From 12-15 Factors (Hebrew)

From 12-15 Factors (Hebrew)

Table of Contents

A 30 minuets video on the 15 factors and how they become achecklist to me.

Video


comments powered by Disqus

Related Posts

AWS KMS Best Practices: Securing the Secret Ingredients of Your Infrastructure

AWS KMS Best Practices: Securing the Secret Ingredients of Your Infrastructure

TL;DR

AWS KMS gives you three flavors of encryption keys — AWS-owned, AWS-managed, and Customer Managed Keys (CMKs). For anything resembling production, CMKs are the only real choice: they give you control over rotation, deletion, cross-account access, and most critically — the ability to kill a key in an emergency. Think of KMS like a hotel’s key management system: the entrance guard has one master card, but the security manager holds the safe with all the master keys. Designing your KMS strategy right is what keeps you from handing that safe to an attacker.

Read More
Getting Up & Running with Kubernetes

Getting Up & Running with Kubernetes

Organized Chaos with Kubernetes for a startup/new companies Kubernetes is easy, for companies moving from Legacy / Bare metal & Multi-cloud is a whole different story, from setting up the k8s cluster to managing microservices and bridging on the gaps between new-gen and legacy infrastructure with cloud-native solutions given at Tikal

Read More
Kubernetes Control Loops: The Secret Sauce Behind Your Microservice Bliss

Kubernetes Control Loops: The Secret Sauce Behind Your Microservice Bliss

Originally posted on the Israeli Tech Radar on medium.

TLDR; Ever dreamt of a system that manages your microservices like a maestro, constantly keeping them in perfect harmony? Kubernetes makes this a reality with control loops, the magic behind the scenes. Operators take it a step further, letting you customize Kubernetes for even more control over custom workload needs.

Read More