Category

Best-practices
Testing your code, aligning to agreed standards and verifying compliance towards security guidelines is crucial for building high-quality infrastructures. You should apply these principles to infrastructure code‌ to develop reliable and highly predictable code. In this article, we will go through tools for continuous integration and local development that we, at sysdogs, use daily and...
Continue Reading
Terraform is one of the most popular tools to describe infrastructure as code. Being able to incorporate typical software development patterns into infrastructure results in better predictability, higher quality, and lowers the chance of a human error. You are able to implement continuous integration pipelines that will ensure that the infrastructure code is properly structured,...
Continue Reading
Delivering high-quality Terraform code is something we are proud of doing at sysdogs on our daily basis. For the past years, we have gained a lot of knowledge and experience doing that for a variety of customers all over the world, from a variety of industries, trying to do our best to support other teams...
Continue Reading
It is 2020, and we can say for sure, that ssh-server is still one of the most popular services on Linux systems. During various meetings, I was often asked: How to secure SSH?  Even though this question seems trivial, it is not. There are a lot of things to remember to accomplish well-designed service security....
Continue Reading
More play, less book. Ask about DevOps way of automation, Ansible will pop up, sure thing. It has its bright sides, and ones that aren’t as bright, but that’s not what we’re touching today – In this article, I will try to explain the principles of Ansible role building, that you can easily introduce in...
Continue Reading
How to build a secure Docker image? The biggest goal of this article, is to be a comprehensive guide on building and delivering secure and safe container images. Having that said, we try to focus on build-time. We will not cover registry, orchestrator and runtime protection in this write-up. All of these are so broad,...
Continue Reading

GDPR