The latest News and Information on DevOps, CI/CD, Automation and related technologies.
Secrets, by definition, should be kept secret, whichever tool you’re using. While there are plenty of best practices for keeping your Kubernetes secrets actually secret, there are some loopholes that can compromise their security, and might be taken advantage of by malicious entities. This post will cover prevalent best practices for securing your secrets on Kubernetes along with some new approaches for secrets management.
A product’s user experience consists of the before, during, and after of a user’s interactions with it, or more precisely, their expectation, satisfaction, and fulfilment. Experience can be influenced by anything from marketing materials, product reviews, interaction with sales, through to cost, installation and onboarding process, product stability, post-sales support, and numerous other factors. So it’s clear that creating a positive experience is a collective responsibility.
One of the reasons companies practice Chaos Engineering is to prevent expensive outages in retail (or anywhere, for that matter) from happening in the first place. This blog post walks through a common retail outage where the checkout process fails, then covers how to use Chaos Engineering to prevent the outage from ever happening in the first place. Let’s dive in. Maybe you’ve been there.