Tarik YegenAutomated Software Composition AnalysisDevelopers use many 3rd party dependencies during the application development phase. Therefore, the primary components of the completed…Feb 8Feb 8
Tarik YegenDefectDojo for DevSecOpsWhen we automate the security scanning of an application, the security tools we use can provide us with different findings. Therefore, for…Jan 31Jan 31
Tarik YegenGitLeaks: A Secret Scanner ToolIn DevOps processes, automating the delivery of code changes and new features to end user seamlessly and frequently, with CI process where…Jan 1Jan 1
Tarik YegenK8s : Creating a Dedicated User (ServiceAccount) With Restricted Permissions for GitLabIs it right to give GitLab admin permission to run kubectl commands in pipelines? Imagine that GitLabin has been hacked, with admin…Dec 27, 2023Dec 27, 2023
Tarik YegenMicroservice ProjectWhile developing applications, it is well known that nowadays applications are developed in microservice architecture rather than in…Nov 25, 2023Nov 25, 2023
Tarik YegenJenkins ProjectWe know that deploying an application by creating a Pipeline in Jenkins as a CI and CD tool and ensuring that the job is automatically…Oct 30, 20231Oct 30, 20231
Tarik YegenKubernetes: How to pull an image from AWS ECR private repository. Do we need Secret object?In Kubernetes, when creating a pod object or deployment, images are commonly pulled from DockerHub. But when we want to use an image from…Oct 22, 2023Oct 22, 2023
Tarik YegenCreating an image, pushing it to AWS ECR Private Repo and using it while creating a Docker…When we want to create Docker containers, we generally prefer to use DockerHub, which is a common place for images. However, AWS has its…Oct 21, 2023Oct 21, 2023