Volunteers (hangs around EngineersMY slack)
https://engineers.my/
Monthly meetup announced on meetup.com
Get in touch via meetup.com
or
Slack us to volunteer / speak / sponsor
DevKami curated meetups: https://devkami.com/meetups/
KL meetups by Azuan (@alienxp03): http://malaysia.herokuapp.com/#upcoming
If you got an email you should:
- Change your password on https://hub.docker.com
- Check https://github.com/settings/security
- Reconnect oauth for Automated Builds
- Roll over effected passwords and API keys stored in private repos / containers
Quick take:
- Password hashes
- Github tokens
- Bitbucket tokens
- Your Automated Builds might need new tokens
Our DNS update mangled domain records, says Microsoft.
Azure, Microsoft 365, Dynamics, Power BI, DevOps, all down for nearly two hours.
ArticleFew hours
Sites depending on Calendar API down. Coz google won't go down right?
ArticleAlso check out PowerToys!
Kubernetes Tools that follow Unix philosophy to be simple, modular, and extensible
Your k8s project name ideas:
… The transfer cost from S3->Glacier is absolutely insane ($0.05 per 1,000 objects).
I managed to generate $11k worth of charges doing a "small" test of 218M files and a lifecycle policy. Only use glacier for large individual files. — HN
Serverless==Functions
(Still have to think about API Gateways, DBs, etc)Terraform state files are normally generated locally where you run the scripts. This is fine for small scale deployments and testing. A problem arises when you involve multiple people, teams and even business units.
A remote state file will always contain the latest state deployed to your account and environment, stored within S3. Including DynamoDB brings tracking functionality so that concurrent use of the state file will be blocked or “locked”.
Site
documentation_complete: false
name: AWS Implementation
schema_version: 3.0.0
references:
- name: SC Policy
path: https://github.com/opencontrol/freedonia-aws-compliance/wiki/Security-Controls
type: URL
satisfies:
- control_key: AU-2
standard_key: NIST-800-53
covered_by: []
implementation_status: none
narrative:
- text: |
AU-2 - Audit Events
All AWS events are sent to AWS CloudWatch.
This is implemented with our Terraform build using the
`aws_cloudtrail` resource (https://www.terraform.io/docs/providers/aws/r/cloudtrail.html)
Article