Best Practices for Creating Your Own Webhooks

Webhooks have become a popular way for different pieces of software to communicate with each other and are now an industry standard. As events drive most of the web, this concept has become more relevant because, unlike an API that awaits requests, webhooks actively send data and alerts whenever triggered. Using webhooks speeds up integration. […]

How to Configure x.509 Certificates for MongoDB Databases

At the enterprise level, x.509 certificates power many user-, device-, and site-authentication processes. In fact, we can provide secure access to infrastructure, including databases, using short-lived x.509 certificates over TLS/SSL traffic. This article describes how to easily configure x.509 certificate authentication for MongoDB. Configuring x.509 Certificates for MongoDB We’ll demonstrate x.509 authentication for a self-hosted […]

How Edge Computing Enhances Mobile App Usability

Every day, the nexus between our digital and physical selves grows closer. This is aided by the ubiquity of our “always-on” connected selves, made possible through our smartphones. Tech vendors and telcos have been long heralding the future of the 5G network as the savior of IoT-connected devices and mobile connectivity. But global or even […]

Optimizing Delivery with Actionable Insights

Software delivery has always been difficult to manage. There are many moving parts involved in understanding the customers’ needs and translating these needs into technical considerations like latency, errors, security, and speed of delivery. Modern software development is about people, processes, and tools. DevOps and Agile processes speed the software development throughput. They generally rely […]

Using Conjur Secrets in Containerized Ansible Tower Applications

The Ansible Tower integration with CyberArk Conjur allows users and administrators to map sensitive credentials (like passwords, SSH private keys, and the external values of secrets stored) in a secrets management system instead of providing them to Ansible Tower directly. Secrets management refers to the operations and systems that we use to protect our access […]

Setting up Conjur on OpenShift

Red Hat OpenShift is a Kubernetes-based platform for container orchestration. OpenShift differentiates itself from Kubernetes through features such as tight integration with Red Hat Linux, long-term enterprise support, and its platform as a service (PaaS) offering. Whether you’re using OpenShift or Kubernetes to manage your infrastructure, you need to consider some general security limitations to […]

Using the Conjur Secretless Broker with Kubernetes

This article provides a hands-on walkthrough demonstrating how to use the Conjur Secretless Broker in a Kubernetes cluster using the Secretless Broker Sidecar. We’ll begin by going through the steps to set up the Conjur Secretless Broker in a Kubernetes cluster. Note that an administrator generally performs these steps. Then, we’ll demonstrate how to add […]

Where to Begin with Cost Optimization for Google Cloud Platform

Most businesses are moving their applications to the cloud in an effort to create more flexible, scalable, and cost-effective systems. However, without appropriate cost management strategies, these businesses often find themselves over their cloud spend budgets. By late 2020, 35% of small and medium businesses had spent between $600,000 and $1,200,000 on cloud bills for […]

Using Hazelcast in an ASP.NET Core Application

Hazelcast is an open-source in-memory computing product. It provides caching, distributed processing, and distributed messaging with excellent speed, scalability, and security. In-memory data grids (IMDGs) allow applications to quickly perform big data operations compared to conventional databases and data store technologies. This article demonstrates how to install and set up a local Hazelcast cluster that […]

Understanding Kubernetes Resource Types

Before we dive into Kubernetes resources, let’s clarify what the term “resource” refers to here. Anything we create in a Kubernetes cluster is considered a resource: deployments, pods, services, and more. However, Kubernetes’s primary resources are CPU and RAM. Kubernetes also includes some other resource types, like ephemeral storage and extended resources. One aspect of […]