Resolving “git fetch” SSL certificate problem on windows machine

Hi Cloud Marathoner friends,

A few days ago, I got the following error when attempting to run a Git command:

Problem

“fatal: unable to access ‘https://github.com/ElYusubov/Learn-Bicep.git/‘: SSL certificate problem: unable to get local issuer certificate”

This issue originated from the fact that git by default uses the “Linux” crypto backend.

However, there is a simple solution, from the beginning of version Git on Windows 2.14, you can configure Git to use SChannel. This is a built-in Windows networking layer as the crypto backend. In other words, the Windows networking layer will be used with the Windows certificate storage mechanism and you are not required to configure the curl CA storage mechanism.

If you would like to dig into more technical details, then here is the full article on this topic: https://msdn.microsoft.com/en-us/library/windows/desktop/aa380123(v=vs.85).aspx

Solution

Fortunately, you don’t have to change anything in your Windows environment, just run the following Git command: “git config –global http.sslbackend schannel”.

Let me know if that helped with your problem and keep me in the loop if you had a similar problem.

[Book Review] What you need to know about Kubernetes Best Practices: Blueprints for Building Successful Applications on Kubernetes, 2nd edition ⁉ πŸ€”

Hello friends,

A few weeks ago, I received a book from Microsoft – “Kubernetes Best Practices: Blueprints for Building Successful Applications on Kubernetes”, authored by Brendan BurnsEdward VillalbaDavid Strebel and Lachlan Evenson, and in this post, I will review and share my observations and impressions with the #cloud#community.

The key strength of Kubernetes lies in its modularity and versatility. Virtually any type of application you aim to deploy can be accommodated within the Kubernetes framework, and it can handle a wide range of adjustments or optimizations to meet your specific requirements.

However, this adaptability and generality do come with a trade-off – a moderate level of complexity. It’s essential to have a solid grasp of how Kubernetes’ APIs and components function to unlock its full potential for simplifying application development, management, and deployment. Equally critical is understanding how to seamlessly integrate Kubernetes with various external systems, such as on-premise databases and continuous delivery pipelines, to make it a practical solution in real-world scenarios.

Throughout this book, authors strived to offer insights based on real-world experience, covering topics that are likely to be encountered by cloud engineers and developers, whether they are new to Kubernetes or seasoned administrators. Whether you’re exploring a new area to become an expert or seeking a refresher on familiar challenges, authors aim is to facilitate your learning journey.

By following these best practices, you can tap into authors’ collective experience to avoid common pitfalls, enhance performance and security, and gain the confidence to maximize the benefits of Kubernetes.

Thank you for reading my short review of the book, as it looks like a solid resource for real-world endeavors of cloud engineering and development!

Did you read any related book recently that made an impact on you❓
Please, share your feedback in the comments πŸ’¬

Please, check my LinkedIn post to share your feedback. Thanks.

[Book Review] What you need to know about Cloud Native Software πŸ” Security Handbook ⁉ πŸ€”

Hello, Cloud Marathoners!

A couple of days ago, I received a book from Packt – “Cloud Native Software Security Handbook”, authored by Mihir Shah and in this post, I will review and share my observations and impressions with the #cloud#community.

This book starts covering the Foundations of Cloud Native by exploring the tools and platforms offered by CNCF while providing a high-level stage for the rest of the book. Subsequently, the author dives into explaining AppSec culture and how to approach security implementation in cloud-native environments primarily using toolings like K8S, Calico, K9s, Falco, OPA Gateway, and others which I will be mentioning below.

I liked the Cloud Security Operation chapter where open-source tooling sets like Elasticsearch, Fluentd, Kibana, Prometheus, Helm, and K8S have been used to streamline security operations with automation playbooks to minimize human interventions and errors.

In addition, this book covers legal, compliance, and vendor management aspects of cloud-native software security by emphasizing its hidden cost and importance as important as mastering technical skills.

This book also provides code samples, available for online access which is a big plus.

My suggestion would be the addition of more advanced use cases and code samples in the second edition of this book.

Did you read any related book recently that made an impact on you❓
Please, share your feedback in the comments πŸ’¬

Please, check myΒ LinkedIn postΒ to share your feedback. Thanks!