Kubernetes

First Steps with the Kubernetes Operator

...
First Steps with the Kubernetes Operator

This blog post demonstrates how you can use the Operator Lifecycle Manager to deploy a Kubernetes Operator to your cluster. Then, you will use the Operator to spin up an Elastic Cloud on Kubernetes (ECK) cluster. An operator is a software extension that uses custom resources (extension of the Kubernetes...

...
CONTINUE READING
DevOps

Targeting Kubernetes Cluster with Gremlin Chaos Test

...
Targeting Kubernetes Cluster with Gremlin Chaos Test

Gremlin is a leading software company focusing on chaos-test in the market. It also has a tool similar to Chaos Monkey which belongs to Netflix, but is more customized to test the system with random loads or scheduled shutdowns. In the article below we will be testing a simple Kubernetes...

...
CONTINUE READING
CI/CD

Jenkins Pipeline with Sonarqube and Gitlab

...
Jenkins Pipeline with Sonarqube and Gitlab

In this guide, we are going to deploy a continuous integration process between Jenkins, GitLab, and SonarQube. The end goal will be to review the code quality through SonarQube for GitLab repository using Jenkins. Following is the process flow we need to manage: Push code to GitLab from the local...

...
CONTINUE READING
DevOps

Minimal Dev Environment: VS Code + Docker

...
Minimal Dev Environment: VS Code + Docker

Like most developers, I like to keep my workstation clean. This is a quick rundown of how you can have a working dev setup, specifically for web apps, on Windows 10, Mac OSX and Linux. Sorry BSDs...   Things you need  1. Docker 2. VS Code 3. An SSH client (Optional)...

...
CONTINUE READING
Tutorial

Deploying bulletproof PAM with Gravitational Teleport

...
Deploying bulletproof PAM with Gravitational Teleport

Introduction According to one study, there is a cybersecurity attack every 39 seconds. Defending against such attacks has become of paramount importance to how businesses operate today. The traditional approach to securing IT infrastructure is perimeter-oriented solutions such as firewalls, VPNs, and password policies. While these are all good and...

...
CONTINUE READING