As part of an organization’s automated Release pipeline, it is important to include security scans and report on the results of these scans. One tool used in the industry is the OWASP Zed Attack Proxy (ZAP).
One of the best practices with containers is not to persist data inside the containers for long term as containers are ephermal. These containers can be removed and rebuilt very often and may require storage that persists across pods beyond the application lifecycle. In this blog post, we will learn about how to create Persistent Volumes in AKS with Azure Files.
This post is the next in a series of Docker posts from Premier Developer consultant Monu Bambroo. In this post, Monu walks through setting up a Web API to leverage Kubernetes for managing secrets.
One of the common tasks in application development is to manage configurations.