manipulating Resources
Analysis of historical data Live data can help us make adjustments; they are tactical. But to be truly strategic – to think about the big picture and to think long
Read MoreOptimize – Manipulating Resources
Optimize Your first option is optimization. You can look at what you have right now and make sure that it runs optimally, consuming the optimum amount of resources while being
Read MoreSecuring API keys and passwords – Security and DevSecOps with Python
Securing API keys and passwords API keys and passwords are valuable for the reason most things are valuable: they cost money and the data protected by them are valuable. If
Read MoreIncident monitoring and response – Security and DevSecOps with Python
Incident monitoring and response How would one define an incident? Well, let me posit this to you: what would you do if a bear attacked you? Does this sound stupid?
Read MoreRunning runbooks 2 – Security and DevSecOps with Python
We can now create a separate alarm for our test 1 instance and it will be shown graphically to give you an idea of what is happening with the metric
Read More