Balraj Singhbalrajsingh.hashnode.dev·Jan 6, 2025Mastering Spring Boot: Building a Dynamic Secret Santa Generator Web Application using Azure DevOpsThe Secret Santa Generator is a web application built using Spring Boot technologies, Thymeleaf views, JPA, H2 Database, and more. It features a Spring Model, View, and Controller (MVC) architecture along with Service and Repository layers. This proj...Kubernetes
Ankit Rajtrivy-vulnerability-scanner.hashnode.dev·Jan 4, 2025Trivy : Your Go-To Vulnerability Scanner for Containers and Artifacts 🌐In today’s fast-paced DevOps world, ensuring the security of your applications and their environments is more critical than ever. Trivy, an open-source vulnerability scanner developed by Aqua Security, comes to the rescue by enabling teams to discove...Devops
Ankit Rajnexus-3-artifact-repository-manager.hashnode.dev·Jan 4, 2025Nexus 3 Overview and Installation Guide 🎯Nexus 3 is a widely used artifact repository manager developed by Sonatype. It helps teams store, manage, and retrieve binary artifacts such as JAR files, Docker images, npm packages, and more. Below, we break down its key features, installation proc...nexus3
Neha Bawaneneha1302.hashnode.dev·Jan 3, 2025End to End Mega ProjectIntroduction The project is a complete DevOps pipeline designed to automate and optimize the software development lifecycle, from code integration to deployment and monitoring. It incorporates cutting-edge tools and technologies to implement robust C...1 likeSecurity
Sajal Mishrasajaldevops.hashnode.dev·Dec 28, 2024Deploying a Java Application with Jenkins, AWS, and Kubernetes: A Complete CICD Pipeline GuideCreating a Continuous Integration/Continuous Deployment (CICD) pipeline from scratch is a significant achievement for any software developer or DevOps engineer. In this blog, I’ll walk you through the process I followed to deploy a Java application u...Devops
Balraj Singhbalrajsingh.hashnode.dev·Dec 16, 2024Automated AWS DevOps CI/CD Pipeline for Amazon Prime CloneIn today's fast-paced tech world, automating application deployment and infrastructure management is essential. This project shows how to set up a complete CI/CD pipeline, use AWS EKS for Kubernetes deployment, and integrate Grafana and Prometheus fo...1 likeTerraform
Md Shahriyar Al Mustakim Mitulmitul-shahriyar.hashnode.dev·Dec 13, 2024Kubernetes 101 Security: Part 18Scan images for known Vulnerabilities Sometimes a developer can find vulnerabilities and make bad use of it or they can report it to CVE (Common Vulnerabilities and Exposures) database But which bugs are considered to added in the CVE? For example, ...distribute
Bittu Sharmabittublog.hashnode.dev·Nov 25, 2024How to Use Trivy for Effective Security ScanningTrivy is an open-source tool for vulnerability scanning of container images, file systems, and Git repositories. It is designed to be fast and easy to use, with support for a wide range of package managers, programming languages, and frameworks. Triv...trivy
Shubham Tawareshubzz.hashnode.dev·Nov 16, 2024DevSecOps in Action: How to Secure Your CI/CD PipelineIn this blog, we’ll explore how to incorporate essential security practices into the CI/CD pipeline to create a secure, efficient, and resilient software delivery process. With a DevSecOps approach, security checks are embedded early in the pipeline,...2 likes·154 readsKubernetes
Harshit Sahuharshitsahu2311.hashnode.dev·Nov 11, 2024Project: End-to-End CI/CD Pipeline of Amazon-Prime CloneIf you want to run the following code in local or through Docker image only then checkout this blog. Part1 Prerequisite Launch an EC2 Instance on AWS Sign in to AWS Management Console. Go to EC2 Dashboard: Under Services > EC2. Launch Instance: N...1 like·190 readsDevOps ProjectsGitHub