El teléfono está muerto. Larga vida. . . ¿Qué exactamente? – ButterWord

"We're not going to be using iPhones in 10 years," Callaghan says flatly. "I kind of don't think we'll be using them in five years."

ButterWord

⚡ Multiple modes: edit files in-place, encrypt/decrypt stdin/stdout, exec-env for secrets in environment variables

📋 Configuration via .sops.yaml with path-based rules for automatic key selection per environment (dev/prod)

🔗 Integrates with #HashiCorp Vault transit backend for enterprise key management

📊 Key rotation, auditing to PostgreSQL, and publishing to S3/GCS/Vault supported

⭐ 20k stars on #GitHub | MPL-2.0 license

🔗 https://github.com/getsops/sops

GitHub - getsops/sops: Simple and flexible tool for managing secrets

Simple and flexible tool for managing secrets. Contribute to getsops/sops development by creating an account on GitHub.

GitHub
🚀 Terraform Day 11: Làm Chủ Hàm Đ内置 để Viết IaC Thông Minh hơn
Terraform không hỗ trợ hàm tùy chỉnh, vì vậy việc nắm vững các hàm tích hợp là then chốt để viết mã infrastructure rõ ràng, linh hoạt và tái sử dụng tốt.
🔍 Học về: Hàm chuỗi, số, collection, chuyển đổi kiểu, ngày giờ
🛠️ Ứng dụng thực tế: Đặt tên tài nguyên AWS hợp lệ, xử lý đa môi trường với lookup(), dùng for-expression & interpolation
✅ Tránh lỗi, tăng tự động hóa
#Terraform #IaC #DevOps #AWS #HashiCorp #TerraformDay11

HashiCorp Vault – công cụ quản lý bí mật chủ chốt cho DevSecOps. Lưu trữ, mã hoá, tạo bí mật động, kiểm soát truy cập theo vai trò, quay vòng tự động và ghi log audit. Tích hợp dễ dàng vào CI/CD và các nền tảng cloud. Phiên bản Community mở nguồn, Enterprise có tính năng nâng cao. #HashiCorp #Vault #DevSecOps #Security #SecretsManagement #DevOps #Cloud #OpenSource #CôngNghệ #BảoMật

https://dev.to/haresh_511/hashicorp-vault-a-core-security-tool-in-devsecops-133m

HashiCorp Vault: A Core Security Tool in DevSecOps

HashiCorp Vault: A Core Security Tool in DevSecOps As organizations increasingly adopt...

DEV Community
Terraformで作業がちょっと楽になる小技(compact / for_each / ignore_changes) - Qiita

初めに お疲れさまです。オオタケです。 現在、Terraform を使用した現場に従事しており、その中で便利だと感じた関数やオプションについて、備忘も兼ねてまとめます。 compact() compact() を使うことで、リスト内に ""(空文字)や null が含ま...

Qiita
Really annoyed that with #Hashicorp/ #IBM's rogue licensing change, it has killed all interest I had in exploring #Nomad as an alternative to #Kubernetes. It had so much promise. Also, #Consul.
Our company is setting up a #HashiCorp #Vault cluster in #Azure. It's currently set up to use #KeyVault auto-unseal.
Our SOP for restoring the cluster in case of data corruption or failure is to shut down Vault and delete the data on all the instances, reinitialize on one instance, download a snapshot from Azure Storage to that instance, restore that snapshot with quorum forcing, and bring the other instances back online.
#SRE #DevOps #DevSecOps (1/3)

#KubeCon isn't the only conference going on this week -- there's also the Technology Business Management (TBM) Council conference (#TBMC25) in Miami, where Apptio, is publicizing its latest collaboration with #HashiCorp, #Cloudability Governance.

This tool, also demonstrated during #HashiConf, injects #FinOps tagging and policy guardrails using #Terraform run tasks, and feeds #IaC data back into the Cloudability UI for monitoring. And there's more to come with Project infragraph. https://www.techtarget.com/searchitoperations/news/366634306/IBM-Apptio-deepens-FinOps-ties-with-HashiCorp-Terraform

IBM Apptio deepens FinOps ties with HashiCorp Terraform

Cloudability Governance succeeds last year's CostGuard, with FinOps tagging policy enforcement in Terraform and bidirectional data sharing.

TechTarget

Immerhin, was Preise angeht passt #hashicorp ja prima zu IBM. Wie schaut es mit dem Support aus? Ist der von IBM auch vollkommen nutzlos (d.h. Microsoft approved)?

Die Release Quality der letzten Hashicorp Vault Releases lässt darauf schließen das jetzt Anwälte und Vertriebler das Testing der Software machen.

Beispiel: https://github.com/hashicorp/vault/issues/31606

Seit 2 Wochen im neuen Release leere KV Stores im Dashboard, Daten sind aber noch da (z.b. per API).

Vault 1.21 | Double slash in API call when listing KV items in UI · Issue #31606 · hashicorp/vault

Describe the bug Since version 1.21.0 we see a double slash at the end of the API call when listing KV paths when using the UI. Vault 1.20.4: /v1/secret/metadata/some/path/?list=true Vault 1.21.0: ...

GitHub

[Перевод] Terraform Actions: Глубокое погружение

Terraform Actions — это новая концепция, представленная в Terraform 1.14, которая позволяет выполнять операции вне стандартного рабочего процесса CRUD (Create-Read-Update-Delete). Это расширяет возможности Terraform, позволяя взаимодействовать с ресурсами способами, для которых раньше требовались другие инструменты, например Ansible.

https://habr.com/ru/articles/956966/

#terraform #terraform_actions #iac #infrastructure_as_code #aws #devops #hashicorp

Terraform Actions: Глубокое погружение

Terraform actions — это новая концепция языка в Terraform 1.14 , официально анонсированная на HashiConf 2025 в Сан-Франциско. Terraform actions разрабатывались открыто, так что вы, возможно, уже...

Хабр