My Blog

Empowering developers since 2015. Real articles, real insights.
Cloud and DevOps solutions that will save you hours.

    How to solve the "here-document at line 1 delimited by end-of-file (wanted 'EOF')" warning

    Recently, I ran into a frustrating issue with a shell script that uses heredocs. The closing EOF had indentation, so the shell didn’t recognize it as the closing tag. Everything after it kept getting added to the file, breaking the whole thing and the logs were showing this warning: here-document at line 1 delimited by end-of-file (wanted 'EOF') warning.

    Read the complete article

    20 essential shell commands for DevOps engineers

    Moving from software development to DevOps means the terminal is no longer just for Git commits; it’s your primary interface for production infrastructure. This guide categorizes the 20 most critical commands by their real-world utility.

    Read the complete article

    How to add a Git submodule to your repository

    A Git submodule lets you include another repository inside your own project. This is useful for reusing shared code, libraries, or dependencies across multiple projects.

    To add a submodule to your parent repository, follow these steps:

    Read the complete article

    11 configurations you must make to secure your Azure Storage Accounts

    Storage accounts are often the security weak point in an Azure environment. You must actively harden them against insider threats, data exfiltration, and external attack vectors.

    Data protection in Azure must be layered. To truly secure your data, you need a defense-in-depth strategy that covers authentication, network isolation, encryption, and recovery.

    I have compiled this 11-point non-negotiable checklist to help you lock down your Azure Storage Accounts. These configurations cover the critical control plane and data plane settings you need to implement today.

    Read the complete article

    Azure Networking - Six steps to secure network design

    Based on my experience, these are the 6 core steps that ensure your Azure network environment is not only secure today but scalable for the long term.

    Read more about my essential blueprint for building enterprise-grade Azure architectures.

    Read the complete article