As demonstrated in the previous section, the Dev CD workflow created our environment, deployed the application, tested it, and attested application images. It then automatically
Category: Managing secrets
Release gating with pull requests and deployment to production – Securing and Testing Your CI/CD Pipeline
The process of pull request gating is straightforward. At the end of the Dev CD workflow, we’ll introduce a step to initiate a pull request
Setting up binary authorization – Securing and Testing Your CI/CD Pipeline-2
The YAML file performs several tasks, including the installation of gcloud and authentication with GCP. It also installs the gcloud beta CLI and, importantly, attests
Setting up binary authorization – Securing and Testing Your CI/CD Pipeline-1
As we’re using GitOps right from the beginning, we will use Terraform to set up binary authorization for us. We’ll start by setting up some
Generating the MongoDB Kubernetes Secret using External Secrets Operator – Securing and Testing Your CI/CD Pipeline
To generate the mongodb-creds secret, we would need to create the following resources:• A Secret resource – This is a standard Kubernetes Secret resource containing
Creating a Secret in Google Cloud Secret Manager – Securing and Testing Your CI/CD Pipeline
Let’s create a secret called external-secrets, where we will pass the MongoDB credentials in JSON format. To do so, run the following command: $ echo
Installing Anchore Grype – Securing and Testing Your CI/CD Pipeline
As we want to implement vulnerability scanning within our CI pipelines, let’s modify the mdo-posts repository we created in Chapter 11. Let’s clone the repository
Securing and testing CI/CD pipelines – Securing and Testing Your CI/CD Pipeline-2
CI/CD pipelines are one of the essential features of modern DevOps, and they orchestrate all processes and combine all tools to deliver better software faster,
Securing and testing CI/CD pipelines – Securing and Testing Your CI/CD Pipeline-1
With continuous cyber threats and the ongoing war between cybersecurity experts and cybercriminals, security has always been the top priority for most organizations, and it
Deploying the sample Blog App – Continuous Deployment/ Delivery with Argo CD
To deploy the sample Blog App, we need to define application resources. We’ve already discussed what our app is composed of. We have defined the