We keep the credentials and other secrets of the application in the source files. These secrets are visible to developers and being pushed to the source control. In order to avoid this, we can keep the secrets in centralized key management systems - but the credentials of the centralized key management system should be kept in the source files, resulting that at least one credential being placed in the source files. Let's see how to overcome this using Azure Managed Service Identity
Like a developer with little business context getting obsessed with the recent conference he attended and want to convert the systems to the great technology he saw there; the business stakeholders with little technical context love the the promise of high productivity and low cost of LCDPs As developers we favor the engineering feast of the solution more than the business solution. - I accept this; this does not mean we do not care the business, we do and make our fullest effort to solve the business problems but we do not like to do it at the stake of losing the passion of coding. - I know there can be many arguments on this point
Introduction First let me begin with 'What is meant by Shadow IT ?'. In a broader view shadow IT is, any sort of IT usage without the direct governance of IT department of your organization. Sometimes this remains as a violation of the company policies, but the proliferation of the cloud SaaS applications and BYOD... Continue Reading →
Part 1 of this series : Getting started with Azure Stream Analytics. In this post we will combine the reference data from Azure Storage and process the query and write the output events to the Service Bus. These events will be picked by the Azure Logic Apps and the responsible person to maintain the pipe... Continue Reading →
Introduction Azure Stream Analytics is a Complex Event Processing (CEP) Platform as a Service (PaaS) in Azure. In the series of this blog posts we’ll examine a scenario which helps us understand the CEP capabilities of the Azure Stream Analytics. Before we begin, let’s have a basic understanding of what CEP is. CEP is any... Continue Reading →
A RESTful service is a common element in any modern system. But not all the RESTful service implementations are valid Web APIs. This first post of the API architecture series, covers the idea of separation of an API from the web application based RESTful implementations. Often we see a figure analogous to the one below... Continue Reading →
EF Core, support with the Elastic Client Library seems not actively available, and EF Core has its own differences compared to Entity Framework as well. This blog post addresses these issues.
General Data Protection Regulation (GDPR) the law imposes new rules on companies, government agencies, non-profits, and other organizations that offer goods and services to people in the European Union (EU), or that collect and analyze data tied to EU residents. The GDPR applies no matter where you are located. I have been reading the key... Continue Reading →