Introduction This blog post looks at sequence diagrams in general, how utilizing techniques like diagrams as code can bring them under source control, and what…
Leave a CommentCategory: architecture
Introduction This blog post will examine domain events, what they are, how they are identified during event storming, and their impact on domain modeling. Domain…
Leave a CommentIntroduction In my blog post, https://fredrkl.com/blog/privileged-identity-management-for-azure-resources/, I looked at privileged identity management in Azure, specifically for Azure resources. This gives users time-limited access to certain…
Leave a CommentIntroduction Creating diagrams is essential for understanding and discussing complicated structures and processes in software development, but creating and maintaining them can be tedious and…
Leave a CommentIntroduction I have previously blogged about the book Software Architecture for Developers by Simon Brown, where he breaks Software architecture into structure and vision. I…
Leave a CommentIntroduction In the blog post-https://fredrkl.com/blog/private-aks-access/, I mentioned the Azure Bastion service to safely and securely access a jump-host with only private IP. But what security…
Leave a CommentIntroduction There are many ways to create a secure internal developer platform, e.g., following the aspect-oriented programming model and giving the developers free guardrails and…
Leave a CommentIntroduction In this blog post, we will explore the security considerations on whether or not to use a private or public K8s API server when…
Leave a CommentIntroduction While studying logic at University, I picked up a concept that changed my thoughts about software development. I don’t know how it translates to…
Leave a CommentIntroduction I am evaluating the use of Mozilla SOPS or Sealed Secret for a new K8s project that will be heavily based on GitOps. See…
Leave a Comment