Welcome to curated list of handpicked free online resources related to IT, cloud, Big Data, programming languages, Devops. Fresh news and community maintained list of links updated daily. Like what you see? [ Join our newsletter ]

Best Kubernetes certifications for 2023 [ranked]

Categories

Tags kubernetes containers learning how-to cio devops

Looking for the best Kubernetes certification? In this guide, I explained the best Kubernetes certification along with other free choices, so you can choose the best one for you. Kubernetes is growing in popularity day by day. A survey conducted by Cloud Native Computing Foundation (CNCF) reported that 96% of the respondents are either using or evaluating Kubernetes. By Bibin Wilson.

Engineers getting certified on Kubernetes are also growing at a rapid pace. A report by Kube Careers shows that Kubernetes Certifications stand in second place in the list of popular certifications.

Let’s take a look at each Kubernetes certification and see which one is right for you:

  • Certified Kubernetes Administrator (CKA)
  • Certified Kubernetes Application Developer (CKAD)
  • Certified Kubernetes Security Specialist (CKS)
  • Kubernetes and Cloud Native Associate (KCNA)
  • Certification cost
  • How to register for Kubernetes certification?
  • Which is the popular Kubernetes certification?
  • Kubernetes certified engineers salary stats

As per the latest kube.careers Kubernetes job trends report data, the salary range is between $129,802 & 179,520. And the highest salary reported is between $275,000-319,000. LinkedIn search returned 124,565 results for Kubernetes jobs in the USA. In that for salaries more than $10000, it’s returned 28000 results. And for salaries above $200000, it returned 302 results.

The Linux Foundation CKA is a sought-after Kubernetes certification. CKA is a widely accepted certification that showcases a candidate’s Kubernetes administration and management skills. You will also gain a competitive advantage over peers without the certification as recruiters and organizations are looking for certified professionals. Good read!

[Read More]

Security on the web

Categories

Tags servers web-development infosec app-development browsers

Websites contain several different types of information. Some of it is non-sensitive, for example the copy shown on the public pages. Some of it is sensitive, for example customer usernames, passwords, and banking information, or internal algorithms and private product information. By @mozilla.

Security and privacy are distinct topics, but they are also closely-related. It is worth knowing the difference between the two and how they relate. In this guide you will find info on:

  • Relationship between security and privacy
  • Security services provided by browsers
  • Security considerations for client-side developers
  • Store client-side data responsibly
  • Protect user identity and manage logins
  • Don’t include sensitive data in URL query strings
  • Enforce usage policies
  • Maintain data integrity
  • Sanitize form input
  • Protect against clickjacking

… and more. Handling data responsibly is largely concerned with cutting down on cookie usage and being careful about the data you store in them. You should prepare for the removal of cross-site cookies by limiting the amount of tracking activities you rely on and/or by implementing desired information persistence in other ways. Excellent read!

[Read More]

How IKEA Retail standardizes docker images for efficient machine learning model deployment

Categories

Tags docker software web-development containers app-development

What do Docker and IKEA Retail have in common? Both companies have changed how products are built, stored, and shipped. In IKEA Retail’s case, they created the market of flat-packed furniture items, which made everything from shipping, warehousing, and delivering their furniture to the end location much easier and more cost effective. This parallels what Docker has done for developers. Docker has changed the way that software is built, shipped, and stored, with Docker Images taking up much less space “shelf” space. By Karan Honavar, Fernando Dorado Rueda.

The article then does a good job to explain:

  • Standardization deployment process via Docker
  • Model training and simple evaluation
  • Model class creation
  • Testing model locally
  • Encapsulating the model into a Docker image
  • What is Docker’s role in MLOps?
  • Dockerfile creation
  • Building and pushing Docker image
  • Deploy ML model using Docker: Unleash it into the world

… and more. Plenty of screenshots and each step explained. At IKEA Retail, Docker has become an indispensable element in our daily MLOps activities, serving as a catalyst that accelerates the development and deployment of models, especially when transitioning to production. The transformative impact of Docker unfolds through a spectrum of benefits that not only streamlines our workflow but also fortifies it via standardization, compatibility, isolation, security. Nice one!

[Read More]

What are docker image layers and how do they work?

Categories

Tags docker software learning containers app-development

Docker is a widely used containerization platform that enables developers to run and manage applications inside containers. One of the key components of Docker is the Docker image, which acts as a blueprint for creating containers. By Hemanta Sundaray.

This guide then explains:

  • Prerequisites
  • Building a Docker Image
    • Analyzing Docker Image Build Steps
  • Viewing Docker Image Layers
    • Using the docker history command
    • Using the docker inspect command
  • Understanding Docker Image Layer Cache

In this blog post, you learned about Docker image layers, docker image layer cache, and how Docker leverages caching to speed up the build time. Armed with this understanding, you’re now well-equipped to use Docker more efficiently. There are screengrabs and commands explained so you can follow the tutorial easily. Good read!

[Read More]

A beginner's guide to behavior-driven development (BDD)

Categories

Tags tdd software learning infosec

BDD is the next step in the evolution of Test-Driven Development (TDD). It shifts the focus from thinking in tests to thinking in behavior. Imagine transitioning from assembling puzzle pieces to crafting a compelling story. BDD integrates various aspects of software development into a coherent narrative, fostering better communication and collaboration. By Rustam Sabirov.

In this article you will find:

  • Introduction: What is behavior-driven development?
  • How does behavior-driven development work?
  • Writing test scenarios in Gherkin syntax
  • The “Given When Then” approach
  • Examples
  • Advantages of behavior-driven development
  • Disadvantages of behavior-driven development
  • Behavior-driven development requires a strategic approach

… and more. Behavior-Driven Development introduces a profound paradigm shift in software development, fostering enhanced collaboration and a shared understanding among stakeholders. Its “Given When Then” approach, analogous to a structured recipe, delineates the software’s behavior in a comprehensible manner. Nice one!

[Read More]

Security considerations for your internal developer platform

Categories

Tags cio software-architecture devops infosec

In today’s world, where cloud resources and data management tools play an increasingly critical role, the concept of an Internal Developer Platform (IDP) is gaining momentum. With great power comes greater responsibility. Security within IDPs isn’t just an optional add-on; it’s the core essence. This article is a guide for teams eager to strengthen their developer platforms. By Morgan Perry.

Whether you’re new to the IDP environment or a seasoned developer, our objective remains unchanged: to arm you with the knowledge to transform your developer platform into an impenetrable fortress.

Further in the article:

  • The priority of security in IDPs
  • Robust access control and user authentication
  • Ensuring data security and encryption protocols
  • Key security measures for internal developer platforms
  • How to build a security-centric culture

Security is of utmost importance if you are building an Internal Developer Platform. It is not just a collection of some best practices to follow. It is a mindset that you need to adopt. In this article, we have discussed all the security-related aspects of IDPs, including access control, data security, network protection, real-time monitoring, etc. Nice one!

[Read More]

Scanning Terraform code with Checkov: Comprehensive guide

Categories

Tags kubernetes containers learning how-to devops infosec

Learn how to enhance your Terraform code’s security by using Checkov for scanning. Our step-by-step guide walks you through the process, ensuring your infrastructure is secure and compliant. By Arun Lal.

As we discuss the growth of Infrastructure as Code (IaC), we encounter challenges related to security, quality, and testing, which are also critically important. To address these concerns, we can utilize static code analysis tools like Checkov.

This guide then covers:

  • Infrastructure as code
  • The need for IAC code analysis
  • Checkov integrate with Terraform
  • Checkov setup
  • How to use custom policies?
  • Checkov report
  • Hard and soft fail

Most organizations have their own coding standards and regulations. When a developer writes a code, it should meet the organization’s criteria. For example, tags, proper descriptions, directory structure, etc. Compliance is also very important for organizations. It helps to avoid unnecessary resource provisioning in cloud environments. For example, in AWS different types of EC2 instances are available, and each instance’s costs are different. If someone provisions R5d.xLarge instance without the necessity, it will lead to excessive expense.

Combining these tools simplifies safer infrastructure provisioning in cloud environments, we can simply use this tool to scan the Terraform code or can integrate with CI/CD tools to automate the scanning process. Good read!

[Read More]

How to stream JSON data using server-sent events?

Categories

Tags python programming web-development app-development event-driven

Server-Sent Events (SSE) is a simple and efficient technology for sending real-time updates from the server to the web browser over a single HTTP connection. By @workfall.com.

In this blog, authors will cover:

  • What are server-sent events?
  • Why stream data using server-sent events (SSE)?
  • What is FastAPI?
  • Hands-on

FastAPI is a modern, high-performance web framework for creating Python APIs using standard type hints. Its performance is comparable to NodeJS and Go, owing to Starlette and pydantic.

In this hands-on project, we learned about using Server-Sent Events to smoothly stream JSON data using FastAPI. We started by making a new project using PyCharm IDE and putting in the necessary stuff we need. Then, we got FastAPI set up in our project. Excellent guide!

[Read More]

How to develop APIs with Django REST framework [Step-by-step guide]

Categories

Tags restful learning app-development python

In this article, we’ll talk about how develop APIs with Django REST framework by step by step. Author believes this is going to be useful for all beginner Django developers, as REST APIs are used in every application or piece of software to connect the backend and frontend parts. If you master this, you can build all kinds of products. By Oleg Kovalyov.

Many frameworks allow you to easily build APIs for blog applications, but we will use only one – the Django REST framework (DRF). It’s convenient in many ways.

You will find further information in the article on:

  • Why use the Django REST framework?
  • Difference between Django and Django REST framework
  • The step-by-step guide to your API in Django
  • Test-driven development (TDD) of APIs
  • Browsable API
  • Which famous companies are using Django REST framework?

If you still have questions and would love to learn more, there’s plenty of great Python Django REST API tutorials and resources for self-improvement. Here’s a reading list authors highly recommend. Nice one!

[Read More]

Analysis of Istio Service Mesh

Categories

Tags kubernetes containers web-development app-development devops

Istio is a leading service mesh solution with a proven track record of successful use cases in production. The Istio community is prolific, dynamic, and continues to introduce new features very frequently. Istio is possibly the most feature-rich solution on the market and has a mature ecosystem of tools and vendors. By Kamesh Chauhan.

The article pays attention to:

  • Service mesh comparison
  • Istio architecture
  • Heart of Istio – Envoy (sidecar)
  • Istio features
    • Intelligent routing and load balancing
    • Resilience across languages and platforms
    • Service identity and security
    • In-depth telemetry and reporting
  • Enable Istio in the Mesh

Comparing service mesh to existing systems identifies the clear benefits of new designs. It describes new applications of existing architectures, and highlights effective new configurations to evolve future development and productivity. Nice one!

[Read More]