{"id":3101,"date":"2025-05-22T10:34:48","date_gmt":"2025-05-22T10:34:48","guid":{"rendered":"https:\/\/www.devopssupport.in\/blog\/?p=3101"},"modified":"2025-05-22T10:34:51","modified_gmt":"2025-05-22T10:34:51","slug":"understanding-and-protecting-against-xss-cross-site-scripting-attacks","status":"publish","type":"post","link":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/","title":{"rendered":"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"947\" height=\"626\" src=\"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png\" alt=\"\" class=\"wp-image-3102\" srcset=\"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png 947w, https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image-300x198.png 300w, https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image-768x508.png 768w\" sizes=\"auto, (max-width: 947px) 100vw, 947px\" \/><\/figure>\n\n\n\n<p>Cross-Site Scripting (XSS) remains one of the most common and dangerous security vulnerabilities in web applications. It allows attackers to inject malicious scripts into webpages viewed by other users, potentially leading to stolen data, session hijacking, and compromised user accounts.<\/p>\n\n\n\n<p>In this blog, we will explore what XSS is, its types, the risks it poses, and most importantly, how to protect your web applications from XSS attacks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What is XSS?<\/h2>\n\n\n\n<p><strong>Cross-Site Scripting (XSS)<\/strong> is a security vulnerability that enables attackers to inject malicious client-side scripts (usually JavaScript) into web pages viewed by other users. When these scripts execute, they can perform actions on behalf of the victim, steal sensitive data, or even spread malware.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">How Does XSS Work?<\/h3>\n\n\n\n<p>An attacker finds a way to insert malicious scripts into input fields or URLs that a web application doesn\u2019t properly sanitize or encode. When another user visits the infected page, the malicious script runs in their browser context.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Types of XSS Attacks<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Stored (Persistent) XSS<\/strong><br>Malicious script is permanently stored on the target server (e.g., in a database, comment section, or forum post). Every time a user loads the affected page, the script executes.<\/li>\n\n\n\n<li><strong>Reflected (Non-persistent) XSS<\/strong><br>Malicious script is embedded in a URL or HTTP request and immediately reflected back by the server in the response. This usually requires the victim to click a crafted link.<\/li>\n\n\n\n<li><strong>DOM-based XSS<\/strong><br>The vulnerability exists in client-side scripts that process user input insecurely, manipulating the Document Object Model (DOM) without proper sanitization.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why is XSS Dangerous?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cookie theft:<\/strong> Attackers can steal session cookies, impersonate users, and hijack accounts.<\/li>\n\n\n\n<li><strong>Credential theft:<\/strong> Malicious scripts can trick users into submitting login credentials to fake forms.<\/li>\n\n\n\n<li><strong>Malware distribution:<\/strong> Scripts can redirect users to malicious sites or download malware.<\/li>\n\n\n\n<li><strong>Defacement:<\/strong> Attackers can alter website content and reputation.<\/li>\n\n\n\n<li><strong>Privilege escalation:<\/strong> Combined with other vulnerabilities, it can lead to deeper system compromises.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Against XSS Attacks<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Input Validation and Sanitization<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Validate user inputs strictly for expected formats.<\/li>\n\n\n\n<li>Sanitize inputs by removing or escaping potentially dangerous characters like <code>&lt;<\/code>, <code>><\/code>, <code>\"<\/code> , <code>'<\/code> , <code>\/<\/code> etc.<\/li>\n<\/ul>\n\n\n\n<p><strong>Image suggestion:<\/strong> Diagram showing input flow with validation and sanitization steps.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Contextual Output Encoding<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Always encode data before rendering it on the page.<\/li>\n\n\n\n<li>Use proper encoding depending on the output context: HTML, JavaScript, URL, CSS.<\/li>\n<\/ul>\n\n\n\n<p>For example, HTML-escape user data before inserting it into HTML content to prevent script execution.<\/p>\n\n\n\n<p><strong>Image suggestion:<\/strong> Table or infographic explaining different encoding methods per context (HTML, JS, URL, CSS).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Content Security Policy (CSP)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CSP is an HTTP header that restricts the sources from which scripts, styles, and other resources can be loaded.<\/li>\n\n\n\n<li>It helps prevent execution of unauthorized scripts even if an attacker manages to inject them.<\/li>\n<\/ul>\n\n\n\n<p><strong>Image suggestion:<\/strong> Illustration showing browser enforcing CSP blocking external unauthorized scripts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Use HTTPOnly and Secure Cookies<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set session cookies with the <code>HttpOnly<\/code> flag to prevent access via JavaScript.<\/li>\n\n\n\n<li>Use the <code>Secure<\/code> flag to ensure cookies are only sent over HTTPS.<\/li>\n<\/ul>\n\n\n\n<p><strong>Image suggestion:<\/strong> Cookie icon with lock and shield symbols representing HttpOnly and Secure flags.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Avoid Inline JavaScript and Dangerous Functions<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid inline event handlers (<code>onclick<\/code>, <code>onload<\/code>).<\/li>\n\n\n\n<li>Avoid using <code>eval()<\/code>, <code>innerHTML<\/code> with untrusted content.<\/li>\n\n\n\n<li>Use safer DOM APIs like <code>textContent<\/code> or <code>setAttribute<\/code>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">6. Use Security Libraries and Frameworks<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Many modern frameworks provide built-in XSS protection.<\/li>\n\n\n\n<li>Use libraries like DOMPurify for sanitizing HTML inputs safely.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Example: Simple XSS Vulnerability and Fix<\/h2>\n\n\n\n<p><strong>Vulnerable code snippet:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;div>User comment: &lt;span id=\"comment\">&lt;\/span>&lt;\/div>\n&lt;script>\n  var comment = getUserComment(); \/\/ User input without sanitization\n  document.getElementById('comment').innerHTML = comment;\n&lt;\/script>\n<\/code><\/pre>\n\n\n\n<p>If <code>comment<\/code> contains <code>&lt;script&gt;alert('XSS')&lt;\/script&gt;<\/code>, it executes.<\/p>\n\n\n\n<p><strong>Fixed version:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>document.getElementById('comment').textContent = comment; \/\/ Escapes HTML\n<\/code><\/pre>\n\n\n\n<p>XSS attacks exploit improper handling of user inputs and outputs in web applications, posing serious security threats. By validating inputs, encoding outputs, implementing CSP, and following secure coding practices, developers can significantly reduce the risk of XSS attacks and protect their users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cross-Site Scripting (XSS) remains one of the most common and dangerous security vulnerabilities in web applications. It allows attackers to inject malicious scripts into webpages viewed by&#8230; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3101","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks - DevOps Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks - DevOps Support\" \/>\n<meta property=\"og:description\" content=\"Cross-Site Scripting (XSS) remains one of the most common and dangerous security vulnerabilities in web applications. It allows attackers to inject malicious scripts into webpages viewed by...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"DevOps Support\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-22T10:34:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-22T10:34:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"947\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Avinash kumar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Avinash kumar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/\"},\"author\":{\"name\":\"Avinash kumar\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347\"},\"headline\":\"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks\",\"datePublished\":\"2025-05-22T10:34:48+00:00\",\"dateModified\":\"2025-05-22T10:34:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/\"},\"wordCount\":602,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/\",\"url\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/\",\"name\":\"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks - DevOps Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png\",\"datePublished\":\"2025-05-22T10:34:48+00:00\",\"dateModified\":\"2025-05-22T10:34:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#primaryimage\",\"url\":\"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png\",\"contentUrl\":\"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png\",\"width\":947,\"height\":626},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.devopssupport.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#website\",\"url\":\"https:\/\/www.devopssupport.in\/blog\/\",\"name\":\"DevOps Support\",\"description\":\"DevOps Support | DevSecOps Support | SRE Support | MLOps SRE Support\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.devopssupport.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347\",\"name\":\"Avinash kumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/db01f522798b98f8f474a1dfdd200df1c0e7ada232088d7a8192e14919e4de0a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/db01f522798b98f8f474a1dfdd200df1c0e7ada232088d7a8192e14919e4de0a?s=96&d=mm&r=g\",\"caption\":\"Avinash kumar\"},\"sameAs\":[\"www.linkedin.com\/in\/avinash-kumar-150791240\"],\"url\":\"https:\/\/www.devopssupport.in\/blog\/author\/avinash\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks - DevOps Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks - DevOps Support","og_description":"Cross-Site Scripting (XSS) remains one of the most common and dangerous security vulnerabilities in web applications. It allows attackers to inject malicious scripts into webpages viewed by...","og_url":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/","og_site_name":"DevOps Support","article_published_time":"2025-05-22T10:34:48+00:00","article_modified_time":"2025-05-22T10:34:51+00:00","og_image":[{"width":947,"height":626,"url":"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png","type":"image\/png"}],"author":"Avinash kumar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Avinash kumar","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#article","isPartOf":{"@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/"},"author":{"name":"Avinash kumar","@id":"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347"},"headline":"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks","datePublished":"2025-05-22T10:34:48+00:00","dateModified":"2025-05-22T10:34:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/"},"wordCount":602,"commentCount":0,"image":{"@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/","url":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/","name":"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks - DevOps Support","isPartOf":{"@id":"https:\/\/www.devopssupport.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png","datePublished":"2025-05-22T10:34:48+00:00","dateModified":"2025-05-22T10:34:51+00:00","author":{"@id":"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347"},"breadcrumb":{"@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#primaryimage","url":"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png","contentUrl":"https:\/\/www.devopssupport.in\/blog\/wp-content\/uploads\/2025\/05\/image.png","width":947,"height":626},{"@type":"BreadcrumbList","@id":"https:\/\/www.devopssupport.in\/blog\/understanding-and-protecting-against-xss-cross-site-scripting-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.devopssupport.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding and Protecting Against XSS (Cross-Site Scripting) Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.devopssupport.in\/blog\/#website","url":"https:\/\/www.devopssupport.in\/blog\/","name":"DevOps Support","description":"DevOps Support | DevSecOps Support | SRE Support | MLOps SRE Support","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.devopssupport.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347","name":"Avinash kumar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/db01f522798b98f8f474a1dfdd200df1c0e7ada232088d7a8192e14919e4de0a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db01f522798b98f8f474a1dfdd200df1c0e7ada232088d7a8192e14919e4de0a?s=96&d=mm&r=g","caption":"Avinash kumar"},"sameAs":["www.linkedin.com\/in\/avinash-kumar-150791240"],"url":"https:\/\/www.devopssupport.in\/blog\/author\/avinash\/"}]}},"_links":{"self":[{"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/posts\/3101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/comments?post=3101"}],"version-history":[{"count":1,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/posts\/3101\/revisions"}],"predecessor-version":[{"id":3103,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/posts\/3101\/revisions\/3103"}],"wp:attachment":[{"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/media?parent=3101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/categories?post=3101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/tags?post=3101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}