pardon my Swag(ger)!

Discove the possibilities — Photo by Nadine Shaabana on Unsplash

The OpenAPI Specification (OAS) defines a standard that allows the discovery of service by humans and computers without requiring access to the source code or documentation or the traffic patterns. The ultimate goal of the specification is to make interaction with the service convenient with minimal code. An advantage of the OpenAPI Specification is that rewriting existing APIs is not required. All one has to do is describe the service’s capabilities in the OpenAPI Specification structure, allowing prospective users to interact with the API from the browser and test it without writing complicated logic.

OAS allows a…


And 3 ways of passing values to variables in your terraform code

Terraform variables help define server details without having to remember infrastructure-specific values. They are similarly handy for reusing shared parameters like public SSH keys that do not change between configurations. In a computer program, variables have multiple purposes. Variables are used to store information in a program that can be accessed and modified if need be. Variables have numerous purposes. It also serves to label data with a name that can be understood clearly by readers of the program. The same applies to Terraform as well.

As part…


In case of attack, break the glass and pull cables!

Photo by Liam Tucker on Unsplash

The most common access control method that allows access to a website’s public area is Anonymous access. It allows a user to access a website’s public space without providing a user id and password. Similarly, anonymous authentication allows users to access APIs without having to provide any means of authentication. Public websites use anonymous authentication to call the backend APIs to gather dynamic content to serve their user base.

As far as consuming APIs is concerned, there are three means of authentication.

  1. Basic Auth, which represents using user id and password.
  2. API Key requires one to pass a unique key…


What is SOC2?

Two-thirds of the Earth’s surface is covered with water. The other third is covered with auditors from headquarters — Ralph Norman Augustine

Photo by Stephen Dawson on Unsplash

Service Organization Control 2(SOC 2), pronounced as sock two, is an auditing procedure that ensures that service providers securely manage your data to protect your organization’s interests and the privacy of its clients. SOC 2 compliance is a minimal requirement for security-conscious businesses when considering a SaaS provider and is industry agnostic. SOC 2 is ubiquitous in the B2B space and provides information security and privacy assurance to 3rd party providers. The majority of companies…


I mount my soul at /dev/null

Photo by Markus Spiske on Unsplash

Globbing patterns or pathname expansions are commonly referred to as wildcards in a *nix based operating system. The presence of one of the characters ‘?’, ‘*’ or ‘[‘ in a string is referred to as a wildcard pattern. Pathname expansions expand the ‘*’, ‘.’ or the ‘?’. The operation that expands said wildcard pattern into a list of pathnames is called Globbing. We use this almost every day without realizing it. For example,

When using wildcards, one needs to remember the following.

  • A ‘?’ (not between brackets) matches any single character.
  • A ‘*’…


A DevOps engineer walks into a bar…

Photo by chuttersnap on Unsplash

Docker is the de facto standard among container platforms. Like any software system, developers are proactively working to improve Dockers’ usage and performance. As a result , the commands are always evolving, leading to more efficient commands or deprecations. There are numerous articles about the topmost Docker commands that programmers should know. In this article, I present to you three of them that every operations engineer utilizing Docker should know.

1. Docker events

The events differ based on the Docker object type. There are two types of Docker events — local scoped and swarm scoped. Solely on the node that the event takes…


7 basic docker command to getting your hands dirty

Photo by Branimir Balogović on Unsplash

This is the second of a series of articles that acts a complete guide on how to start your containerization journey using Docker. To read the first, please visit the following link.

Dockerfile


a little, hopefully not too late!

The de facto standard for building containers and containerized applications is Docker. Since Docker’s inception, there have been a ton of articles about Docker, its architecture, and the differences between Docker and virtual machines. Even though these articles educate developers on the underlying architecture, they don’t leave the engineer well versed in using Docker efficiently. This article and the next few are an effort to provide less about the underlying architecture and more hands-on Docker.


https://dilbert.com/strip/1995-11-17
https://dilbert.com/strip/1995-11-17

In today’s world, there are ample solutions for a database. The easiest one to install and use is PostgreSQL. This article walks you through installing PostgreSQL on a MacbookPro, creating a user, database and, granting privileges to the freshly created user. Later we will create a schema and add an example table to this schema.

The easiest way to install PostgreSQL is to download the DMG from postgres.org. Another way is to install is using homebrew. I use homebrew to manage most of my software. Just run the following command.

prompt>> brew install postgres
....
To have launchd start postgresql now and…

Mukund Krishnan

Almost in motion, the Future is!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store