Dive deep into components of distributed traces, why to use distributed tracing, considerations for implementing, and popular tools in the market today.
In this post, explore what observability and monitoring systems, the patterns of a good observability platform, and the observability subsystem may look like.
Introducing you to LocalStack to help you learn how to run AWS applications or lambdas on your local machine without connecting to a remote cloud provider.
In this article, I will describe how to run SSIS packages on an Azure-SSIS IR with a self-hosted integration runtime (self-hosted IR) configured as a proxy.
Azure documentation generator helps to efficiently generate Cloud Documentation of your Azure Subscription by interpreting your cost and resource information.
This article will help design and create Virtual Private Network using the VPC designer tool and cloud formation template. It also describes VPC components in detail.
Have you heard about SOPS? If you have already been in a situation where you needed to share sensitive information with your teammates, this is for you.
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Second case: an AWS secret is found in a private repository.
This article will compare the primary security key management services solution use cases among the Azure key vault, AWS KMS, Google CKMS, and other Cloud key management solutions.