<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Praveen Kumar</title>
    <description>The latest articles on DEV Community by Praveen Kumar (@pk-devops).</description>
    <link>https://dev.to/pk-devops</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F417223%2Ff571a3c5-ae05-47b5-9bad-39ce904164cd.png</url>
      <title>DEV Community: Praveen Kumar</title>
      <link>https://dev.to/pk-devops</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/pk-devops"/>
    <language>en</language>
    <item>
      <title>Microsoft Azure Sentinel</title>
      <dc:creator>Praveen Kumar</dc:creator>
      <pubDate>Tue, 02 May 2023 14:59:21 +0000</pubDate>
      <link>https://dev.to/pk-devops/microsoft-azure-sentinel-7i5</link>
      <guid>https://dev.to/pk-devops/microsoft-azure-sentinel-7i5</guid>
      <description>&lt;p&gt;IF you are working as SOC or DevSecOps in Cloud environments, we are need to ensure and highly responsible for security management capabilities.&lt;/p&gt;

&lt;p&gt;Here some is the topic like &lt;strong&gt;SIEM&lt;/strong&gt; (Security Information and Event Management) &lt;strong&gt;SOAR&lt;/strong&gt; (Security Orchestration and Automated Response).&lt;/p&gt;

&lt;p&gt;For above topics like SIEM and SOAR we have Microsoft Azure Sentinel in Public cloud is of the right solution to manage with minimal Administrations and flexible pricing model&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SIEM&lt;/strong&gt; - Tool that an organization uses to &lt;strong&gt;collect, analyze, and perform security operations&lt;/strong&gt; on its computer systems. Those systems can be hardware appliances, applications, or both&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Log management&lt;/strong&gt;: The ability to collect, store, and query the log data from resources within your environment&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Alerting&lt;/strong&gt;: A proactive look inside the log data for potential security incidents and anomalies&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Visualization&lt;/strong&gt;: Graphs and dashboards that provide visual insights into your log data&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Incident management&lt;/strong&gt;: The ability to create, update, assign, and investigate incidents that have been identified&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Querying data&lt;/strong&gt;: A rich query language, similar to that for log management, that you can use to query and understand your data&lt;/p&gt;

&lt;p&gt;Microsoft Sentinel in General term, cloud-native SIEM system used by SOC to &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--W84WoMZc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m1ossdkl9ts6fur367j1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--W84WoMZc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m1ossdkl9ts6fur367j1.png" alt="Image description" width="742" height="691"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Getting insights across by collecting data&lt;/li&gt;
&lt;li&gt;Detect and investigate threat by using &lt;strong&gt;advanced built in Machine Learning and Microsoft threat Intelligence&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Automate response by using playbooks and natively incorporates Azure Logic Apps and Log Analytics which enhances its capabilities&lt;/li&gt;
&lt;li&gt;Unlike an traditional Sentinel &lt;strong&gt;no worries about installation in servers or on premises&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Microsoft Sentinel is a service that you deploy in Azure. You can get &lt;strong&gt;up and running with Sentinel in just a few minutes&lt;/strong&gt; in the Azure portal&lt;/p&gt;

&lt;p&gt;Four Stages of Sentinel&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Collect (Visibility)&lt;/li&gt;
&lt;li&gt;Detect (Analytics, Hunting)&lt;/li&gt;
&lt;li&gt;Investigate (Incidents)&lt;/li&gt;
&lt;li&gt;Respond (Automations)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---vBMESB0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/re82fdgk6ox11gi3toe3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---vBMESB0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/re82fdgk6ox11gi3toe3.png" alt="Image description" width="800" height="195"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Collect Data&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;collect data on all users, devices, applications, and infrastructure both on-premises and across multiple cloud environments. It can easily connect to security sources out of the box&lt;/li&gt;
&lt;li&gt;There are several connectors available for Microsoft solutions that provide real-time integration&lt;/li&gt;
&lt;li&gt;It also includes built-in connectors for third-party products and services (non-Microsoft Solutions)
&lt;strong&gt;Data connectors&lt;/strong&gt; are many
    * Syslog
    * Common Event Format (CEF)
    * Trusted Automated eXchange of Indicator Information (TAXII) (for threat intelligence)
    * Azure
    * AWS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yFtWKqJ2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bgp7xoz0rer20ox8n1nz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yFtWKqJ2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bgp7xoz0rer20ox8n1nz.png" alt="Image description" width="800" height="471"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Detect Threats&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;can detect threats and minimizes false positives by using analytics and threat intelligence drawn directly from Microsoft. Azure * * Analytics plays a major role in correlating alerts into incidents identified by the security team&lt;/li&gt;
&lt;li&gt;It provides built-in templates directly out-of-the-box to create threat detection rules and automate threat responses&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Investigation Suspicious Activities&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;can investigate and hunt suspicious activities across the environment. It helps reduce noise and hunt for security threats&lt;/li&gt;
&lt;li&gt;Use Artificial Intelligence to proactively identify threats before an alert  trigger across the protected assest to detect suspicious activities&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Respond&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;can react smoothly and respond quickly to built-in orchestration incidents, and common and frequent tasks can easily be converted into automation&lt;/li&gt;
&lt;li&gt;capable of creating simplified security orchestration with playbook&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Major Key Components we can utilize in Sentinel&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data connectors&lt;/strong&gt;&lt;br&gt;
(we have seen above)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Log retention&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Dxv-rPrf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dqhjnh32s0as5z7udq4g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Dxv-rPrf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dqhjnh32s0as5z7udq4g.png" alt="Image description" width="800" height="403"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After it's been ingested into Microsoft Sentinel, your data is stored by using Log Analytics&lt;/li&gt;
&lt;li&gt;KQL is a rich query language that gives you the power to dive into and gain insights from our data&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Workbooks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RV-M5OHV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0a8xk8lmyzz40ch6isrw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RV-M5OHV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0a8xk8lmyzz40ch6isrw.png" alt="Image description" width="800" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;can use workbooks to visualize your data within Microsoft Sentinel. Think as a Dashboard&lt;/li&gt;
&lt;li&gt;Each component in the dashboard is built by using an underlying KQL query of your data&lt;/li&gt;
&lt;li&gt;can use the built-in workbooks within Microsoft Sentinel and edit them to meet your own needs, or create your own workbooks from scratch&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Analytics alerts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cksSVWVl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xyczyqgsit6wyvefsb8j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cksSVWVl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xyczyqgsit6wyvefsb8j.png" alt="Image description" width="800" height="473"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;As far as now we have, you have your logs and some data visualization&lt;/li&gt;
&lt;li&gt;Now it's great time to have some proactive analytics across your data, so you're notified when something suspicious occurs&lt;/li&gt;
&lt;li&gt;can enable built-in analytics alerts within your Sentinel workspace&lt;/li&gt;
&lt;li&gt;There are many types alerts are there. Can also create custom, scheduled alerts from scratch&lt;/li&gt;
&lt;li&gt;Other alerts are built on machine-learning models that are proprietary to Microsoft&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Threat hunting&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YToP0vLV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/eorbyloffe0ahq58epm0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YToP0vLV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/eorbyloffe0ahq58epm0.png" alt="Image description" width="800" height="475"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;there are some built-in hunting queries that they can use&lt;/li&gt;
&lt;li&gt;can also create their own queries&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Incidents and investigations&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RLK5k837--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/585h292jhohlxdo9xhfp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RLK5k837--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/585h292jhohlxdo9xhfp.png" alt="Image description" width="800" height="346"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;when an alert that you've enabled is triggered, Incident will be ceated&lt;/li&gt;
&lt;li&gt;you can do standard incident management tasks like changing status or assigning incidents to individuals for investigation&lt;/li&gt;
&lt;li&gt;Microsoft Sentinel also has investigation functionality, so you can visually investigate incidents by mapping entities across log data along a timeline&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Automation playbooks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--UVrvqUy_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3nwnh88hl1blns9x3s5h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--UVrvqUy_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3nwnh88hl1blns9x3s5h.png" alt="Image description" width="800" height="470"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;With the ability to respond to incidents automatically now you can automate some of your security operations and make your SOC more productive&lt;/li&gt;
&lt;li&gt;Sentinel allows you to create automated workflows, or playbooks, in response to events and functionality could be used for incident management, enrichment, investigation, or remediation. This capabilities are often referred to as security orchestration, automation, and response (SOAR)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Continue......&lt;/p&gt;

</description>
      <category>azure</category>
      <category>devsecops</category>
      <category>sentinel</category>
      <category>cloudcomputing</category>
    </item>
    <item>
      <title>Robusta Installation</title>
      <dc:creator>Praveen Kumar</dc:creator>
      <pubDate>Wed, 26 Apr 2023 16:59:29 +0000</pubDate>
      <link>https://dev.to/pk-devops/robusta-installation-b4k</link>
      <guid>https://dev.to/pk-devops/robusta-installation-b4k</guid>
      <description>&lt;p&gt;Robusta is the CNCF member, Which is &lt;strong&gt;open source&lt;/strong&gt; and used on monitoring layer for Kubernetes and automations. Provides &lt;strong&gt;valuable insights into Kubernetes clusters&lt;/strong&gt; and integrates with various monitoring and alerting tools Commonly used with Prometheus but not limited.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffl1so98wp8vziut2jjsn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffl1so98wp8vziut2jjsn.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;First as the source of truth to check parent website for updated templates &lt;a href="https://docs.robusta.dev/master/installation.html" rel="noopener noreferrer"&gt;https://docs.robusta.dev/master/installation.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Installation steps&lt;br&gt;
There are few ways of installations like Robusta cli and docker, Currently we are using Robusta CLI&lt;/p&gt;

&lt;p&gt;By default, on Linux and mac you have python install or else check and install python before the Robusta.&lt;/p&gt;

&lt;p&gt;Step 1 : &lt;br&gt;
$ helm repo add robusta &lt;a href="https://robusta-charts.storage.googleapis.com" rel="noopener noreferrer"&gt;https://robusta-charts.storage.googleapis.com&lt;/a&gt; &amp;amp;&amp;amp; helm repo update&lt;/p&gt;

&lt;p&gt;$ pip install -U robusta-cli --no-cache&lt;br&gt;
(check the python version, coz Python 3.7 and higher is required)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh011vihk6hw5x03yp02c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh011vihk6hw5x03yp02c.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2 : Robusta configurations required sink (automations in place to handle alerts in your Kubernetes cluster by sending them to sinks with added enrichments that tell you what is happening in your cluster. It also suggests common fixes that give us better alerts)&lt;br&gt;
Sinks Available : &lt;a href="https://docs.robusta.dev/master/catalog/sinks/index.html" rel="noopener noreferrer"&gt;https://docs.robusta.dev/master/catalog/sinks/index.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;$ robusta gen-config&lt;/p&gt;

&lt;p&gt;will ask for y or n popup, once y is been choosed on browser ask to add on channel slack.&lt;/p&gt;

&lt;p&gt;It will create the generated_values.yaml in current path&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fipm07o0y482f3t7px451.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fipm07o0y482f3t7px451.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd24q94yi8q8r7h4sqldv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd24q94yi8q8r7h4sqldv.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3 : Run the following commands to install Helm charts&lt;/p&gt;

&lt;p&gt;$ helm install robusta robusta/robusta -n your_namespace -f ./generated_values.yaml \&lt;br&gt;
    --set clusterName=&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4objtbglsk0ohk93jeeh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4objtbglsk0ohk93jeeh.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 4 : To check the deployments on robusta&lt;/p&gt;

&lt;p&gt;$ kubectl get pods -n your_namespace&lt;br&gt;
$ robusta logs&lt;/p&gt;

&lt;p&gt;Step 5 : To check the Robusta create some error like crashing pod&lt;/p&gt;

&lt;p&gt;$ kubectl apply -f &lt;a href="https://gist.githubusercontent.com/robusta-lab/283609047306dc1f05cf59806ade30b6/raw" rel="noopener noreferrer"&gt;https://gist.githubusercontent.com/robusta-lab/283609047306dc1f05cf59806ade30b6/raw&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;$ kubectl get pods -n your_namespace&lt;/p&gt;

&lt;p&gt;Step 6 : Use Robusta UI that we enabled in Step 2 option&lt;/p&gt;

&lt;p&gt;URL : &lt;a href="https://platform.robusta.dev/" rel="noopener noreferrer"&gt;https://platform.robusta.dev/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Two options to choose like Google and Azure, provide the mail id which is given in Step 2&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7lv5gqmtueez9qiap9ze.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7lv5gqmtueez9qiap9ze.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Continue......&lt;/p&gt;

</description>
      <category>devops</category>
      <category>kubernetes</category>
      <category>robusta</category>
      <category>monitoring</category>
    </item>
  </channel>
</rss>
