Secure your application's configurations with fine-grained authorization using OpenFGA. Learn how to implement a simple authorization model and extend it to support more complex requirements.
Configuration management is a process for maintaining a product's performance and functional attributes with its requirements, design, and operational considerations.
In this thrilling sequel, we embark on a captivating exploration of Configu—an open-source implementation of Configuration as Code (CaC) for application configuration management.
Today's developer teams are tasked with having to manage Config Ops on the platform as well, and HashiCorp Vault is a great opportunity to show how Configu lets you only worry about your config schemas.
If you're in the realm of digital security, DevOps or software development, you're likely to be familiar with secret managers. Whether it's storing API keys, managing sensitive configuration data, or handling encryption keys, secret managers play a pivotal role in maintaining the security and integrity of your digital environment. But what exactly are secret managers, what are their pros and cons, and which are the most popular ones?
Welcome to the world of Configuration-as-Code (CaC), where automation reigns supreme, and even the most tedious tasks can be transformed into a coding extravaganza. In this post, we'll dive into the fascinating realm of "as-code" buzzwords, take a brief journey through the evolution of automation, and explore how CaC revolutionizes application configuration. So buckle up and get ready for a tech adventure!
Webhooks in Configu are commonly used for sending messages or integrating with CI/CD platforms. For example, a webhook can trigger a Github action flow when a Config is changed or notify about it in a Slack channel.
Configu: Who we are, why we’re here, what we aim to do with the time we have on this planet and why you’re investing your time reading this blog post about us.