What is DRP and what are the possibles technical solutions to implement it?

What is DRP and what are the possibles technical solutions to implement it?

Building a Disaster Recovery Plan can be long and tedious, here are some tips to help you understand and organize your plan!

Complex Gitlab pipelines

Complex Gitlab pipelines

Deploy complex environments using Gitlab pipelines with multi-project dynamic pipelines, downstream jobs, and artifact management.

How to pentest AWS Cognito? Attack and remediation explained

How to pentest AWS Cognito? Attack and remediation explained

So, you are pentesting a website, and it uses AWS Cognito. But you don’t know what is this service nor how to abuse it? Let's see how to pwn it!

Secure your authentication to your data warehouse with SSO and Snowflake

Secure your authentication to your data warehouse with SSO and Snowflake

You don’t know what kind of service you want to use for your data warehouse? Learn why you might consider using Snowflake with SSO!

Secure your Azure cloud with a private hub and spoke infrastructure

Secure your Azure cloud with a private hub and spoke infrastructure

Secure your Azure cloud with a private hub and spoke infrastructure with private endpoints, private DNS, Azure policy, and private DNS resolver.

How to use Renovate to maintain your project dependencies

How to use Renovate to maintain your project dependencies

Keeping your dependies up to date is what will sustainbaly maintain your repositories. Learn about Renovate, a tool perfect to do so!

Beautiful Makefile help messages with awk

Beautiful Makefile help messages with awk

Prettier Makefiles are not only nice for the eyes, but also a great use case for awk.

How to use Crossplane on Kubernetes to build your cloud infrastructure

How to use Crossplane on Kubernetes to build your cloud infrastructure

You are familiar with Kubernetes and need cloud infrastructure for your business? Check out why Crossplane might be the tool for you!

How to encrypt data at rest with a Customer Managed Key with Terraform

How to encrypt data at rest with a Customer Managed Key with Terraform

Find out how to create a Customer-Managed Encryption Key (CMEK) with Terraform and use it to encrypt data at rest in some GCP services.

Securely access your system from anywhere with Hashicorp Boundary

Securely access your system from anywhere with Hashicorp Boundary

Hashicorp Boundary: discovering, evaluating and diving into its concepts from a Site Reliability Engineer perspective.

Quick introduction to ArgoCD ApplicationSet

Quick introduction to ArgoCD ApplicationSet

Have you ever realized that your ArgoCD applications' manifests all look the same? But you keep managing a ton of those? Here comes the ApplicationSet!

IAP based access to GCP private bastion and APIs

IAP based access to GCP private bastion and APIs

How can you prevent anyone to access your non production environment, while still being able to access them yourself? Find out how to do so using GCP IAP!

How to securely manage your SSH keys with KeePassXC

How to securely manage your SSH keys with KeePassXC

Learn how you can securely and easily manage all of your SSH Keys by using KeePassXC to load them into your SSH Agent!

A new decentralized solution for data management: the data mesh

A new decentralized solution for data management: the data mesh

When dealing with sensitive data management, decentralized solutions have been favoured. Discover now the data mesh!

Test and validate your Helm Charts in Kubernetes

Test and validate your Helm Charts in Kubernetes

Writing templates to render Kubernetes manifests can be a painful experience, even more when you are refactoring your Helm Chart.

Secure your Github Actions deployments on GCP with Identity Federation

Secure your Github Actions deployments on GCP with Identity Federation

Learn how you can manually set up Identity Federation, and how doing it with Terraform can allow Github Actions to access your GCP resources.

The Cloud behind the scenes: how magic is it really?

The Cloud behind the scenes: how magic is it really?

Ever wondered how VMs are magically born into the cloud? Well, it is no magic, only science, and engineering. If you want a peek into the machinery, tag along!

How to manage access and permissions to your Kubernetes Cluster in AWS (EKS)

How to manage access and permissions to your Kubernetes Cluster in AWS (EKS)

Here is a really simple tutorial to manage access and permissions in an AWS Kubernetes cluster (EKS) using AWS roles and Kubernetes resources.