投稿時間:2022-02-22 22:44:09 RSSフィード2022-02-22 22:00 分まとめ(59件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
IT 気になる、記になる… 「Google 検索」のデスクトップ版でより真っ黒なダークモードをテスト中 https://taisy0.com/2022/02/22/153593.html google 2022-02-22 12:30:41
IT 気になる、記になる… Appleの整備済み商品情報 2022/2/22 https://taisy0.com/2022/02/22/153591.html apple 2022-02-22 12:20:51
IT ITmedia 総合記事一覧 [ITmedia PC USER] 脆弱性修正に要する時間は年々短縮ーーGoogleのProject Zeroが調査結果を発表 https://www.itmedia.co.jp/pcuser/articles/2202/22/news193.html google 2022-02-22 21:45:00
AWS AWS Japan Blog 10歳の誕生日おめでとう – DynamoDB! 🎉🎂🎁 https://aws.amazon.com/jp/blogs/news/happy-birthday-dynamodb/ 歳の誕生日おめでとうDynamoDB年月日、JeffとWernerが、AmazonDynamoDBの一般提供を発表しました。 2022-02-22 12:02:24
python Pythonタグが付けられた新着投稿 - Qiita 1台のPCから2台のDOBOTを切り替えながら制御する https://qiita.com/shimamotosan/items/5e74a9de878de9e3b730 動作台目のDOBOTでペンを掴み、台目のDOBOTに渡せる位置に移動します。 2022-02-22 21:22:09
python Pythonタグが付けられた新着投稿 - Qiita pandasのread_csvでフォルダ内のcsvを読み込む方法 https://qiita.com/juri_engineer/items/838354253fe467aac573 pandasのreadcsvでフォルダ内のcsvを読み込む方法解決したい事象pandasのreadcsvメソッドで、フォルダ内のcsvを選択したい方法絶対パスを書いても、エラーが発生するため、pyファイルがある階層以降のパスを記載する。 2022-02-22 21:12:12
Ruby Rubyタグが付けられた新着投稿 - Qiita 【2022年2月】未経験から自社開発企業内定までの記録・感想 https://qiita.com/Yuya-hs/items/2c67d26c54e0329a9904 応募したのは全て自社開発企業です。 2022-02-22 21:50:27
Ruby Rubyタグが付けられた新着投稿 - Qiita 【Rails】ローカルサーバーを起動したときに、"A server is already running."とエラーが出た時の解決方法 https://qiita.com/rk1996kumagai/items/f2f0a121aaea88eca99a 【Rails】ローカルサーバーを起動したときに、quotAserverisalreadyrunningquotとエラーが出た時の解決方法環境RubyRailsエラー内容Railsアプリのディレクトリ上でローカルサーバーを起動したところ、以下のようなエラーが発生し、アプリにアクセスできない状況になってしまった。 2022-02-22 21:27:15
AWS AWSタグが付けられた新着投稿 - Qiita Amazon Elastic File System(EFS)の暗号化方式に関して https://qiita.com/a-hiroyuki/items/474e07073318685ea70e 2022-02-22 21:37:33
AWS AWSタグが付けられた新着投稿 - Qiita 【AWS】【Salesforce】AmazonConnectのコンタクト属性をCCP上に表示する https://qiita.com/Aichi_Lover/items/9ce46481714ab21f85b4 【AWS】【Salesforce】AmazonConnectのコンタクト属性をCCP上に表示する概要どうも、ARIの名古屋支社に勤務している愛知県民です・ω・CTIAdapterの機能の一つであるAttributesを使用し、CCP上にコンタクト属性を表示することができたので、その方法をまとめました。 2022-02-22 21:21:28
Ruby Railsタグが付けられた新着投稿 - Qiita 【2022年2月】未経験から自社開発企業内定までの記録・感想 https://qiita.com/Yuya-hs/items/2c67d26c54e0329a9904 応募したのは全て自社開発企業です。 2022-02-22 21:50:27
Ruby Railsタグが付けられた新着投稿 - Qiita 【Rails】ローカルサーバーを起動したときに、"A server is already running."とエラーが出た時の解決方法 https://qiita.com/rk1996kumagai/items/f2f0a121aaea88eca99a 【Rails】ローカルサーバーを起動したときに、quotAserverisalreadyrunningquotとエラーが出た時の解決方法環境RubyRailsエラー内容Railsアプリのディレクトリ上でローカルサーバーを起動したところ、以下のようなエラーが発生し、アプリにアクセスできない状況になってしまった。 2022-02-22 21:27:15
海外TECH MakeUseOf Trump Launches Truth Social: Here's What You Need to Know https://www.makeuseof.com/trump-launches-truth-social-what-you-need-to-know/ Trump Launches Truth Social Here x s What You Need to KnowDonald Trump s much anticipated social media platform called Truth Social has debuted on iOS And here s what you need to know about it 2022-02-22 12:51:12
海外TECH MakeUseOf Google Updates Smart Canvas for Workspace: 10 New Features to Try https://www.makeuseof.com/google-smart-canvas-new-features/ canvas 2022-02-22 12:45:13
海外TECH MakeUseOf The Dangers of Password Recycling and How to Mitigate the Risks https://www.makeuseof.com/dangers-of-password-recycling/ breaches 2022-02-22 12:30:13
海外TECH MakeUseOf What Is Car Sharing? Is It Time for You to Start? https://www.makeuseof.com/what-is-car-sharing/ What Is Car Sharing Is It Time for You to Start Think of it as renting a car by the hour and only paying for what you use It s low hassle cost effectiveーand it can change your life Here s how 2022-02-22 12:16:13
海外TECH MakeUseOf REDMAGIC 7 Review: A Gaming Smartphone You Can Use Everyday https://www.makeuseof.com/redmagic-7-review-gaming-smartphone/ REDMAGIC Review A Gaming Smartphone You Can Use EverydayIf you re looking for a gaming smartphone that doesn t compromise on regular everyday use then look no further than the Nubia REDMAGIC 2022-02-22 12:05:13
海外TECH DEV Community Splunk - 10K rows limit https://dev.to/adaendra/splunk-10k-rows-limit-4l1m Splunk K rows limitWhile you are doing requests in Splunk especially for dashboards you will try to optimize it and reuse as much as possible But if you are doing this be sure that the common request doesn t contains a sort operator if you don t need to Because the usage of the sort operator will automatically limit you at the first K rows for your search So if you want to generate a dashboard showing the number of callsthe timechart and the last logsbe sure that you only have the sort on the subrequest that show the logs Otherwise you will see only k in the number of calls and a hole in your timechart I hope it will help you 2022-02-22 12:40:34
海外TECH DEV Community 10 Ways to Use Business Chat Apps to Improve Productivity https://dev.to/troopmessenger/10-ways-to-use-business-chat-apps-to-improve-productivity-3pae Ways to Use Business Chat Apps to Improve ProductivityA business chat app has become an important part of an organization s communication strategy for resolving all of the issues that arise while connecting with numerous teams and making it easy Your team chat app isn t only for conversation it can also be used to boost productivity in a variety of ways Here are a few tips for increasing efficiency with your business chat app Employ best team chat appThe majority of businesses employ substandard tools If it didn t have the required features it wouldn t be able to provide the promised functionality to its users in the first place If you want to boost your productivity you should use the best app available such as Troop Messenger With the foregoing in mind don t simply look at the brand name look at the features and what it has to offer For example a popular app like Slack does not have a video conference feature as a result you can t held business meetings unlike other tools and it s free plan does not allow users to make group calls unless they upgrade to premium plans which only permits up to individuals in a group chat which will negate your operations Troop Messenger for example is a team chat app that will boost productivity internal communication and so on If you believe Team chat apps are only for communication you should use the incompetent social chat app Don t use multiple toolsYour communication inevitably extends beyond talking or texting in the tool you may be required to participate in a video conference initiate screen sharing share remote access live location tracking and so on So instead of using various apps for different needs try to find one that has all of the major features because relying on multiple tools is like sailing on two boats Use a tool that has the features you need so you don t have to switch between numerous UIs this will save you time and increase your productivity And you won t have to waste time and money in the future looking for an alternative that meets your future requirements Safe amp Reliable appBefore you choose an app don t simply look at its features security should be a top priority Your data is your property in today s digital world and it must be protected at all costs Hackers your peers are scouring the internet for ways to steal it and use it to their benefit For your information not all apps are as secure as they proclaim to be which includes apps designed by giants who are unable to facilitate on premise or self hosted environments Check out their pricing page to learn about the security methods they use Data sensitive businesses such as banking government defense finance software companies and others prefer on premise apps because they have complete control over their data and don t have to rely on cloud service providers Troop Messenger is one of the few end to end encrypted apps that can be your self hosted chat app moreover it can also be delivered as SaaS chat APIs and SDKs and other delivery models Your data will be safe and secure with such safe and trustworthy apps and you will be able to improve productivity at the same time Smartphone TechnologyWhen team members are working on site sales teams are meeting with clients and so on it is a sin to use a team chat tool that does not support smartphone technology So take advantage of modern smartphone technology which provides us with several chances as a result of technical growth and better our internal communication Choose a team chat app that works on a variety of platforms including Android and iPhone This smartphone software allows users to stay up to speed on the latest news by receiving real time notifications Audio video group calls texting sharing files one on one discussions and so on all functions work flawlessly Create GroupsCreate groups in the app based on projects or tasks and instruct team members to only discuss pertinent project specifics in the group When they are obliged to check the updates this will eliminate any uncertainty Do you know that most companies have a separate group for fun events and weekend planning to avoid bringing these topics up in other critical groups You can also make groups for the entire company your team numerous teams and so forth Use Search OptionsThe average worker is believed to spend a significant amount of time each week trying to locate coworkers and track down internal information The first problem is solved through workplace messaging as we ve already learned If you use a team chat tool like Troop Messenger you may utilize advanced search filters to quickly find the message you re looking for It provides word image file link document and other search possibilities as well as the ability to read a specific user s messages by selecting the user based search option in a group without wasting time peeking into undesirable communications Employee EngagementEmployees that are engaged are happier and more successful than their colleagues resulting in higher profits As a result smart businesses are continuously looking for new ways to boost employee engagement Investing in modern office messaging software is a perfect idea because today s employees expect new tools Your employees will have access to cutting edge technologies that will make their work easier and allow them to produce their finest work Avoid EmailsTraditional communication methods such as email fax and the like used to be useful but they may no longer be so in today s workplace Email for example is probably not the best medium for having a meaningful conversation To replace email more successful firms are increasingly turning to instant messaging solutions like Office Chat They understand that relying too much on a single inflexible form of communication suppresses their growth Announce that messages in chat platforms will be documented the same way they are in the email to make it a habit Establish Ground RulesTo get your team to work together uniformly for a common goal set some ground rules such asIn critical groups messages must be acknowledged by all members of the group Share work updates in a template that you ve approved To avoid missing essential communications use Troop Messenger features such as Unread Messages and marking messages as Respond Later Avoid meetings that aren t productive Rather than holding a meeting for each issue a video conference should be organized in which each topic is presented within the allotted time and all relevant topics are discussed FeedbacksBeing receptive to feedback will aid in the development of a positive work environment When you feel compelled to reject someone s point of view do it gently explain why you re rejecting them and don t forget to thank them As a manager or team leader you must consider sharing your knowledge and experience with your team and you must be available on office chat apps because your position may put you in unusual situations such as the pandemic where managers had to communicate with their teams and admins regularly to get the tools they needed into their systems ConclusionYour team s collaboration and success will be determined by the business chat software you use at work So it s recommended that you go with a tool like Troop Messenger which has a policy of empowering its users and introducing new and unique features with each random update all of which are geared to match your future needs and save you time looking for an alternative This tool can be used as a team chat app by any domain SaaS companies BB companies and so on 2022-02-22 12:31:50
海外TECH DEV Community Why are you learning? https://dev.to/jewelkeith_jk/why-are-you-learning-1817 Why are you learning Why are you learning the field you re into right now Why are you studying how to become a teacher lawyer or accountant For those who want to be a developer like me may I ask why are you learning how to code Not trying to be a saint or an angel but my main reason is to help others Well honestly I m doing it for myself and my family too I want to support my family in terms of finance Then provide a secure life for my own future family But I m serious and honest about wanting to change the world for the better I don t want to live for myself only I want to change other people s lives especially the poor and the marginalized who usually don t have access to basic needs and rights like free quality education To balance the ambitious part of me I tried to make a sound concrete and feasible plan Then execute it with consistency persistence and faith in myself other people and things that matter While studying I aim to build a developers community here in my place with my friend a self taught front end engineer This way I can learn better because I can get advice from possible mentors who would be kind enough to join our groupI can learn more effectively and efficiently by teaching people who have lower experience than me I can build and grow my networkAfter studying and being confident with my skills I will Get a job at a companyGo freelancing or work with startupsThis way I can Work with other people like developers and business ownersMaybe build my leadership skills if there s a chance to lead a teamHave a better picture of the whole development processAvoid failing and unknowingly throwing money into the pit when forming my future businessAfter getting real experience I will Create my own business Build digital productsOne of my business or products main goals is to help those people in need There are a lot of depressing real world problems I plan to use my coding skills and experience to build projects that offer solutions to those problems How about you Why do you want to excel in a field you re into right now Do you have a sound concrete and feasible plan These are essential questions to ponder because there might be times when we will struggle or think that everything will be pointless So to uplift ourselves and get back in focus mode we have to remember the answers that inspire us to move forward As a popular Philippine coffee commercial say Para kanino ka bumabangon or For whom do you wake for Note that I m an introvert or a bit shy person But I m doing this because I was at the lowest point of my life during the pandemic I had personal and family issues As I was having a real hard time catching up on my studies and life I dropped out of college Aside from the support I get from my partner and friends I see posts like this that somehow help me cope with depression I found meaning in life or the point of living This action is just my way of giving back I hope you ve found value in my post It would be awesome to know that this will inspire others to keep on going because there will be a time that everything will fall in the right place I m just optimistic about my future and I hope I have affected you Thank you for reading 2022-02-22 12:31:34
海外TECH DEV Community How to Mitigate IoT Security Threats in 2022 https://dev.to/oleksiitsymbal/how-to-mitigate-iot-security-threats-in-2022-5ac0 How to Mitigate IoT Security Threats in The Internet of Things plays a key role in digital transformation However in many cases organizations realize that they already have a large fleet of legacy IoT devices that have been gradually deployed over the years Many of these devices may not have been designed with security in mind One of the biggest concerns of IoT is managing the risks associated with a growing number of IoT devices Information security and privacy issues related to IoT devices have attracted global attention because of the ability of these devices to interact with the physical world IoT vulnerabilities continue to emerge making it critical for manufacturers to emphasize IoT security by design IoT vulnerabilities have been discovered and exposed across many industries These vulnerabilities threaten sensitive data as well as personal safety Without a doubt the Internet of Things is a prime target for hackers in the and any organization that produces or uses these devices needs to be prepared IoT Security ThreatsBelow we briefly review some of the common cybersecurity threats facilitated by IoT devices IOT BOTNETSIoT devices are attractive targets for botnet buildersーthese are hackers who compromise millions of devices connecting them into a network they can use for criminal activities IoT devices are a good candidate for botnets due to their weak security and the large number of virtually identical devices which attackers can compromise using the same tactics Attackers can use unprotected ports or phishing scams to infect IoT devices with malware and enlist them into botnets that can be used to launch large scale cyber attacks Hackers can use readily available attack toolkits able to detect sensitive devices penetrate them and avoid detection Another module in the toolkit then instructs the device to launch an attack or steal information on behalf of the botnet owner Threat actors often leverage IoT botnets during distributed denial of service DDoS attacks see the example attacks section below DATA EXFILTRATIONWhen hackers use malware to infect IoT devices they can do more than just enlist the device into a botnet For example attackers can access the device data and steal any sensitive information stored there Attackers also leverage IoT to harvest credentials from device firmware Using these credentials attackers can gain access to corporate networks or other systems storing sensitive data In this way an attack on a seemingly innocent device can turn into a full scale data breach SHADOW IOTShadow IoT arises because IT administrators do not always have control over devices connected to the network Devices with IP addresses such as digital assistants smart watches or printers frequently connect to corporate networks and do not always meet security standards Without knowledge of shadow IoT devices IT administrators cannot ensure that hardware and software have basic security features and find it difficult to monitor malicious traffic on devices When hackers compromise these devices they can leverage the connection to the corporate network and escalate privileges to access sensitive information on the corporate network Notable IoT Security Breaches and HacksSince the IoT concept was born in the late s security experts have warned that devices connected to the Internet will pose a risk to society Since then numerous large scale attacks have been publicized in which attackers compromised IoT devices and created a real threat to public safety and corporate security Here are a few examples STUXNETIn researchers discovered that a virus called Stuxnet caused physical damage to nuclear centrifuges in Iran The attack began in with the primary stage of the campaign in The malware manipulated commands sent from programmable logic controllers PLC Stuxnet is often considered an IoT attack amongst the earliest targeting a supervisory control and data acquisition SCADA system used in industrial environments FIRST IOT BOTNETIn Proofpoint researchers discovered what is now considered “the first IoT botnet Over of the botnet was composed of non computer devices such as smart TVs home appliances and baby monitors Since then malware like CrashOverride VPNFilter and Triton have been used extensively to compromise industrial IoT systems COMPROMISING A JEEPIn two security researchers hacked into a Jeep vehicle wirelessly via the Chrysler Uconnect system deployed in the car and performed remote actions like changing channels on the radio turning on the wipers and air conditioner The researchers said they could disable the breaks and cause the engine to stall slow down or shut down altogether MIRAI BOTNETIn Mirai one of the largest IoT botnets ever discovered began its activity by attacking the websites of security researcher Brian Krebs and a European hosting company OVH The attacks were of a huge magnitudeー Gbps and Tbps Afterwards the botnet was used to attack Dyn a large DNS provider and high profile websites including Twitter Amazon Netflix and the New York Times The attackers built their network from IoT devices like routers and IP surveillance cameras ST JUDE CARDIAC DEVICE VULNERABILITYIn the Food and Drug Administration FDA announced that implantable cardiac devices manufactured by St Jude Medical including pacemakers implanted in living patients were vulnerable to attack Billy Rios and Jonathan Butts security researchers presenting at the Black Hat Conference proved their ability to hack into a pacemaker and shut it down which if it were done by hackers would kill the patient IoT Security Best PracticesAs you start to consider an IoT security strategy for your organization here are a few best practices that can improve your security posture USE IOT SECURITY ANALYTICSA security analytics infrastructure can significantly reduce vulnerabilities and security issues related to the Internet of Things This requires collecting compiling and analyzing data from multiple IoT sources combining it with threat intelligence and sending it to the security operations center SOC When IoT data is combined with data from other security systems security teams have a much better chance of identifying and responding to potential threats Security analytics systems can correlate data sources and identify anomalies that might represent suspicious behavior Security teams can then investigate and respond to anomalies preventing attackers from compromising corporate IoT devices NETWORK SEGMENTATIONNetwork segmentation is a technique that enables isolation of specific components from others to improve security In the case of IoT segmentation can help prevent attackers or malicious insiders from connecting to IoT devices or can prevent compromised devices from infecting other parts of the network You can implement this technique into your strategies or use a network security solution To begin a segmentation effort create a comprehensive list of IoT devices currently in use their connection methods VLAN or LAN how and what type of data they transmit and which other devices on the network each device really needs to connect to In particular check if each category of device needs to have access to the Internet and if not disable it One suggestion for segmentation is to designate specific categories of devices such as data collection infrastructure or personal employee owned devices You can create a segmentation strategy based on the connectivity requirements of each IoT endpoint and act to isolate or block network access to endpoints that don t really need it ENABLE DEVICE AUTHENTICATIONAnother way to reduce the vulnerability of IoT devices to attacks by enforcing full authentication on all devices Whether your IoT devices have simple password authentication or more advanced measures like digital certificates biometric or multi factor authentication MFA use the most secure authentication available on the device and ensure you never use the factory default password AI AND ML FOR IOT SECURITYAn expanding network of IoT devices produces tremendous amounts of data which are useless without proper analysis Massive sets of data are analyzed with the help of Artificial intelligence AI and machine learning allowing machines to teach themselves retain what they learnt and hence improve the capabilities of IoT systems Being the one of the recent IoT trends AI based Intrusion Detection Systems IDS continuously monitor the network collecting and analyzing information from previous attacks They can predict an attack based on the historical data and suggest a solution to fight the threat Even new hacking techniques are made up they still may include previously used patterns which can be recognized with ML algorithms in real time In general there are two types of ML based IDS Anomaly IDS detects attacks based on recorded normal behavior comparing the current real time traffics with previous recorded normal real time traffics These systems are capable of detecting a new type of attack so widely used even in spite of a large amount of false positive alarms Misuse or signature IDS compares the similarity between the patterns recognized in the current real time traffics and the already known patterns of various types of previous attacks It shows a smaller amount of false positive alarms but at the same time the new type of attack can pass through undetected ML algorithms like Linear Discriminant Analysis LDA Classification and Regression Trees CART and Random Forest can be used for attacks identification and classification MobiDev offers innovative IoT development services to ensure IoT ecosystem security using artificial intelligence and machine learning to combat and mitigate IoT cyber threats 2022-02-22 12:30:38
海外TECH DEV Community Exploring logging strategies with the Elastic Stack https://dev.to/kreuzwerker/exploring-logging-strategies-with-the-elastic-stack-22jn Exploring logging strategies with the Elastic StackWritten by Guido Lena CotaOriginally published on June th Design options and trade offs to consider when developing a log ingestion strategy with the Elastic stackImagine your team is responsible for business critical IT services Say you operate the shared DevOps platform that enables developers in your company to roll out new features and hotfixes Think of the version control system CI CD tools deployment environments and so on These services can run on multiple environments and their number and type can change over time e g by adding contract testing integration to your CI CDs Part of your daily job is to keep a close eye on these services monitoring their performance detecting anomalies and doing a speedy root cause analysis when everything s on fire The Elastic Stack offers a unifying solution for all these activities As illustrated below Beats modules can collect logs and metrics on the hosts and ship them to Logstash where they are parsed sanitized and enriched Then Logstash indexes persists the processed data in the Elasticsearch search and analytics engine which your team can query using the Kibana UI So that s it right What can go wrong Plenty In a previous series of blog posts we have already talked about common issues and possible solutions when analyzing logs in Kibana Issues like dealing with missing log entries bad search performance and usability This time I d like to step back in the ingestion process and address related but distinct challenges focusing on how we create and configure the Elasticsearch indices for our logs We will get into the shoes of the DevOps team in our use case scenario and uncover the trade offs between resource efficiency reliability and maintainability when choosing a log indexing strategy For example how can we enforce different retention policies for dozens of log sources without getting into configuration hell How flexible is our strategy to accommodate new log sources with the least amount of effort What number and size of indices will optimize ingestion throughput disk utilisation and analysis performance This blog post will present two log indexing strategies and evaluate them based on maintainability and efficiency criteria As we will see none of these strategies will be entirely satisfactory but they will build the case for a third log indexing strategy…But that I ll leave as a cliffhanger for a second conclusive blog post Chasing the right log indexing strategyWe chose the Elastic Stack to centralize logging of a heterogeneous group of services running on multiple environments We set up Filebeats shippers to send log streams over to a Logstash server where we configured pipelines to normalize the diverse log formats to a more consistent structure to enhance correlation see the Elastic Common Schema for inspiration In particular every processed log event will have a field for the service name and another for the environment Finally the Logstash pipelines use the Elasticsearch output plugin to ship the processed logs as JSON documents to the specified indices in the Elasticsearch cluster In the context of this blog post a log indexing strategy is defined by i an index name pattern ii an alias for all the indices matching the same name pattern also called backing indices and iii a log rotation policy A quality strategy is easy to implement and maintain adapt to changes to the service landscape and efficiently use the Elasticsearch resources disk CPU memory S Group by environment rotate by age and sizeThe core idea is to group services by environment and write their logs to the same index alias Have a look at the diagram below On the left we see the JSON documents transformed by Logstash from Jenkins and Nginx production logs Note that these documents have some common fields notably host env the name of the environment where the service is running A representation of the target index alias “logs prod and its backing indices is on the diagram s right When you write to an alias you write to the only backing index that allows writes to avoid inconsistencies and duplication Conversely when you read from an alias you read from all the backing indices In our proposal the index name pattern for the backing indices has four parts separated by a dash “ a prefix to describe the domain “logs the name of the environment as set in the incoming documents the current year to make the temporal dimension explicit and finally the zero padded incremental number that enacts the log rotation The resulting names are for example logs prod logs prod logs stg The last piece of information required for a log indexing strategy is the rotation policy Elasticsearch offers a feature called rollover that creates a new backing index for a target alias when specified conditions are met The available rollover conditions are based on index age size number of documents or a combination of these three The name of the new backing index is a unitary increment of the last part of the name pattern e g logs prod gt logs prod To automate rollover we can create an Index Lifecycle Management ILM policy to tell Elasticsearch what actions to perform at every phase of the index lifecycle Check out the Tutorial Automate rollover with ILM on the Elastic documentation for more details Coming back to our first log indexing strategy we want to rotate log indices when they either become older than three months because they are not actively searched anymore and can be moved to less performant nodes orbigger than GB Implementation DetailsThe steps to apply the indexing strategy S are as follows Create an ILM policy “ilm s in Elasticsearch to specify the desired rollover conditions PUT es hostname ilm policy ilm s policy phases hot actions rollover max primary shard size GB max age M Configure the Elasticsearch output plugin of the Logstash pipelines to i apply the ILM policy above ii define the index alias and iii index name pattern For example for production logs elasticsearch hosts gt es hostname ilm rollover alias gt logs prod ilm pattern gt now y ilm policy gt ilm s Because ilm rollover alias does not support dynamic variable substitution i e the ability to set the dynamic value of a field such as host env into a string template we must create one output configuration for each known environment and control their application with IF ELSE statements output if host env prod elasticsearch ilm rollover alias gt logs prod else if host env stg elasticsearch ilm rollover alias gt logs stg else Not ideal right EvaluationPros of the log indexing strategy S Straightforward implementation Support complex log rotation policies thanks to the integration between Elasticsearch output plugin and ILM Small number of indices and active shards low pressure on the CPU Cons Risk of index mapping explosion because logs with different schemas are stored into the same index This will lead to larger memory and disk footprints and slower queries Poor flexibility of the index mappings For example if you want to change the data type of one field of the Jenkins logs you must reindex the documents of all the other services as they are stored in the same environment scoped indices One ILM policy and rollover strategy for all the services running in the same environment Say you must keep Nginx authentication logs for years for security compliance Without ad hoc clean up routines to delete stale documents not a best practice you must also keep on disk logs of services with a shorter retention period Boilerplate and duplications in the Elasticsearch output plugin configuration which require manual and tedious maintenance A spike in the number of logs collected from one service e g during an incident when enabling debug logging may overburden the indexing capacity of the target index and cause data loss S Group by service and environment rotate by ageHaving introduced all the important concepts in the previous section the presentation of the second log indexing strategy will be quicker I promise In strategy S we introduce dedicated indices per environment and service to overcome the drawbacks of having heterogeneous service logs into the same index The simplest way to achieve this is to create environment service indices every month to enforce temporal log rotation and route the JSON documents to the pertinent indices The resulting indices will be named something like logs prod jenkins or logs dev nginx Implementation DetailsTo apply the indexing strategy S it suffices to specify the desired index pattern into the Elasticsearch output plugin “index property which will generate the target index name dynamically based on the values of the host env and service name fields elasticsearch hosts gt es hostname index gt logs host env service name yyyy MM Note that Logstash uses Joda formats to extract temporal values from the current timestamp e g yyyy to extract the year MM for months ww for weeks … The monthly rotation policy is entirely enforced by the index pattern above no Elasticsearch rollover feature required Suppose you want to apply an ILM policy to specific environments or services In that case you have to create the ILM policy in Elasticsearch then add that policy to an index template that will match the correct index name pattern PUT es hostname ilm policy ilm s dev logs policy PUT es hostname ilm policy ilm s prod jenkins logs policy PUT es hostname index template dev logs index patterns logs dev template settings index lifecycle name ilm s dev logs priority PUT es hostname index template jenkins prod logs index patterns logs prod jenkins template settings index lifecycle name ilm s prod jenkins logs priority The index template s priority field allows managing overlapping patterns if an index matches more than one index template the one with the highest priority is used Because Elasticsearch ships with built in templates having matching pattern logs and priority we need to set the priority of our custom templates to any value greater than that EvaluationPros of the log indexing strategy S Less boilerplate and duplicated code in Logstash thanks to dynamic variable substitution Service specific indices have fewer fields leading to faster queries improved space efficiency and fewer risks of mapping conflicts More granular control over the assignment of ILM policies Data corruption of one shard will affect only one service s logs small blast radius Cons Risk of index explosion new indices for each service every year Support only age based rollover conditions which may result in too big or too little indices depending on the related service s indexing rate This is not an efficient use of the resources and there s no way to control it in the S setup The index property of the Elasticsearch output plugin allows enforcing quite basic age conditions daily weekly monthly or yearly rotations but not say months rotation like strategy S A case for SHow to combine the advantages of the log indexing strategy S sophisticated log rotation policies no risks of index explosion and S granular control over service specific settings and behaviours improved operations efficient use of the cluster resource while minimizing their drawbacks That s a great question but for another blog post bummer If you already have some ideas and can t wait to share them you are welcome to reach out to us at elastic kreuzwerker de Image by Ag Ku from Pixabay 2022-02-22 12:28:41
海外TECH DEV Community Implementing payments with Android https://dev.to/adyen/implementing-payments-with-android-1lh Implementing payments with AndroidAndroid at Adyen is not your typical Android role Normally most application development is tightly coupled to Google Play So to understand the payments app development space it requires a shift in who the potential customers are and what the marketplace looks like This article will provide you with an insight into how Adyen leverages Android to implement a fully fledged payment solution Let s begin with answering a question to provide a reference point “How is Adyen using Android to assist merchants in processing payments in their stores To gain context pun intended we have to briefly zoom out and look at the current landscape assess what Android is bringing to this space and finally focus on how Adyen is enabling better Android based solutions for merchants The current landscapeA cashier rings an order through their till then presents you with a device to take a payment Think contactless chip and pin and swipe That device is known as a POS point of sale terminal and is a piece of hardware that runs a Unix like OS that has been modified ーhardened and then certified ーto perform transactions This means manufacturers OEMs control and ship both the hardware and software for their devices A natural evolution to AndroidThe similarities with the current state of POS devices and where mobile phones were in the early s is striking You had OEMs of mobile phones all making proprietary software for their devices As these phones were becoming more powerful they began to blur the boundaries of what they could do In exactly the same fashion POS device hardware has become both cost effective and more powerful inturn increasing the possibilities in what a single device could do So manufacturers began forking the Android Open Source Project ーagain hardening the source code and certifying it for payments Leaving us with Android based multipurpose payment devices It s important to note that these Android forks do not contain any of Google s proprietary software due to both licensing and certifications which then means no access or distribution via the popular app store This poses some interesting challenges with both scalability and deployment How do you integrate with different OEMs to take a payment And how do you get your application onto a device with no application store Helping merchantsThe sweet spot where Adyen operates has two functions We build an Android payments based solution that integrates the APIs from the OEMs to read card data and securely communicate with the Adyen platform for payment processing This standardizes the payment experience for merchants who want to integrate with the platform and simplify process payments Keeping in mind the comparison with mobile phones a payment device processing a payment is akin to a mobile phone making a call ーit has achieved its primary purpose Next Adyen supports merchants to further leverage Android enabling merchants to provide a better experience for both staff and customers Here we develop and add features to our launcher application keeping users within a secure environment mitigating the risks of nefarious actions from individuals Likewise in reducing risk we only use third party libraries from Google and JetBrains We work with the latest industry trends Dagger Hilt for dependency injection Coroutines Flow as the primary mechanism for asynchronous code and Jetpack Compose for our UI Khaleel Freeman Software EngineerWith a launcher application in place merchant developers are building checkout solutions ーapplications that can tally up a customer s order supporting different payment methods and currencies However as with application development this is only limited by the creativity of the team Merchants have created apps that use barcode scanners and cameras to check stock levels for example Using Android this way repurposes the single use payment terminal to a multi functional device for merchants Smart Phone now think Smart Terminal Job OpportunitiesAdyen is looking for talented Android developers to continue revolutionising the payment industry check out our latest vacancies 2022-02-22 12:25:45
海外TECH DEV Community 7 Reasons Why Your Hospital Needs an Application https://dev.to/pankajdas0909/7-reasons-why-your-hospital-needs-an-application-2166 Reasons Why Your Hospital Needs an ApplicationMobile app development has had a significant influence on human existence so far In today s world it s nearly impossible to do everyday tasks that haven t been affected in some way by a smartphone app Mobile applications offer more effective ways of communicating managing data and delivering services to the healthcare industry Emerging technologies like Big Data analytics Machine Learning and the IoT enable healthcare applications to become more dynamic and helpful A report estimates that the global mHealth apps market will be worth billion in and will grow at a CAGR of percent from to The Present State of Mobile HealthThe health business has been obliged to reevaluate its marketing strategy due to the increasing use of smartphone devices An ITOnline survey found that two thirds of Americans favor digital health solutions over traditional ones Over of those surveyed said they d be willing to invest in wearable technology that keeps an eye on things like heart rate and calorie consumption According to the IMS Institute of Healthcare more than mobile healthcare apps are available for Android and iOS with doctors increasingly prescribing their versions of these programs to their patients Despite this there are many mHealth applications that fall short of expectations App review sections are flooded with complaints about sluggish navigation complex layouts and other issues that detract from the overall experience Even if there are a lot of mHealth applications accessible there is still a great need for high quality solutions by medical mobile application development services Why Does Your Hospital Need an App Appointment scheduling without the hassleDoctors schedules and appointments often necessitate patients frequent visits or calls to the hospital receptionist Patients and receptionists alike are concerned about this With hospital communication apps patients can easily see when their doctor will be available schedule an appointment and set a recurring reminder when they need to come in Patients no longer have to worry about making a reservation because of this The receptionists also have less work because they don t have to phone patients the day before to remind them to come in They can use their time more effectively Access to medical records made easierThanks to a smartphone application patients no longer have to rush to hospitals and labs to get reports Instead an online report is available at any time and from any location As a result patients no longer have to worry about leaving or misplacing their reports at home before consulting with their doctor In addition to making it easier for the patients this also minimizes the amount of documentation that must be completed The hospital s administration does not need to collect store and disseminate reports They only have to touch their mobile device and the report will be sent to the patient who requested it Increased productivityTo help doctors deliver the best possible care to their patients a centralized database of all medical applications for patients might be used As a result a doctor can attend to numerous patients at once Also the quality of your services and your brand recognition will rise The implementation of a mobile application will not only allow employees to connect with one other but it will also help them better understand their roles and duties Paying bills quickly and easilyManaging hospital bills is a time consuming task that strains the resources of both the hospital s employees and its patients Keeping track of every patient s payment history and chasing down insurance companies to settle their accounts is a tedious and time consuming operation Mobile apps can shorten this laborious process to just a few minutes A variety of payment options are available to patients who choose to make their payments electronically As a result if you hire medical mobile application development services to develop an app you can personalize a patient s billing history and records Therefore medical application development makes the payment process more convenient for everyone involved Diagnosis of patients with accuracyDoctors can keep tabs on their patients diagnoses and other medical examinations using hospital apps for patients This reduces the risk of mistakes leading to patient death For accurate tracking and monitoring of various health parameters healthcare apps make use of sensors Because of this medical care becomes more effective and of higher quality for everyone who receives it Patients may also benefit from medical applications that allow real time access to their treatment procedures So developing a hospital app is a wonderful way to begin Effective promotionMedical applications for patients can help you stand out in a market where healthcare facilities are still inexperienced with the numerous benefits of mobile technology It may be used as the most potent marketing tool possible Using push notification alerts you may communicate with patients about their results consultations and other relevant information Improved brand imageHospital applications for patients might be an excellent method to attract customers and stay competitive in the market With a mobile app for healthcare you may get real time patient feedback and track user activity You ll be able to see where your services fall short and devise new more customer focused marketing methods based on the information you get Final WordsNew technologies are having a significant impact on how healthcare facilities operate According to industry analysts of all practitioners will be delivering services mostly on mobile devices by Doctors and nurses will keep integrating mobile devices and wireless technologies into healthcare through 2022-02-22 12:23:05
海外TECH DEV Community Testing a Kafka consumer with Avro schema messages in your Spring Boot application with Testcontainers https://dev.to/kreuzwerker/testing-a-kafka-consumer-with-avro-schema-messages-in-your-spring-boot-application-with-testcontainers-o8f Testing a Kafka consumer with Avro schema messages in your Spring Boot application with TestcontainersWritten by Anja GrussOriginally published on June rd How many testcontainers do you need to test the consumption of an Avro message in your Kafka message consumer The short answer is as usual it depends Let s assume this situation You have a Spring Boot microservice to manage user data That microservice listens to incoming events such as user creations updates or deletes from Kafka transforms them into your own business objects writes them into a PostgreSQL database and provides them via REST interface to your frontend The overall infrastructure provides Avro messages and the Confluent schema registry The sample project uses Apache Maven with the avro maven plugin to download the schema files and generate the sources but of course there are plugins for Gradle too Now you want to test that your Kafka consumer reads the events transforms them into your database entities and saves them When you check on the internet for testing in the context of Spring Boot Kafka consumer and Avro schema you find quite a few variants using the MockSchemaRegistryClient or writing your own custom Avro de serializers or setting up a Testcontainers ecosystem with a Kafka a Zookeeper and a Confluent Schema Registry or using the EmbeddedKafka provided by Spring in the spring kafka test dependency All these solutions have their valid pros and cons In this blog post I will present a solution that uses a minimum set of Testcontainers to provide the best compromise between control speed and efficiency The other solutions I listed above have their relative pros and cons which I will cover later in this post Let me walk you through the smaller setup simulating the situation above We have a Spring Boot application a PostgreSQL database and our Kafka consumer The application needs to listen to Kafka messages for users that were added or modified and has to update the database items accordingly You can find the full code repository here I added the UserEvent class for compilation purpse only normally that would end up in your generated classes via the Avro plugin Let s address the first problem how to interact with the Schema Registry from our testing environment We need a mock Hidden in Confluent s schema registry package in the AbstractKafkaAvroSerDeConfig class you can find this comment for the schema registry url Comma separated list of URLs for schema registry instances that can be used to register or look up schemas If you wish to get a connection to a mocked schema registry for testing you can specify a scope using the mock pseudo protocol For example mock my scope name corresponds to MockSchemaRegistry getClientForScope my scope name So that means we can configure the Kafka producer and consumer with an imaginary schema registry url that only needs to start with “mock and you automatically get to work with the MockSchemaRegistryClient This way you don t need to explicitly initiate the MockSchemaRegistryClient and configure everything accordingly That also eradicates the need for the Confluent Schema Registry Container Running the Kafka Testcontainer with the embedded Zookeeper we no longer need an extra Zookeeper container and we are down to one Testcontainer for the messaging This way I ended up with only two Testcontainers Kafka and the database Set up and configure your containers protected static final PostgreSQLContainer lt gt postgreSQLContainer new PostgreSQLContainer lt gt postgres withPassword postgres withUsername postgres withExposedPorts withReuse true protected static final KafkaContainer kafkaContainer new KafkaContainer DockerImageName parse confluentinc cp kafka withEmbeddedZookeeper withEnv KAFKA LISTENERS PLAINTEXT BROKER withEnv KAFKA LISTENER SECURITY PROTOCOL MAP BROKER PLAINTEXT PLAINTEXT PLAINTEXT withEnv KAFKA INTER BROKER LISTENER NAME BROKER withEnv KAFKA BROKER ID withEnv KAFKA OFFSETS TOPIC REPLICATION FACTOR withEnv KAFKA OFFSETS TOPIC NUM PARTITIONS withEnv KAFKA TRANSACTION STATE LOG REPLICATION FACTOR withEnv KAFKA TRANSACTION STATE LOG MIN ISR withEnv KAFKA LOG FLUSH INTERVAL MESSAGES Long MAX VALUE withEnv KAFKA GROUP INITIAL REBALANCE DELAY MS withNetwork network static Startables deepStart Stream of postgreSQLContainer kafkaContainer join And create a Kafka producer and consumer with their configurations for the tests public static KafkaProducer lt Object Object gt createProducer Properties props new Properties props put ProducerConfig BOOTSTRAP SERVERS CONFIG kafkaContainer getBootstrapServers props put ProducerConfig ACKS CONFIG all props put ProducerConfig RETRIES CONFIG props put ProducerConfig KEY SERIALIZER CLASS CONFIG StringSerializer class props put ProducerConfig VALUE SERIALIZER CLASS CONFIG io confluent kafka serializers KafkaAvroSerializer class props put AbstractKafkaAvroSerDeConfig SCHEMA REGISTRY URL CONFIG mock testUrl props put ProducerConfig CLIENT ID CONFIG kafkatest return new KafkaProducer lt gt props public static KafkaConsumer lt String Object gt createEventConsumer Properties props new Properties props put ConsumerConfig BOOTSTRAP SERVERS CONFIG kafkaContainer getBootstrapServers props put ConsumerConfig VALUE DESERIALIZER CLASS CONFIG io confluent kafka serializers KafkaAvroDeserializer class props put ConsumerConfig KEY DESERIALIZER CLASS CONFIG StringDeserializer class props put AbstractKafkaAvroSerDeConfig SCHEMA REGISTRY URL CONFIG mock testUrl props put KafkaAvroDeserializerConfig SPECIFIC AVRO READER CONFIG true props put ConsumerConfig GROUP ID CONFIG kafkatest return new KafkaConsumer lt gt props Here we only add the mock prefixed schema registry url no special serializers or deserializers Don t forget to set the property for the specific avro reader to true in your Kafka consumer configuration to ensure that the consumer does not fail with a class cast exception Now in your tests you create the events you expect the Kafka producer to send have your Kafka consumer subscribe to the topic and get the ConsumerRecord from the KafkaTestUtils to be processed by your own listener And then you test the result of whatever your listener did That s all Pros and Cons Of course runtime is an issue Testcontainers need to start and network before being fully available A much faster alternative to my setup is to move all the infrastructure to memory by using EmbeddedKafka as a broker and replacing PostgreSQL with the H database You can find a working version of the EmbeddedKafka in the branch “embeddedKafka my naming skill is highly imaginative Admittedly in terms of timing the minimalistic setup with EmbeddedKafka and H is pretty hard to beat The test contains the same methods as the main branch and takes on average seconds to run on my machine My version with one Kafka and one Postgres container takes on average seconds to run Now imagine how long it would run with Testcontainers Schema Registry Kafka and Zookeeper plus the database container And with more code with more complex business logic to test But for using the EmbeddedKafka you need to pay attention to the dependencies versions The Confluent Schema Registry Client comes with it s own Zookeeper version and depending on the version of the Schema Registry Client you might end up with a different version of Zookeeper than the one expected by the kafka test dependency which would result in a ClassNotFound exception when running the test For more details check the version matrix by Confluent and the Kafka client matrix by Spring So I stuck to the container setup because of version constraints In the case for this demo application it did not matter at all but to avoid unexpected behavior I recommend sticking as close to the production versions as possible And of course using the H might also not always be an option depending on what features such as constraints json datatype some join statements you use of your production database So this is a compromise regarding control and test runtime Also did I already mention it depends You can find the code on github with the main branch being the demonstration with two containers and the embeddedKafka branch being the container free version What s your experience with testing in that kind of setup Do you have questions or suggestions Do get in touch with us Image on pexels 2022-02-22 12:19:52
海外TECH DEV Community Getting Started with Robusta on Digital Ocean https://dev.to/heyrutam/getting-started-with-robusta-on-digital-ocean-3g41 Getting Started with Robusta on Digital Ocean IntroductionRobusta is an open source platform for Kubernetes troubleshooting and automation It makes it really easier to figure out pod crashes send in alerts and describe a detailed analysis report on the breakdown Just like Docker is infrastructure as code for deploying applications Robusta is infrastructure as code for maintaining Ks applications and handling their alerts If you re also wondering how to put this amazing tool into play and see it in complete action then you have just landed on the right article Today we will be setting up Robusta on our Ks cluster that is hosted using Digital Ocean Deploying a Ks cluster on Digital OceanDigital Ocean is a great cloud computing platform and it offers several cloud resource models with high scalability availability and the pay as you go model for various customer use cases Today we will be creating a Kubernetes cluster on Digital Ocean with the following steps Step Sign in to Digital Ocean or create an account if you don t have an account yet You can signup instantly and they provide credits for trial Step Once you re logged in you can find Kubernetes listed in the left navigation pane Click on that and wait till it navigates to the next dashboard Step In the Kubernetes dashboard simply click on Create a Kubernetes Cluster to start with the configuration process Step Now you need to fill up the configuration details for your cluster as per requirement However for a trial purpose you can set up with the configuration given below Select a Kubernetes Version Use the latest recommended one do Choose a Datacentre Region Use the one closest to your location Asia BLR for me VPC Network Leave it at defaultChoose Cluster Capacity   Node Pool Name Set as per your choice or leave it at default  Machine Type Basic Nodes We don t need Premium instances for a trial Node Plan month per Node GB Total vCPUs   Node Count Finalize    Name Leave at default  Project Leave at default  Tags Leave them empty as wellNow click on Create Cluster and wait till it is provisioned takes usually mins Step Now it s time to set up a few things for our cluster before we dive into the Robusta installation on top of it Getting Started Click on Get started On the next screen that appears we need to choose a client that we want to use to interact with our cluster Also we need to set up an authentication certification method to authorize the client to connect to our clusters which lasts for days Connecting to Kubernetes You can either set up an automated way of doing this or a manual way where you need to download the cluster config file every days and run the below command putting the config file in your kube folder in your system We would proceed with the manual method for now cd kube amp amp kubectl kubeconfig Name of your config file get nodesThis should return you the list of nodes for your cluster NOTE If you want to set up the automated mode then you need to install and configure the doctl first You can find the installation steps here Patch amp minor upgrades You can opt for patches and minor version upgrades in this window Simply select Automatically install minor version patches and specify a time window when the cluster should upgrade Click on Save and Continue Install click Apps Here you can choose and install apps in your cluster directly from the marketplace You can skip it for now Next Steps Now we are done with our configuration You can simply download the cluster config and store it safely and click on Great I m done to complete the configuration process Installing Robusta on our ClusterAs our cluster is provisioned and fully configured now we will now start installing Robusta using their seconds Install procedure Step We need to install the Helm chart and the Robusta CLI first We can do that by running the following command helm repo add robusta amp amp helm repo updatepip install U robusta cli no cacheStep Now we need to generate a config file for Robusta While we fetch the config file we can also enable the Robusta UI and slack teams integration to receive alerts when something fails robusta gen configThere will be a number of inputs required from your end to run this command successfully You can follow the snippet below You need to authorize the Slack integration and specify the workspace and the respective channel where you want to integrate and receive the alerts Once you have authorized you will be redirected to the page below and then you can proceed in your terminal with the remaining ones Once all the steps are completed successfully a generated values yaml file is generated that contains your Robusta account credentials Store it safely for future use You should also receive an alert in your workspace channel that Robusta has been added there Step Now we are gonna install Robusta using Helm The generated values yaml would act as the values yaml for helm here helm install robusta robusta robusta f generated values yamlThis should install robusta successfully in your cluster NOTE If the above command errors out saying Unable to connect to the server then cross check the config file in the kube folder and make sure it has the same details as your downloaded cluster config file Step Now run the command below to verify whether Robusta is deployed or not in the current namespace kubectl get pods Testing alerts for a Crashing PodNow that we have successfully deployed Robusta it s time to see it in action We will now deploy a crashing pod and check whether we get alerts in slack after it fails twice We will also go to the UI to fetch the other details Step We will now create a crashing pod kubectl apply f Step Now run the following to check whether the crashpod is deployed and has reached restarts or not that would trigger an alert in Slack Step Open slack and check in the specified workspace s channel whether you have received an alert or not Step It s time to move to the UI now Navigate to and log in using the same Gmail that you mentioned while generating the Robusta config file Once you are logged in you can see the dashboard with all the pods in all namespaces and the ones with issues or errors are marked as well You can also click on each pod card and dive in for more information on the errors or issues with all the details and timestamps i e a complete analysis of the breakdown if any Well we have reached the end of this extensive tutorial Time to give a pat on your back for following along and successfully utilizing such an amazing tool Robusta I hope all of you found this really helpful and it covered almost all minute details that you may come across Feel free to like this article and drop in any comments or suggestions you may have NOTE All the dashboard images used here are the respective properties of Digital Ocean and Robusta They are used here only for illustrative purposes 2022-02-22 12:19:47
海外TECH DEV Community Getting started with Azure Policies https://dev.to/karnatisrinivas/getting-started-with-azure-policies-e44 Getting started with Azure Policies Azure PolicyAzure Policy is a service in Azure which allows you create polices which enforce and control the properties of a resource When these policies are used they enforce different rules and effects over your resources so those resources stay compliant with your IT governance standard Through its compliance dashboard it provides an aggregated view to evaluate the overall state of the environment with the ability to drill down to the per resource per policy granularity Azure Policy uses a JSON format to form the logic the evaluation uses to determine whether a resource is compliant or not Policy definition is the conditions which you want controlled There are built in definitions such as controlling what type of resources can be deployed to enforcing the use of tags on all resources These are the business rules described in JSON format Policy assignment is the scope of what the policy definition can take effect around Scope of assignment can be assigned to a individual resource resource group or management group Policy assignments are inherited by all child resources Azure InitiativeAn Azure initiative is a collection of Azure policy definitions that are grouped together towards a specific goal or purpose in mind Azure initiatives simplify management of your policies by grouping a set of policies together as one single item Sometimes also called as Policyset Assign a PolicyTo enforce the Complaince with Azure Policies we need to assign the policy In this example we assign the built in policy definition called Allowed locations to ensure that resources are created in the specific region only Go to the Azure portal to assign policies Search for and select Policy Select Assignments on the left side of the Azure Policy page An assignment is a policy that has been assigned to take place within a specific scope Select Assign Policy from the top of the Policy Assignments page On the Assign Policy page and Basics tab select the Scope by selecting the ellipsis and selecting either a management group or subscription Optionally select a resource group A scope determines what resources or grouping of resources the policy assignment gets enforced on Then select Select at the bottom of the Scope page Resources can be excluded based on the Scope Exclusions start at one level lower than the level of the Scope Exclusions are optional Select the Policy definition ellipsis to open the list of available definitions You can filter the policy definition Type to Built in to view all and read their descriptions Select Allowed locations If you it type locations into the search box and then press ENTER or select out of the search box Select Select at the bottom of the Available Definitions page once you have found and selected the policy definition The Assignment name is automatically populated with the policy name you selected but you can change it Leave Policy enforcement as Enabled Select the Parameters tab at the top of the wizard In the Allowed locations you need to select the locations in which you want your resources to be created We will leave the rest of the values as default Select the Review create tab at the top of the wizard Review your selections then select Create at the bottom of the page To test our Policy Let s create two logic apps one in US region and another in India To create a logic apps click on Add resource gt Search for logic appsOn the Basics tab select Your subscription Resource group Region here I selected South India I will leave all the remaining details as default We will review and create the Logic app As you can see the deployment is completed Repeat the same for the US region the details of resource are as followsThough it is not allowed in Policy Definition validation will be successful Let s try to deploy the resource As you can see the Deployment is failed due to Disallowed by the Policy 2022-02-22 12:16:49
海外TECH DEV Community What standards can do for your engineering organisation https://dev.to/kreuzwerker/what-standards-can-do-for-your-engineering-organisation-3k1j What standards can do for your engineering organisationWritten by Joern BarthelPublished on April th An anecdote about adapting lessons from traditional engineering to the software industryThe software industry includes a lot of metaphors that stem from traditional engineering fields What software engineers seem to lack however is an appreciation for good standards and the slow but steady work of measuring and improving them This practice seems to be front and center of well known production systems such as the one Toyota uses The question is can we adopt some of them The software industry often does not feel very industrial We call ourselves engineers We re doing Kanban or Scrum planning sessions We incorporate and document lessons learned and if we re really mature do continuous improvement processes of some sort But is there something such as a general process to get good results To iterate towards good results Or is the process in essence “if you want to get good results do it with good people aka no process at all In order to get a more lateral angle on this questions I participated in a series of Toyota Production System workshops for engineers interested in an on hands experience of the production processes at Toyota and it s first and second tier suppliers Needless to say I am not a subject matter expert and this obviously taints the potential lessons I can take away from this experience I nevertheless found some aspects quite instructive specifically where they align at least anecdotally to our experience as consultants The most relevant take away is perhaps the customer focus that should not surprise anyone familiar with the customer obsession of organizations such as e g Amazon Web Services For these TPS practitioners quality is front and center because that is what customers demand “Work is not something that you think is good enough it s that your customer is satisfied In their world testing is also something that is never done by dedicated departments that are detached from the actual work but by the engineers themselves The QA department is just picking random samples and publishing statistics and adjusted by changes in process if something changes checks are increased Since quality is the driving force the followup questions become how can high quality be guaranteed The TPS answer is creating and improving standards Results are compared against the standard and either results or the standard receives improvement And while this process is mandated from the very top of every organization it is owned on the shop floor In many cases the top management participates in improvement meetings once a month and thus makes sure that the process is alive and kicking The team lead s job is peculiar in this setup they are usually not necessarily the best engineers but the best motivators Their job is the integration of standards and keeping everyone on sticking to as well as appreciating the process Enabling and making the time for continuous improvements requires defenders and this is primary the team lead s job The importance of this position is significant team leads typically receive a lot of training in order to be able to fulfill their responsibilities Continuous improvement processes never work “as is they need the attention of the top management and must be kept alive by those who work with them Standards and their continuous improvement have other benefits apart from quality as well Cost for example generally tends to go up cleaning up the waste of the non value adding parts of the process improves the margins necessary to keep the lights on Another impact is the creation of a blameless organization if everyone sticks to the process the people are never at fault It also enables junior engineers to quickly get on board and last year s hires to train this year s hires The most crucial aspect of the continuous improvement cycle is the monitoring of its improvements In general two aspects are emphasized visual management and the quick availability of escalation paths Quality and customer feedback is always made very visible directly on the shop floor and fast feedback cycles are front and centre of every process No one is rushing but nobody s idle either This is a strong visual cue or business KPI that things are in order for a given process In summary people and standards drive the investment priorities of TPS shops Obviously the people part at least salary wise applies to the software industry as well But training and standards And if training for what specific standards Are we as an industry ready to admit that not every project is a work of art that cannot be constrained by standards We at kreuzwerker believe that the answer is yes One approach that we often recommend because of it s scope ambition and general applicability is the AWS Well Architected Framework Since this framework has been at the core of the AWS set of engineering standards In the beginning it covered mostly technical aspects but has introduced more and more process and organizational issues over the years The key features of the TPS as discussed in this anecdotal blog post are all there fast feedback observability documentation continuous improvement including technical patterns to archive fault tolerance or more secure delivery architectures Together with the Well Architected Review Tool workload owners and their executives can leverage Well Architected Reviews in an iteration fashion This enables teams and executives to understand where they are on the road to better quality and eventually to better customer outcomes Are you interested in learning how to leverage Well Architected Review and the Well Architected Review tool in your organization And how it can benefit your transformation to a more agile organization Reach out to aws leads kreuzwerker de we re happy to help Cover by Isis França on Unsplash 2022-02-22 12:15:17
海外TECH DEV Community Is GitOps Just for Kubernetes? https://dev.to/thenjdevopsguy/is-gitops-just-for-kubernetes-4p8c Is GitOps Just for Kubernetes GitOps is arguably one of the biggest buzzwords in thus far yet there s a good reason for it because it actually works One question that s probably Googled the most for GitOps is is it just for Kubernetes The answer is sort of yes but also sort of no In this blog post I answer the question around what GitOps is actually used for and why it s important for not just Kubernetes but configurations as a whole What is GitOps Way back in the early days which in tech is about minutes ago Configuration Management was huge A lot of organizations were and still are focusing on Configuration Management If you have a server that needs some application installed or a piece of the software running on it Configuration Management is a pretty good way to go It makes your life as an engineer easier because of automation and repeatable processes In large organizations that have been around for a while Configuration Management is still very much in demand and isn t going away However in smaller organizations Configuration Management isn t used as much The reason why is because of different technologies being brought in which include ServerlessContainersKubernetesAs a smaller organization or a startup it s much easier to go with the “latest and greatest because you have no tech debt that needs to be cleaned up However with the “latest and greatest comes new challenges for example how does the organization know what s the “right configuration or the configuration that should stay as is Essentially the source of truth they have source control may or may not be what s out in the wild With GitOps that changes GitOps looks at your source control repository like GitHub and scans it to confirm that what s out in production or even in a development environment is the version of the software that s supposed to be deployed If something is manually changed in that environment GitOps says hold on a second this doesn t look right Let s get the right configuration to that environment via what s in source control How It s Used in KubernetesNow that you know what GitOps is and why an organization may want to utilize it let s talk about how it s used today Say you have an application that s running in a container and is orchestrated with Kubernetes To keep things simple say it s a frontend app running in Nginx For Nginx to run properly you have an nginx conf file that has all of the website and frontend configurations and it can also include load balancing configurations What if someone went into the nginx conf file to try to troubleshoot a frontend issue and they accidentally changed the load balancing configuration That would be an issue if say user load started ramping up on your website and the single Nginx Kubernetes deployment started to get bogged down If the nginx conf file is in source control like GitHub GitOps will look at it and say wait a minute the configuration in production for this nginx conf file and what s in source control doesn t match up Let s re deploy the nginx conf file The idea of GitOps is that it s your communicator between a Kubernetes environment and wherever you re storing code like in GitHub How It s Used ElsewhereThe truth is you ll most likely use some sort of Kubernetes cluster available for GitOps Whether that cluster is on prem in the cloud or some type of “serverless Kubernetes service like Google Kubernetes Engine GKE AutoPilot However GitOps isn t just managing the Kubernetes cluster It s managing a lot more from a declarative perspective ApplicationsInterfacesEach environmentDataMonitoringRealistically whatever is in source control GitOps would manage The ultimate goal with GitOps is that the entire system is managed declaratively not just the apps GitOps is pretty much a cleaner version of Configuration Management 2022-02-22 12:13:38
Apple AppleInsider - Frontpage News Apple Car autopilot system rumored to be connected to new Korean supplier https://appleinsider.com/articles/22/02/22/apple-car-autopilot-system-rumored-to-be-connected-to-new-korean-supplier?utm_medium=rss Apple Car autopilot system rumored to be connected to new Korean supplierA new report claims that Apple has been working with an unspecified South Korean partner to develop an autopilot processor for the rumored Apple Car Apple has recently been reported to be surveying South Korean suppliers for Apple Car parts However now it s claimed that the company has already been working with one for almost a year According to The Elec an OSAT outsourced semiconductor assembly and test company has been working with Apple on an autopilot chip module Read more 2022-02-22 12:39:47
Apple AppleInsider - Frontpage News Alternative App Store payment service in holding pattern, waiting for Apple to change https://appleinsider.com/articles/22/02/22/alternative-app-store-payment-service-in-holding-pattern-waiting-for-apple-to-change?utm_medium=rss Alternative App Store payment service in holding pattern waiting for Apple to changeA company aiming to take a share of Apple s App Store payments has signed up developers for the service but the founder believes that Apple is dragging out the process of allowing the payments unnecessarily Paddle aims to provide developers with an alternative to the existing App Store in app purchases system While it waits for Apple to open up to third party payments generally it has managed to get a fairly sizable following already Approximately developers have signed up for Paddle with the group accounting for over billion in App Store in app payments reports Business Insider CEO Christian Owens says this demonstrates there is a demand from developers to work with customers away from Apple s ecosystem Read more 2022-02-22 12:31:35
Apple AppleInsider - Frontpage News Apple's smart fabric research points to wearable tech beyond Apple Watch & AirPods https://appleinsider.com/articles/22/02/22/apples-smart-fabric-research-points-to-wearable-tech-beyond-apple-watch-airpods?utm_medium=rss Apple x s smart fabric research points to wearable tech beyond Apple Watch amp AirPodsNew research building on older work demonstrates that Apple is working out how to weave sensors and switches into fabric which could then be used for smart bags furniture clothing and more Apple has previously been granted patents including ones for making fabric buttons for a HomePod Now a newly revealed patent describes very many uses for fabric that has sensors and other devices embedded in it Fabric control device is chiefly concerned with the detail of embedding anything within fabric Apple already has form on this broad idea with previous patents granted to it for smart Apple Watch woven bands or buttons Read more 2022-02-22 12:18:17
海外TECH Engadget OnwardMobility is dead, and so are its plans to release a 5G BlackBerry phone https://www.engadget.com/blackberry-5g-is-dead-125052260.html?src=rss OnwardMobility is dead and so are its plans to release a G BlackBerry phoneThere s won t be a big revival for BlackBerry phones anytime soon OnwardMobility the Austin based startup that announced its plans to release a G BlackBerry device with a physical keyboard back in is shutting down The company posted a notice of its closure on its website making it clear that it won t be proceeding with the development of the smartphone This comes a month after it responded to people asking about the status of the project with a blog post entitled quot contrary to popular belief we are not dead quot While OnwardMobility didn t expound on the reason behind its closure Android Police reported a few days ago that its license to use the BlackBerry name had been canceled Apparently BlackBerry wants to distance itself from its past as a smartphone manufacturer after it sold off its remaining mobile patents for million in the beginning of February OnwardMobility reportedly decided not to push through with the development of a new smartphone without the BlackBerry name especially since it won t be easy entering the market with an ongoing global component shortage nbsp OnwardMobility was never able to release images of the phone it was developing but it was reportedly going to take design cues from the BlackBerry Priv As Android Police notes the Priv was BlackBerry s first Android phone and the only one it designed in house before it outsourced the production of its mobile devices to TCL If BlackBerry in its current form truly does want to distance itself from its past then we might never see a new BlackBerry branded phone again 2022-02-22 12:50:52
海外TECH Engadget The Morning After: You can’t copyright AI-created art https://www.engadget.com/the-morning-after-you-cant-copyright-ai-created-art-121553748.html?src=rss The Morning After You can t copyright AI created artWelcome back The US Copyright Office USCO is again refusing to grant copyright for a work of art that was created by an artificial intelligence system Dr Stephen Thaler attempted to copyright a piece of art titled A Recent Entrance to Paradise claiming in a second request for reconsideration of a ruling that the USCO s “human authorship requirement was unconstitutional Current copyright law only offers protections to quot the fruits of intellectual labor that “are founded in the creative powers of the human mind according to the USCO For now AI has the same access to copyrighting as monkeys that s to say none at all Mat SmithThe biggest stories you might have missedMovie review Uncharted boldly goes nowhereLenovo s new Smart Clock Essential with Alexa is percent off at AmazonTwitch adds a long promised Play on Luna buttonPanasonic s megapixel GH is the highest resolution Micro Four Thirds camera yet Final Fantasy free trial returns on February ndCapcom teases Street Fighter Expect more details in the coming months CapcomCapcom has announced the development of Street Fighter revealing a teaser trailer featuring Ryu and Luke a key DLC character appearing at the end of Street Fighter V The game was announced following Capcom s Pro Tour fighting game exhibition but there s not much more to report at this moment Check out the teaser all forty seconds of it Continue reading Trump s social network has launched on iOSRemember Truth Social Donald Trump s Twitter like social media platform has launched on the Apple App Store The launch will mark the former president s return to social media Twitter and Facebook banned Trump following the January th attack on the US Capitol nbsp People can use the network to post “Truths the platform s equivalent to tweets and it s possible to reshare posts on one s timeline to expand their reach The executive who answered questions from beta users said the company was working on a verification policy that it would publish “in the coming weeks Continue reading No Spotify didn t pull Joe Rogan s podcastThe company says a technical problem is to blame Don t panic if you couldn t play The Joe Rogan Experience over the last few days on Spotify The streaming service has confirmed to Engadget that a quot technical issue quot prevented users from playing a number of Spotify podcasts including Joe Rogan s and The Ringer shows like The Bill Simmons Podcast It s bad timing following controversy over misinformation in Spotify s podcasts like Rogan s which has been accused of spreading and tolerating false claims about COVID vaccines The company has now addressed the technical problem and the episodes are back online Continue reading Watch one final Elden Ring trailer before it arrivesThe action RPG comes out on February th With less than a week before Elden Ring s February th release date publisher Bandai Namco has shared a new “Overview trailer detailing the many systems of FromSoftware s latest action RPG The clip features nearly six minutes of edited gameplay footage that appears thankfully spoiler free In case you haven t been paying attention George R R Martin author of Game of Thrones helped Dark Souls and Bloodborne mastermind Hidetaka Miyazaki create the world of the game Continue reading 2022-02-22 12:15:53
海外TECH CodeProject Latest Articles Streaming at Scale with Azure Event Hubs, Streaming Analytics, and Azure SQL Part 1: Getting Streaming Data into Azure https://www.codeproject.com/Articles/5325168/Streaming-at-Scale-with-Azure-Event-Hubs-Streaming Streaming at Scale with Azure Event Hubs Streaming Analytics and Azure SQL Part Getting Streaming Data into AzureHow to write a Python app to ingest weather data into Azure using an Azure Event Hub 2022-02-22 12:51:00
ニュース @日本経済新聞 電子版 「受験生の間で差がつかず、合否判定に使いにくい」。記録的な低得点だった大学入学共通テスト。試験デザインとして失敗と専門家は指摘しており、問題作成の考え方にまで遡って再点検する必要があります。 https://t.co/KdOgVdDToF https://twitter.com/nikkei/statuses/1496100005408657410 「受験生の間で差がつかず、合否判定に使いにくい」。 2022-02-22 12:30:12
ニュース @日本経済新聞 電子版 エンビジョンAESC、航続1000キロEV電池を24年量産 https://t.co/WfUEYLOLVg https://twitter.com/nikkei/statuses/1496098029400911872 電池 2022-02-22 12:22:21
ニュース @日本経済新聞 電子版 プーチン大統領、演説ににじむ偏った歴史観 https://t.co/cIiXesZWlW https://twitter.com/nikkei/statuses/1496095616140996611 演説 2022-02-22 12:12:45
ニュース @日本経済新聞 電子版 独、ロシアとのガス管認可手続き停止 ウクライナ巡り https://t.co/9kOzRzYRc8 https://twitter.com/nikkei/statuses/1496095099238764546 認可 2022-02-22 12:10:42
海外ニュース Japan Times latest articles German Chancellor Olaf Scholz halts Nord Stream 2 project https://www.japantimes.co.jp/news/2022/02/22/world/scholz-nord-stream/ germany 2022-02-22 21:06:37
ニュース BBC News - Home Boris Johnson promises first set of UK sanctions against Russia https://www.bbc.co.uk/news/uk-politics-60476137?at_medium=RSS&at_campaign=KARANGA ukraine 2022-02-22 12:14:46
ニュース BBC News - Home Ukraine-Russia tensions: Oil surges on supply fears https://www.bbc.co.uk/news/business-60473233?at_medium=RSS&at_campaign=KARANGA petrol 2022-02-22 12:37:46
ニュース BBC News - Home UK storms: Flooding and more rain may hamper recovery efforts https://www.bbc.co.uk/news/uk-60476704?at_medium=RSS&at_campaign=KARANGA clean 2022-02-22 12:09:31
ニュース BBC News - Home River Severn Flooding: Homes and businesses evacuated https://www.bbc.co.uk/news/uk-england-shropshire-60475077?at_medium=RSS&at_campaign=KARANGA shropshire 2022-02-22 12:04:50
ニュース BBC News - Home West Midlands hit by earthquake https://www.bbc.co.uk/news/uk-england-birmingham-60476022?at_medium=RSS&at_campaign=KARANGA walsall 2022-02-22 12:16:20
ニュース BBC News - Home The Hundred: Domestic and international stars retained for 2022 competition https://www.bbc.co.uk/sport/cricket/60449772?at_medium=RSS&at_campaign=KARANGA teams 2022-02-22 12:43:54
ニュース BBC News - Home Nord Stream 2: How does the pipeline fit into the Ukraine-Russia crisis? https://www.bbc.co.uk/news/world-europe-60131520?at_medium=RSS&at_campaign=KARANGA bargaining 2022-02-22 12:30:04
北海道 北海道新聞 南空知の飲食店支えた総合食品卸 河口屋94年の歴史に幕 https://www.hokkaido-np.co.jp/article/648848/ 飲食店 2022-02-22 21:18:00
北海道 北海道新聞 コロナ死者、初の300人超 過去最多、感染は6万9000人 https://www.hokkaido-np.co.jp/article/648793/ 新型コロナウイルス 2022-02-22 21:03:08
北海道 北海道新聞 本別町、中学35人学級 新年度少人数化へ教職員増員 音更は小学低学年30人に https://www.hokkaido-np.co.jp/article/648847/ 音更町 2022-02-22 21:17:00
北海道 北海道新聞 冬キャンプ「自然と一体」 トムラウシ温泉で体験ツアー始まる https://www.hokkaido-np.co.jp/article/648846/ 国立公園 2022-02-22 21:16:00
北海道 北海道新聞 独首相、ガス管稼働手続き進めず 対ロ制裁、各国が対応注目 https://www.hokkaido-np.co.jp/article/648838/ 記者会見 2022-02-22 21:13:00
北海道 北海道新聞 泊原発、近隣町村が防災訓練 オフサイトセンターの機能不全想定 https://www.hokkaido-np.co.jp/article/648824/ 北海道電力 2022-02-22 21:13:06
北海道 北海道新聞 日独首脳、ロシアを強く非難 電話会談で緊密連携確認 https://www.hokkaido-np.co.jp/article/648835/ 岸田文雄 2022-02-22 21:09:00
北海道 北海道新聞 北斗の多重衝突事故 作業完了見通せず 現場に150台 https://www.hokkaido-np.co.jp/article/648825/ 北斗市内 2022-02-22 21:06:10
北海道 北海道新聞 ミャンマー軍の留学生受け入れ 政府「矛盾しない」 答弁書閣議決定 https://www.hokkaido-np.co.jp/article/648833/ 受け入れ 2022-02-22 21:06:00
北海道 北海道新聞 暴風雪、生乳集荷に影響 根室管内廃棄の農家相次ぐ https://www.hokkaido-np.co.jp/article/648829/ 根室管内 2022-02-22 21:04:00
仮想通貨 BITPRESS(ビットプレス) マーキュリー、3/31まで「新規口座開設で3000円相当の暗号資産をプレゼントキャンペーン」実施 https://bitpress.jp/count2/3_14_13082 開設 2022-02-22 21:46:43
仮想通貨 BITPRESS(ビットプレス) [BRIDGE] Web3.0 起業家創出へ「Next Web Capital」WiLなど11億円出資、7人の若手起業家らが設立 https://bitpress.jp/count2/3_79_13081 bridge 2022-02-22 21:37:21

コメント

このブログの人気の投稿

投稿時間:2021-06-17 22:08:45 RSSフィード2021-06-17 22:00 分まとめ(2089件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)