💻 sh vs Zsh vs Bash Built-in Commands Comparison
This table compares the built-in commands available in the original Bourne Shell (sh), Z Shell (Zsh), and Bourne Again Shell (Bash). Commands are organized alphabetically with notes on key differen...
This table compares the built-in commands available in the original Bourne Shell (sh), Z Shell (Zsh), and Bourne Again Shell (Bash). Commands are organized alphabetically with notes on key differen...
Virtual Private Networks (VPNs) were originally designed to let employees securely connect to their company’s internal network from anywhere. Over time, however, “VPN” has also become a consumer te...
DevSecOps means thinking about application and infrastructure security from the start. It also means automating some security gates to keep the DevOps workflow from slowing down. Relevant GCP ...
Intro The Terms of Use and Privacy Policy are two of the most essential documents for any commercial software product. Terms of Use What it is A Terms of Use is a contract between the software ...
The list of GCP Products Products and Services GCP Machine types Machine families resource and comparison guide - Compute Engine Documentation Permission matrix of GCP Products (IAM) ...
Check your IAM policies for personal email accounts 🟨 Ensure that MFA is enabled for all user accounts 🟥 Ensure Security Key enforcement for admin accounts 🟥 Prevent the use of user-managed s...
Karpenter Best Practices Use Karpenter for Dynamic Workloads Run Karpenter Controller on EKS Fargate or a Dedicated Node Group Exclude Unnecessary Instance Types Enable Interruption Handl...
Best Practices Avoid the use of the “default” security group Keep the number of security groups to a minimum Restrict, restrict, restrict Simplify management Develop and enforce a securi...
AWS IAM (1) IAM policies should not allow full “*” administrative privileges (2) IAM users should not have IAM policies attached (3) IAM users’ access keys should be rotated every 90 days or les...
Introduction Monitoring is a crucial part of DevOps. As a tech start up grows, we aim to better prepare our organization for enterprise customers who prioritize software reliability and service. O...