Skip to content

Commit 59c86f0

Browse files
committed
chore: update blog to SQL Editor user
1 parent b9a323b commit 59c86f0

File tree

12 files changed

+45
-18
lines changed

12 files changed

+45
-18
lines changed

content/blog/bytebase-vs-cloudbeaver.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -113,22 +113,22 @@ On the other hand, the more common way to change the schema is to use **Schema E
113113
When you edit database connections, you have the option to restrict access to a specific team or individual.
114114
![cb-db-access](/content/blog/bytebase-vs-cloudbeaver/cb-db-access.webp)
115115

116-
- **Bytebase**: Roles are divided into two levels - Workspace and Project. `Workspace Admins`/`DBAs` set up database instances and manage members. `Project Owners` handle databases, issues, and members at the Project level. Individuals can hold multiple project-level roles, such as `Project Developers` (change database), and `Project Queriers` (query database).
116+
- **Bytebase**: Roles are divided into two levels - Workspace and Project. `Workspace Admin`/`DBA` set up database instances and manage members. `Project Owner` handle databases, issues, and members at the Project level. Individuals can hold multiple project-level roles, such as `Project Developer` (change database), and `SQL Editor User` (query database).
117117
![bb-access-control](/content/blog/bytebase-vs-cloudbeaver/bb-access-control.webp)
118118

119-
With **Community plan**, if one's not assigned to a project, one can't see the project at all. With **Enterprise plan**, `Project Owner` can grant access to specific databases or tables instead of all project databases to a specific `Project Querier`. `Project Developer` can also request to query or export a database or table with a request issue.
119+
With **Community plan**, if one's not assigned to a project, one can't see the project at all. With **Enterprise plan**, `Project Owner` can grant access to specific databases or tables instead of all project databases to a specific `SQL Editor User`. `Project Developer` can also request to query or export a database or table with a request issue.
120120
![bb-access-control-adv](/content/blog/bytebase-vs-cloudbeaver/bb-access-control-adv.webp)
121121

122-
Additionally, `Admins`/`DBAs` can set different data access controls for various environments, such as restricted access to production data and open access to development data.
123-
![bb-ac-env](/content/blog/bytebase-vs-cloudbeaver/bb-ac-env.webp)
122+
Additionally, admins can set different data access controls for different projects, such as restricted access to production data and open access to development data.
123+
![bb-access-project](/content/blog/bytebase-vs-cloudbeaver/bb-access-project.webp)
124124

125125
### Data Masking
126126

127127
- **CloudBeaver**: Not available.
128128

129-
- **Bytebase**: `Admins`/`DBAs`/`Project Owners` can configure data masking for specific columns within a table and can also authorize particular users to access the original, unmasked data. `Project Querier`, on the other hand, is limited to accessing only the masked data.
129+
- **Bytebase**: `Admin`/`DBA`/`Project Owner` can configure data masking for specific columns within a table and can also authorize particular users to access the original, unmasked data. `SQL Editor User`, on the other hand, is limited to accessing only the masked data.
130130

131-
Furthermore, `Admins`/`DBAs` can define semantic types for masking algorithms, such as email, phone, credit card, etc. As a result, the data will be masked according to the semantic type configured.
131+
Furthermore, `Admin`/`DBA` can define semantic types for masking algorithms, such as email, phone, credit card, etc. As a result, the data will be masked according to the semantic type configured.
132132
![bb-masking-graph](/content/blog/bytebase-vs-cloudbeaver/bb-masking-graph.webp)
133133

134134
### Compare Schema

content/blog/bytebase-vs-dbeaver.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -105,22 +105,22 @@ On the other hand, the more common way to change the schema is to use **Schema E
105105

106106
- **DBeaver**: DBeaver is client-based, thus it can't enforce centralized access control.
107107

108-
- **Bytebase**: Roles are divided into two levels - Workspace and Project. `Workspace Admins`/`DBAs` set up database instances and manage members. `Project Owners` handle databases, issues, and members at the Project level. Individuals can hold multiple project-level roles, such as `Project Developers` (change database), and `Project Queriers` (query database).
108+
- **Bytebase**: Roles are divided into two levels - Workspace and Project. `Workspace Admin`/`DBA` set up database instances and manage members. `Project Owners` handle databases, issues, and members at the Project level. Individuals can hold multiple project-level roles, such as `Project Developer` (change database), and `SQL Editor User` (query database).
109109
![bb-access-control](/content/blog/bytebase-vs-dbeaver/bb-access-control.webp)
110110

111-
With **Community plan**, if one's not assigned to a project, one can't see the project at all. With **Enterprise plan**, `Project Owner` can grant access to specific databases or tables instead of all project databases to a specific `Project Querier`. `Project Developer` can also request to query or export a database or table with a request issue.
111+
With **Community plan**, if one's not assigned to a project, one can't see the project at all. With **Enterprise plan**, `Project Owner` can grant access to specific databases or tables instead of all project databases to a specific `SQL Editor User`. `Project Developer` can also request to query or export a database or table with a request issue.
112112
![bb-access-control-adv](/content/blog/bytebase-vs-dbeaver/bb-access-control-adv.webp)
113113

114-
Additionally, `Admins`/`DBAs` can set different data access controls for various environments, such as restricted access to production data and open access to development data.
115-
![bb-ac-env](/content/blog/bytebase-vs-dbeaver/bb-ac-env.webp)
114+
Additionally, `Admin`/`DBA` can set different data access controls for various environments, such as restricted access to production data and open access to development data.
115+
![bb-access-project](/content/blog/bytebase-vs-dbeaver/bb-ac-env.webp)
116116

117117
### Data Masking
118118

119119
- **DBeaver**: DBeaver is client-based, thus it can't enforce data masking policies.
120120

121-
- **Bytebase**: `Admins`/`DBAs`/`Project Owners` can configure data masking for specific columns within a table and can also authorize particular users to access the original, unmasked data. `Project Querier`, on the other hand, is limited to accessing only the masked data.
121+
- **Bytebase**: `Admin`/`DBA`/`Project Owner` can configure data masking for specific columns within a table and can also authorize particular users to access the original, unmasked data. `SQL Editor User`, on the other hand, is limited to accessing only the masked data.
122122

123-
Furthermore, `Admins`/`DBAs` can define semantic types for masking algorithms, such as email, phone, credit card, etc. As a result, the data will be masked according to the semantic type configured.
123+
Furthermore, `Admin`/`DBA` can define semantic types for masking algorithms, such as email, phone, credit card, etc. As a result, the data will be masked according to the semantic type configured.
124124
![bb-masking-graph](/content/blog/bytebase-vs-dbeaver/bb-masking-graph.webp)
125125

126126
### Compare

content/blog/bytebase-vs-metabase.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -110,22 +110,22 @@ Bytebase is designed for developers, DBAs, and platform teams to manage database
110110

111111
![mb-pro-access-control](/content/blog/bytebase-vs-metabase/mb-pro-access-control.webp)
112112

113-
- **Bytebase**: Roles are divided into two levels - Workspace and Project. `Workspace Admins`/`DBAs` set up database instances and manage members. `Project Owners` handle databases, issues, and members at the Project level. Individuals can hold multiple project-level roles, such as `Project Developers` (change database), and `Project Queriers` (query database).
113+
- **Bytebase**: Roles are divided into two levels - Workspace and Project. `Workspace Admin`/`DBA` set up database instances and manage members. `Project Owner` handle databases, issues, and members at the Project level. Individuals can hold multiple project-level roles, such as `Project Developer` (change database), and `SQL Editor User` (query database).
114114
![bb-access-control](/content/blog/bytebase-vs-metabase/bb-access-control.webp)
115115

116-
With **Community plan**, if one's not assigned to a project, one can't see the project at all. With **Enterprise plan**, `Project Owner` can grant access to specific databases or tables instead of all project databases to a specific `Project Querier`. `Project Developer` can also request to query or export a database or table with a request issue.
116+
With **Community plan**, if one's not assigned to a project, one can't see the project at all. With **Enterprise plan**, `Project Owner` can grant access to specific databases or tables instead of all project databases to a specific `SQL Editor User`. `Project Developer` can also request to query or export a database or table with a request issue.
117117
![bb-access-control-adv](/content/blog/bytebase-vs-metabase/bb-access-control-adv.webp)
118118

119-
Additionally, `Admins`/`DBAs` can set different data access controls for various environments, such as restricted access to production data and open access to development data.
120-
![bb-ac-env](/content/blog/bytebase-vs-metabase/bb-ac-env.webp)
119+
Additionally, `Admin`/`DBA` can set different data access controls for various environments, such as restricted access to production data and open access to development data.
120+
![bb-access-project](/content/blog/bytebase-vs-metabase/bb-access-project.webp)
121121

122122
### Data masking
123123

124124
- **Metabase**: Not available. However, access control for specific rows or columns is available with the **Pro plan**. This serves a purpose akin to data masking but is less convenient, adaptable, and secure.
125125

126-
- **Bytebase**: `Admins`/`DBAs`/`Project Owners` can configure data masking for specific columns within a table and can also authorize particular users to access the original, unmasked data. `Project Querier`, on the other hand, is limited to accessing only the masked data.
126+
- **Bytebase**: `Admin`/`DBA`/`Project Owner` can configure data masking for specific columns within a table and can also authorize particular users to access the original, unmasked data. `SQL Editor User`, on the other hand, is limited to accessing only the masked data.
127127

128-
Furthermore, `Admins`/`DBAs` can define semantic types for masking algorithms, such as email, phone, credit card, etc. As a result, the data will be masked according to the semantic type configured.
128+
Furthermore, `Admin`/`DBA` can define semantic types for masking algorithms, such as email, phone, credit card, etc. As a result, the data will be masked according to the semantic type configured.
129129
![bb-masking-graph](/content/blog/bytebase-vs-metabase/bb-masking-graph.webp)
130130

131131
### Audit log

content/blog/top-devsecops-tool.md

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: Top DevSecOps Tools
3+
author: Tianzhou
4+
updated_at: 2024/12/24 09:00:00
5+
feature_image: /content/blog/top-devsecops-tool/cover.jpg
6+
tags: Industry
7+
featured: true
8+
description: DevSecOps tools empower teams to seamlessly integrate security into every phase of the software development lifecycle, fostering the adoption of DevSecOps practices.
9+
---
10+
11+
**DevSecOps** stands for Development, Security, and Operations. It extends the principles of DevOps by embedding security practices throughout the software development lifecycle (SDLC), from initial design to deployment and maintenance.
12+
13+
In traditional DevOps, security checks might occur at the end of the development process. DevSecOps shifts this to ["shift-left"](https://en.wikipedia.org/wiki/Shift-left_testing) security, meaning security is integrated early and continuously across the pipeline. In this post, we are taking a look at some popular DevSecOps tools.
14+
15+
## GitLab
16+
17+
GitLab began as an open-source alternative to GitHub, initially focusing on version control and collaboration for developers. Over the years, GitLab has evolved into a comprehensive DevSecOps platform, embedding security directly into the software development lifecycle.
18+
19+
In March 2024, GitLab further reinforced its security focus by [acquiring Oxeye](https://about.gitlab.com/press/releases/2024-03-20-gitlab-acquires-oxeye-to-advance-application-security-and-governance-capabilities), a company specializing in cloud-native application security and risk management.
20+
21+
## Snyk
22+
23+
Snyk is a developer-first security platform that focuses on integrating security into the development workflow, enabling teams to identify and remediate vulnerabilities across the entire software development lifecycle (SDLC). As a key player in the DevSecOps space, Snyk bridges the gap between developers and security teams by embedding automated security checks directly into coding, build, and deployment pipelines.
24+
25+
By providing real-time feedback within IDEs, CI/CD pipelines, and repositories, Snyk's platform empowers developers to take ownership of security without disrupting their workflows.
26+
27+
Snyk also expands its capabilities via acquisitions. In 2024, it has acquired [Probely](https://snyk.io/news/snyk-acquires-developer-first-dast-provider-probely/) and [Helios](https://snyk.io/blog/welcoming-helios-to-snyk/).
-38 KB
Binary file not shown.
-27.7 KB
Loading
-56 KB
Loading
13.4 KB
Loading
-38 KB
Binary file not shown.
-27.7 KB
Loading

0 commit comments

Comments
 (0)