{"id":43188,"date":"2024-02-09T15:49:36","date_gmt":"2024-02-09T15:49:36","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=43188"},"modified":"2024-02-09T15:49:36","modified_gmt":"2024-02-09T15:49:36","slug":"what-is-deployhub-and-use-cases-of-deployhub","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/what-is-deployhub-and-use-cases-of-deployhub\/","title":{"rendered":"What is DeployHub and use cases of DeployHub?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is DeployHub?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-158-1024x576.png\" alt=\"\" class=\"wp-image-43208\" style=\"width:695px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-158-1024x576.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-158-300x169.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-158-768x432.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-158-355x199.png 355w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-158.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>What is DeployHub<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>DeployHub is a software supply chain security platform designed to address the challenges of securing and managing open-source and third-party software within your software applications.<\/p>\n\n\n\n<p>DeployHub works by gathering and aggregating critical data about the components (e.g., libraries, frameworks) used in your applications. This includes information like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Provenance:<\/strong> Origin and history of the component.<\/li>\n\n\n\n<li><strong>SBOMs:<\/strong> Software Bill of Materials, detailing all dependencies.<\/li>\n\n\n\n<li><strong>CVEs:<\/strong> Known vulnerabilities associated with the component.<\/li>\n\n\n\n<li><strong>Versions:<\/strong> Information about different versions and their security risks.<\/li>\n\n\n\n<li><strong>Inventory:<\/strong> Where the components are used within your applications and deployed environments.<\/li>\n<\/ul>\n\n\n\n<p>By centralizing this data, DeployHub provides insights and capabilities for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identifying security risks:<\/strong> Proactively scan for vulnerabilities and dependencies within your software supply chain.<\/li>\n\n\n\n<li><strong>Managing open-source usage:<\/strong> Track and assess the risks associated with open-source components you use.<\/li>\n\n\n\n<li><strong>Ensuring compliance:<\/strong> Meet regulatory requirements like Executive Order 14028 for generating application-level SBOMs.<\/li>\n\n\n\n<li><strong>Optimizing deployments:<\/strong> Improve security and manage vulnerabilities across entire development and deployment pipelines.<\/li>\n\n\n\n<li><strong>Automating tasks:<\/strong> Streamline vulnerability detection, patching, and remediation processes.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Top 10 use cases of DeployHub?<\/h2>\n\n\n\n<p>Top 10 Use Cases of DeployHub:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Secure software development:<\/strong> Integrate DeployHub into your CI\/CD pipeline to identify and address security risks early in the development process.<\/li>\n\n\n\n<li><strong>Minimize open-source risk:<\/strong> Gain visibility into potential vulnerabilities within commonly used open-source libraries and frameworks.<\/li>\n\n\n\n<li><strong>Meet compliance requirements:<\/strong> Generate Application-Level SBOMs (Software Bill of Materials) to comply with regulations like Executive Order 14028.<\/li>\n\n\n\n<li><strong>Track version vulnerabilities:<\/strong> Stay informed about newly discovered vulnerabilities and their impact on your software versions.<\/li>\n\n\n\n<li><strong>Improve incident response:<\/strong> Quickly identify affected components and implement remediation actions when security incidents occur.<\/li>\n\n\n\n<li><strong>Optimize patch management:<\/strong> Prioritize patching efforts based on risk and impact of vulnerabilities within your applications.<\/li>\n\n\n\n<li><strong>Automate security checks:<\/strong> Set up automated workflows for vulnerability scanning, alerting, and patch management.<\/li>\n\n\n\n<li><strong>Enhance governance and control:<\/strong> Define policies and restrictions around open-source component usage for better control within your organization.<\/li>\n\n\n\n<li><strong>Improve collaboration:<\/strong> Share security insights and knowledge across development, security, and operations teams.<\/li>\n\n\n\n<li><strong>Reduce attack surface:<\/strong> Proactively address vulnerabilities and minimize the exposure of your applications to potential attacks.<\/li>\n<\/ol>\n\n\n\n<p>These are just some of the many potential use cases for DeployHub. Its specific value will depend on your organization&#8217;s needs and security posture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the feature of DeployHub?<\/h2>\n\n\n\n<p>DeployHub empowers you to manage and secure your software supply chain through a rich set of features:<\/p>\n\n\n\n<p><strong>Vulnerability Management:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Comprehensive scanning:<\/strong> Scans across various sources (repositories, containers, binaries) for vulnerabilities in open-source and third-party components.<\/li>\n\n\n\n<li><strong>Prioritization and scoring:<\/strong> Analyzes and scores vulnerabilities based on severity, exploitability, and impact, aiding in prioritizing remediation efforts.<\/li>\n\n\n\n<li><strong>Continuous monitoring:<\/strong> Tracks newly discovered vulnerabilities and their relevance to your used components, keeping you informed.<\/li>\n\n\n\n<li><strong>Vulnerability intelligence:<\/strong> Provides insights into exploitability, affected versions, and available patches.<\/li>\n<\/ul>\n\n\n\n<p><strong>Open-Source Management:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Inventory and tracking:<\/strong> Creates an inventory of all open-source components used in your applications and tracks their versions across environments.<\/li>\n\n\n\n<li><strong>License compliance:<\/strong> Helps ensure compliance with open-source license terms and conditions.<\/li>\n\n\n\n<li><strong>Risk assessment:<\/strong> Analyzes the security risks associated with specific open-source components based on factors like license type, development activity, and vulnerability history.<\/li>\n\n\n\n<li><strong>Alternative suggestions:<\/strong> Recommends less risky alternatives for identified high-risk open-source components.<\/li>\n<\/ul>\n\n\n\n<p><strong>Software Bill of Materials (SBOM) Generation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automatic SBOM generation:<\/strong> Generates comprehensive SBOMs (Software Bill of Materials) for your applications, detailing all dependencies and their versions.<\/li>\n\n\n\n<li><strong>Compliance support:<\/strong> Assists in meeting SBOM generation requirements for regulations like Executive Order 14028.<\/li>\n\n\n\n<li><strong>Customization:<\/strong> Offers options to tailor SBOM content and format to your specific needs.<\/li>\n\n\n\n<li><strong>Integration with other tools:<\/strong> Enables integration with various security and compliance tools for seamless workflows.<\/li>\n<\/ul>\n\n\n\n<p><strong>Deployment Pipeline Integration:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CI\/CD integration:<\/strong> Integrates with CI\/CD pipelines to perform vulnerability scanning and risk assessment as part of the development process.<\/li>\n\n\n\n<li><strong>Automated workflows:<\/strong> Enables triggering automated actions based on scan results, such as alerting, blocking deployments, or initiating remediation.<\/li>\n\n\n\n<li><strong>Version control:<\/strong> Provides visibility into vulnerabilities within different versions of components, aiding in informed deployment decisions.<\/li>\n\n\n\n<li><strong>Patch management:<\/strong> Assists in identifying and prioritizing affected components for patching to address vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<p><strong>Additional Features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Customizable dashboards and reports:<\/strong> Visualize scan results, track trends, and generate reports for stakeholders.<\/li>\n\n\n\n<li><strong>Role-based access control:<\/strong> Manage user access and permissions for enhanced security.<\/li>\n\n\n\n<li><strong>API access:<\/strong> Enables programmatic interaction with DeployHub for automation and integrations.<\/li>\n\n\n\n<li><strong>Community and support:<\/strong> Offers access to community resources and dedicated support for users.<\/li>\n<\/ul>\n\n\n\n<p><strong>Note:<\/strong> Specific features and functionalities might vary depending on your chosen plan and deployment options (cloud, on-premises).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How DeployHub works and Architecture?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"378\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-160.png\" alt=\"\" class=\"wp-image-43210\" style=\"width:545px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-160.png 589w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-160-300x193.png 300w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><figcaption class=\"wp-element-caption\"><strong><em>DeployHub works and Architecture<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>DeployHub helps you secure your software supply chain by providing visibility and insights into the components used in your applications. Here&#8217;s a breakdown of its overall workings and architecture:<\/p>\n\n\n\n<p><strong>Workflow:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Data Collection:<\/strong>\n<ul class=\"wp-block-list\">\n<li>You integrate DeployHub with various sources like Git repositories, container registries, and deployment environments.<\/li>\n\n\n\n<li>DeployHub scans these sources to identify components (libraries, frameworks) used in your applications.<\/li>\n\n\n\n<li>It gathers information about each component, including:\n<ul class=\"wp-block-list\">\n<li><strong>Provenance:<\/strong> Origin and history of the component.<\/li>\n\n\n\n<li><strong>SBOMs:<\/strong> Software Bill of Materials, detailing all dependencies.<\/li>\n\n\n\n<li><strong>CVEs:<\/strong> Known vulnerabilities associated with the component.<\/li>\n\n\n\n<li><strong>Versions:<\/strong> Information about different versions and their security risks.<\/li>\n\n\n\n<li><strong>Inventory:<\/strong> Where the components are used within your applications and deployed environments.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Analysis and Processing:<\/strong>\n<ul class=\"wp-block-list\">\n<li>DeployHub processes the collected data to:\n<ul class=\"wp-block-list\">\n<li>Identify potential security risks based on vulnerabilities, license conflicts, and other factors.<\/li>\n\n\n\n<li>Score and prioritize risks based on their severity and impact.<\/li>\n\n\n\n<li>Track component versions and identify outdated or vulnerable ones.<\/li>\n\n\n\n<li>Generate SBOMs based on your application composition.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Actions and Alerting:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Based on the analysis, DeployHub can:\n<ul class=\"wp-block-list\">\n<li>Trigger alerts for critical vulnerabilities or security risks.<\/li>\n\n\n\n<li>Provide recommendations for remediation actions, like patching or upgrading components.<\/li>\n\n\n\n<li>Integrate with your CI\/CD pipelines to automatically block insecure deployments.<\/li>\n\n\n\n<li>Generate reports and dashboards for tracking security posture and trends.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p><strong>Architecture:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Sources:<\/strong> Git repositories, container registries, build systems, deployment environments.<\/li>\n\n\n\n<li><strong>Ingestion Layer:<\/strong> Collects and processes data from various sources.<\/li>\n\n\n\n<li><strong>Security Hub:<\/strong> Analyzes data, identifies risks, and generates insights.<\/li>\n\n\n\n<li><strong>Integrations:<\/strong> Connects with CI\/CD pipelines, vulnerability databases, and other tools.<\/li>\n\n\n\n<li><strong>User Interface:<\/strong> Provides access to reports, dashboards, and configuration options.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Concepts:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Declarative Configuration:<\/strong> You define rules and policies for security checks and notifications.<\/li>\n\n\n\n<li><strong>Continuous Monitoring:<\/strong> DeployHub continuously scans and analyzes your software supply chain.<\/li>\n\n\n\n<li><strong>Risk-Based Prioritization:<\/strong> Focuses on addressing the most critical vulnerabilities first.<\/li>\n\n\n\n<li><strong>Automation:<\/strong> Integrates with your existing workflows for seamless remediation.<\/li>\n<\/ul>\n\n\n\n<p><strong>Additional Notes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DeployHub offers various deployment options: cloud-based, on-premises, or hybrid.<\/li>\n\n\n\n<li>The specific architecture and functionalities might vary depending on your chosen deployment model.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How to Install DeployHub it?<\/h2>\n\n\n\n<p>So, let&#8217;s come to the point of <strong>DeployHub Pro<\/strong> installation. I can provide specific instructions based on your preferred installation method:<\/p>\n\n\n\n<p><strong>1. Installation on your own infrastructure:<\/strong><\/p>\n\n\n\n<p><strong>a) On a Kubernetes cluster:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Prepare your Kubernetes cluster:<\/strong> Ensure your cluster meets the system requirements specified on the DeployHub official site.<\/li>\n\n\n\n<li><strong>Choose your installation method:<\/strong> You can either use Helm charts or the operator pattern.\n<ul class=\"wp-block-list\">\n<li><strong>Helm charts:<\/strong> Follow the steps of artifacthub official site.<\/li>\n\n\n\n<li><strong>Operator pattern:<\/strong> See the DeployHub official site for specific instructions.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Configure DeployHub:<\/strong> Set up environment variables, user accounts, and other configurations as described in the documentation.<\/li>\n<\/ol>\n\n\n\n<p><strong>b) On a server:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Choose your operating system:<\/strong> DeployHub Pro supports Ubuntu and CentOS\/RHEL.<\/li>\n\n\n\n<li><strong>Install prerequisites:<\/strong> Follow the platform-specific instructions on the site.<\/li>\n\n\n\n<li><strong>Download and install:<\/strong> Get the installer from the DeployHub website and follow the installation steps.<\/li>\n\n\n\n<li><strong>Configure DeployHub:<\/strong> Similar to the Kubernetes installation, set up environment variables, users, and other configurations.<\/li>\n<\/ol>\n\n\n\n<p><strong>2. Installation on a managed cloud platform:<\/strong><\/p>\n\n\n\n<p>DeployHub Pro offers pre-built packages for AWS, Azure, and GCP. These packages simplify the installation process:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AWS:<\/strong> Follow the DeployHub official guide.<\/li>\n\n\n\n<li><strong>Azure:<\/strong> Choose DeployHub site for better Instructions.<\/li>\n\n\n\n<li><strong>GCP:<\/strong> See the DeployHub official site for specific steps<\/li>\n<\/ul>\n\n\n\n<p><strong>Note:<\/strong> These are general instructions, and the specific steps might vary depending on your environment and chosen option.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Basic Tutorials of DeployHub: Getting Started<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"507\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-161-1024x507.png\" alt=\"\" class=\"wp-image-43211\" style=\"width:715px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-161-1024x507.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-161-300x148.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-161-768x380.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/02\/image-161.png 1120w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Basic Tutorials of DeployHub<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>So, let&#8217;s begin with the step-by-step basic tutorials of DeployHub in that I&#8217;ll provide tutorials covering some fundamental aspects of DeployHub:<\/p>\n\n\n\n<p><strong>1. Creating and Setting Up a Project:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Login:<\/strong> Access the DeployHub web interface and log in with your credentials.<\/li>\n\n\n\n<li><strong>Create a Project:<\/strong> Press on the &#8220;Projects&#8221; tab and then &#8220;Generate Project.&#8221;<\/li>\n\n\n\n<li><strong>Provide Project Details:<\/strong> Enter a project name, description, and optionally select a template.<\/li>\n\n\n\n<li><strong>Configure Version Control:<\/strong> Link your project to your Git repository by providing the URL and credentials.<\/li>\n\n\n\n<li><strong>Save and Access:<\/strong> Click &#8220;Save&#8221; to create the project, and it will be listed in the Projects tab.<\/li>\n<\/ol>\n\n\n\n<p><strong>2. Building and Configuring Pipelines:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Open Project:<\/strong> Navigate to your project in the Projects tab.<\/li>\n\n\n\n<li><strong>Create Pipeline:<\/strong> Click &#8220;Pipelines&#8221; and then &#8220;Create Pipeline.&#8221;<\/li>\n\n\n\n<li><strong>Choose Pipeline Type:<\/strong> Select a template or create a custom pipeline. Common options include Basic CI\/CD or Multi-Stage Pipelines.<\/li>\n\n\n\n<li><strong>Add Stages:<\/strong> Define stages in your pipeline, such as &#8220;Build,&#8221; &#8220;Test,&#8221; and &#8220;Deploy.&#8221;<\/li>\n\n\n\n<li><strong>Configure Tasks:<\/strong> Within each stage, define tasks like code checkout, building, running tests, and deploying to environments.<\/li>\n\n\n\n<li><strong>Specify Artifacts:<\/strong> Choose which artifacts (e.g., built files) to pass between stages.<\/li>\n\n\n\n<li><strong>Trigger Conditions:<\/strong> Set up triggers for automated pipeline execution (e.g., on code push, schedule).<\/li>\n\n\n\n<li><strong>Save and Run:<\/strong> Save the pipeline configuration and optionally initiate a manual run.<\/li>\n<\/ol>\n\n\n\n<p><strong>3. Deploying Applications to Environments:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Open Project:<\/strong> Access your project and navigate to the &#8220;Environments&#8221; tab.<\/li>\n\n\n\n<li><strong>Create Environment:<\/strong> Click &#8220;Create Environment&#8221; and define name, server details, and deployment options.<\/li>\n\n\n\n<li><strong>Link Pipeline:<\/strong> Select the pipeline you want to deploy to this environment.<\/li>\n\n\n\n<li><strong>Deployment Strategy:<\/strong> Choose the deployment strategy (e.g., manual, automatic).<\/li>\n\n\n\n<li><strong>Save and Deploy:<\/strong> Save the environment configuration and initiate a deployment if desired.<\/li>\n<\/ol>\n\n\n\n<p><strong>4. Managing Approvals and Workflows:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Project Settings:<\/strong> Go to your project&#8217;s settings and navigate to the &#8220;Workflows&#8221; tab.<\/li>\n\n\n\n<li><strong>Define Workflows:<\/strong> Create approval workflows for specific stages or deployments.<\/li>\n\n\n\n<li><strong>Assign Approvers:<\/strong> Choose individuals or groups who need to approve before proceeding.<\/li>\n\n\n\n<li><strong>Configure Conditions:<\/strong> Set conditions for when approvals are required (e.g., specific environments).<\/li>\n\n\n\n<li><strong>Save and Activate:<\/strong> Save the workflow and activate it for your project.<\/li>\n<\/ol>\n\n\n\n<p><strong>5. Utilizing Features like Rollback and Audit Trails:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Rollbacks:<\/strong> In the deployment history, locate the version you want to roll back to.<\/li>\n\n\n\n<li><strong>Initiate Rollback:<\/strong> Click the &#8220;Rollback&#8221; button and confirm the action.<\/li>\n\n\n\n<li><strong>Audit Trails:<\/strong> Access the &#8220;Audits&#8221; tab in your project to view historical events and user actions.<\/li>\n\n\n\n<li><strong>Filter and Search:<\/strong> Filter audit trails by date, user, event type, or keyword.<\/li>\n<\/ol>\n\n\n\n<p>These are basic steps, and specific functionalities might vary depending on your DeployHub version and configuration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is DeployHub? DeployHub is a software supply chain security platform designed to address the challenges of securing and managing open-source and third-party software within your software applications. DeployHub works by gathering and aggregating critical data about the components (e.g., libraries, frameworks) used in your applications. This includes information like: By centralizing this data, DeployHub&#8230;<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-43188","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/43188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=43188"}],"version-history":[{"count":1,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/43188\/revisions"}],"predecessor-version":[{"id":43220,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/43188\/revisions\/43220"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=43188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=43188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=43188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}