In order to encrypt secrets and use them confidentially, best practices usually describe the usage of a tool like Vault. While Vault is a great tool, setting it up and working with it programmatically is not an easy task.
The success rate of startups in 2017 was 2.5%. According to last year’s statistics, 75% of US venture-backed startups fail. “Success” being translated to reaching the point of a successful sale.
DevOps is a term coined to describe the integration of software engineering and operations, which until recently were characterized by working in unbreakable silos, miscommunications and different motivations. As such, “DevOps” describes the methodology that allows such integration to happen.
You can quickly switch to any of your AWS accounts with a click of a button on a menu, listing them by name and color. Wanna learn how to configure that list in a couple of minutes?
ECS provides the freedom of scaling different services through adding “tasks”. These operate and communicate independently, and are being hosted on a series of EC2 instances. Scaling the system’s services in and out achieved with the help of CloudWatch metrics and alarms.
Deploying Fargate services is not as straight forward as you may think, especially if you’re used to the current EC2 configuration and are now trying to migrate running services.
Using one product, deployed correctly, you can improve your company’s work methods, speed up software delivery, reduce errors, avoid maintenance and create a self healing CI system that is scalable, agile and customizable.
Last year, I’ve found my client’s AWS account access and secret keys pushed to git, and visible in 23 different locations in the application’s codebase. After requesting an immediate removal, I used the awesome GitLeaks tool to scan the projects history.
Where do you store your application secrets? I usually get one of two answers, either they thought I was talking about a user password manager like 1Password or LastPass, or I get really weird answers like Google Drive, AWS S3, environment variables in the code etc.