Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Deploying applications to Kubernetes from your CI pipeline

Now that we know the advantages of leveraging Ketch over other tools such as Helm to ease the deployment of our applications (BLOG: Helm vs. Ketch when Deploying Applications), a good next step is for us to understand how we can tie Ketch to our CI pipeline and have an automated deployment process. For this example, we will leverage Ketch, GitHub Actions, and a Kubernetes cluster on Google Kubernetes Engine (GKE).

Deploying AWS Lambda with Docker Containers: I Gave it a Try and Here's My Review

Among all the new features and services that AWS announced during the re:Invent 2020, my favorites were definitely the AWS Lambda updates. And there were many! For example, your code execution is no longer rounded up to the nearest 100ms of duration for billing — you are now billed on a per millisecond. On top of that, AWS increased the Lambda’s memory capacity to 10 GB, and correspondingly the CPU capacity up to 6 vCPUs.

Stackrox Acquisition: The Race to Secure Containers

Today, Red Hat announced its intent to acquire Stackrox. This is a very exciting development in the world of cloud-native security! First and foremost, congratulations to Stackrox, an early participant in the container security space. This acquisition is a great outcome for Stackrox given their nascent scale and on-premises offering.

Automated App Modernization from AIX to Linux in Days

When we talk about going Cloud-Native we often think about Microservices as well, probably because that’s where the actual innovation, time, cost-saving, and better utilization of resources happen. And CloudHedge is keenly focused on helping enterprises to bring the benefits of containers to traditional legacy business applications that are run on a widely used operating system: AIX!

Why Kubernetes is a game-changer for E-commerce

When I started working at Purple managing the E-commerce stack, I inherited a single AWS EC2 instance that represented our entire infrastructure. The problem was, the company was doubling in size every few months, and with this exponential increase in load combined with the issues we were already experiencing with this infrastructure, it became a large business risk.

Looking Back at 2020 and How We Remained True to Our Mission to Make Building Software Easier Despite The Pandemic

The last year was undeniably a different year for everybody. At the start of 2020, Coronavirus spread all over the world, resulting in a global pandemic. Covid affected the way we live, work, meet other people, and has drastically changed everyone’s lives in ways that we could not ever imagine. In a world of uncertainty, DevOps has undeniably become even more important.

Top Cloud-Native Guides for 2020

2020 was a busy year for Civo, and we couldn’t have done it, and get where we are now, without our community of users. Between the wider community, our Civo Ambassadors, and our staff team, there is an enormous amount of knowledge and skill to be found. I’d like to present some of our top cloud-native guides for the year gone by, drawn both from guides published on our site and around the web by our community of users.

Calico in 2020: The World's Most Popular Kubernetes CNI

Calico and Kubernetes go hand-in-hand. Kubernetes is the de facto standard for deploying and managing container-based applications at scale, both on-premises and in the cloud. Calico continues to be the most popular open-source networking and network security solution for Kubernetes. Despite the cataclysmic events that occurred in 2020, the Calico community, supported by the team at Tigera, remained focused and achieved several major successes. We are excited to share these highlights.

5 Best practices for ensuring secure container images

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the application life cycle is a critical part of security, but many organizations don’t even follow basic best practices for ensuring secure container images.