Week 22 - Issue #81
Portainer is a universal container management tool that can work with both Docker and Kubernetes to make the deployment and management of containerized applications and services easier and more efficient. Portainer enjoys over 650,000 users and 21,700 GitHub stars, so it's widely used and popular. It makes it an obvious management platform for admins and developers of all skill levels. Instead of having to build a complex manifest to include every aspect of the container, Portainer makes it easier to use the command line.
The Many Facets of Infrastructure are the many different services, processes, or considerations that go into running a single service in a thorough manner. Failing to understand the big picture and future direction of these facets can put availability, security, and velocity at risk. The goal of this blog post is to capture this exhaustive list of software infrastructure facets in order to help people identify gaps in their knowledge or infrastructure and make improvements. If you are in any field that is DevOps/SRE/Security/Developer adjacent, there is content in this post that is meant for you.
The Linux cheat command is a utility to search for and display example tasks you might do with a Linux command. Cheatsheets are just plain text files containing common commands. The main collection of cheat sheets is available at Github.com/cheat/cheatsheet. The Bash version of cheat downloads cheats sheets for you when you first run the command. The Go version uses a Yconfig file to define where each collection is located. The bash version uses the --fetch option to download the Bash version and install the Go version.
Contrast Security has made available a free security tool that enables developers to scan their code using the same core engine used by the cybersecurity team within their organization. Contrast Security's CodeSec is not just another freemium offering for developers that is a hobbled version of a commercial offering. It provides access to a command-line interface that makes it easier to integrate within the context of a DevOps workflow. Every vulnerability discovered by an application development team is one less for cybersecurity teams to ask developers to fix in a production environment.