Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • DevOps with Windows Server 2016
  • Toc
  • feedback
DevOps with Windows Server 2016

DevOps with Windows Server 2016

By : Modi
5 (1)
close
DevOps with Windows Server 2016

DevOps with Windows Server 2016

5 (1)
By: Modi

Overview of this book

Delivering applications swiftly is one of the major challenges faced in fast-paced business environments. Windows Server 2016 DevOps is the solution to these challenges as it helps organizations to respond faster in order to handle the competitive pressures by replacing error-prone manual tasks using automation. This book is a practical description and implementation of DevOps principles and practices using the features provided by Windows Server 2016 and VSTS vNext. It jumps straight into explaining the relevant tools and technologies needed to implement DevOps principles and practices. It implements all major DevOps practices and principles and takes readers through it from envisioning a project up to operations and further. It uses the latest and upcoming concepts and technologies from Microsoft and open source such as Docker, Windows Container, Nano Server, DSC, Pester, and VSTS vNext. By the end of this book, you will be well aware of the DevOps principles and practices and will have implemented all these principles practically for a sample application using the latest technologies on the Microsoft platform. You will be ready to start implementing DevOps within your project/engagement.
Table of Contents (12 chapters)
close

Security considerations


One of the most important consideration for Infrastructure as Code and configuration management is security. When representing infrastructure and applications for the provisioning, deployment, and configuration as code, it is quite possible to hardcode secrets and credentials within the scripts and templates, and they become part of the codebase. Even if not hardcoded within scripts and configuration documents, they might be supplied as parameters during the runtime execution by the Operations team. Either they would know the secrets beforehand or would get them from an IT administrator. In both cases, there is a possibility of security compromise.

Security is an inherent component of Infrastructure as Code for our sample application. To ensure that there are no security leaks, enough consideration and best practices are deployed while designing the artifacts. These are enterprise-scale security considerations and should be used in almost all cases. This chapter will...

bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete