Skip to content

Commit 00e3bc5

Browse files
committed
chore: tweak note case study
1 parent af052d8 commit 00e3bc5

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

content/blog/note-case-study.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,19 +39,19 @@ After extensive research, note’s SRE team selected Bytebase to replace their i
3939

4040
![sso-bb](/content/blog/note-case-study/sso-bb.webp)
4141

42-
Bytebase provides various capabilities to enable more secure and efficient database access, including a unified web-based SQL Editor with fine-grained sensitive data masking and role-based access control.
42+
Bytebase provides various capabilities to enable more secure and efficient database access, including a unified web-based SQL Editor with fine-grained sensitive data masking and role-based access control.
4343

4444
![jit](/content/blog/note-case-study/jit.webp)
4545

4646
### Web-based SQL Editor
4747

48-
Bytebase offers a web-based SQL Editor that consolidates all permissions management and data access operations into a single tool. This eliminates the need for the in-house tool, SSH proxy server, and local database clients, allowing developers to submit permission requests and access the database in one place, greatly improving convenience.
48+
Bytebase offers a [web-based SQL Editor](/docs/sql-editor/overview/) that consolidates all permissions management and data access operations into a single tool. This eliminates the need for the in-house tool, SSH proxy server, and local database clients, allowing developers to submit permission requests and access the database in one place, greatly improving convenience.
4949

5050
![sql-editor](/content/blog/note-case-study/sql-editor.webp)
5151

5252
### Dynamic Data Masking
5353

54-
Bytebase offers column-level dynamic data masking for our Aurora MySQL databases. When granting access permissions to developers for specific tables, sensitive columns can be dynamically masked based on the user's identity during data queries.
54+
Bytebase offers column-level [dynamic data masking](/docs/security/data-masking/overview/) for our Aurora MySQL databases. When granting access permissions to developers for specific tables, sensitive columns can be dynamically masked based on the user's identity during data queries.
5555

5656
![ddm](/content/blog/note-case-study/ddm.webp)
5757

@@ -88,13 +88,13 @@ Access request notifications will be pushed to Slack.
8888
After implementing Bytebase's database access control, the following issues have become apparent. In response, note is considering further leveraging Bytebase's capabilities to address these challenges:
8989

9090
- [External approval via Slack](/docs/api/external-approval/)
91-
91+
9292
Currently, workflow approvals are only carried out on Bytebase. By utilizing the external approval feature, approvals can be processed through Slack.
9393

9494
- [CI/CD for DML and DDL changes](/docs/change-database/change-workflow/)
9595

9696
At present, only read queries are utilized; the aim is to enable modifications for both DML and DDL directly on Bytebase.
9797

9898
- [GitOps workflow with GitHub](/docs/vcs-integration/overview/)
99-
100-
Given that SQL is currently managed through GitHub Issues in the existing business process, the introduction of GitOps is expected to enhance operational efficiency.
99+
100+
Given that SQL is currently managed through GitHub Issues in the existing business process, the introduction of GitOps is expected to enhance operational efficiency.

0 commit comments

Comments
 (0)