AWS

How to attach an AWS EBS storage volume to your Docker container

...
How to attach an AWS EBS storage volume to your Docker container

In an ideal world, Docker containers should be ephemeral without any reliance on external storage. In the microservice world, this is achievable when services are connecting to external databases, queues, and other services. Sometimes though, we need persistent storage, when we're running services such as Jenkins, Prometheus, or Postgres. Fortunately,...

...
CONTINUE READING
AWS

Part1: Kubernetes AWS Resource Access: kube2Iam

...
Part1: Kubernetes AWS Resource Access: kube2Iam

IntroductionOne of the major benefits of using containers for application, and Kubernetes for their orchestration, is that you can get the most out of the underlying virtual machines. This however, gives rise to a unique problem of managing access for PODs to various AWS services. For example: A Kubernetes node...

...
CONTINUE READING
Docker

Serverless Asterisk with Docker and AWS Fargate

...
Serverless Asterisk with Docker and AWS Fargate

Asterisk is a powerful freebase PBX providing VoIP and Telephony solutions, catering to the needs of both Enterprise and Stand-Alone levels. In the article below, we would demonstrate the creation of a highly-scalable Asterisk cloud server through Fargate task, which would require minimal maintenance and administration. Prerequisite Docker installed on...

...
CONTINUE READING
AWS

Deploy your C++ Lambda with Docker

...
Deploy your C++ Lambda with Docker

In this article we will explore How you can use your C++ Runtime with Lambda Function. AWS Lambda allows us to use our app in a serverless architecture. As an addition to all the available runtimes in AWS Lambda, AWS announced Custom Runtimes at AWS Re:Invent 2018 where they...

...
CONTINUE READING
Kubernetes

Optimizing K8s cluster costs with Kubecost

...
Optimizing K8s cluster costs with Kubecost

I will always remember the first time I started playing around with Kubernetes on Amazon EKS as a personal hobby and looked at my costs a month later. This was around when I was first dipping my feet into the waters of the DevOps tools ecosystem and container orchestration with...

...
CONTINUE READING
Tutorial

Deploying bulletproof PAM with Gravitational Teleport

...
Deploying bulletproof PAM with Gravitational Teleport

Introduction According to one study, there is a cybersecurity attack every 39 seconds. Defending against such attacks has become of paramount importance to how businesses operate today. The traditional approach to securing IT infrastructure is perimeter-oriented solutions such as firewalls, VPNs, and password policies. While these are all good and...

...
CONTINUE READING