Know How to Use Velero to Backup and Migrate Kubernetes Resources and Persistent Volumes

Introduction

“Murphy’s law doesn’t mean that something bad will happen. It means that whatever can happen, will happen.” This is something related to destiny but we should not totally rely upon it and should be prepared for the worst.
The same philosophy referenced above applies to the tech world too. That’s the reason we should be prepared with our backup options choices possibly, a data set or Kubernetes cluster.

“Always be ready with backup options like Velero for Kubernetes.” Continue reading “Know How to Use Velero to Backup and Migrate Kubernetes Resources and Persistent Volumes”

Top DevSecOps Tools in 2022!

With increasing cyber threats, security has become a major bottleneck in rapid product delivery for enterprises today. Here’s how these top DevSecOps tools can help. Take a look!

DevSecOps is a term that’s short for Development, Security, and Operations. No doubt, this term has become the latest buzzword in the market nowadays. The “DevSecOps” methodology is based and built on the same principles as DevOps, but it is slightly different from it. Here’s how!

The DevSecOps approach incorporates security at all stages of the development workflow. In simpler words, DevSecOps is like DevOps plus security. When we talk about security in DevSecOps, it specifically refers to pipeline security, secure development lifecycle and embedding security policies to mitigate emerging risks, cyber threats & malicious attacks.

There is a wide variety of DevSecOps tools and software to encompass enterprise-grade DevSecOps practices in the software development lifecycle. Here, in this blog, we’ve picked some of the best DevSecOps tools available in the market today.

Let’s take a look at these top DevSecOps tools in 2022, NOW!

Continue reading “Top DevSecOps Tools in 2022!”

A Detailed Guide to Canary Deployments!

While building enterprise applications, you want to ensure that your customers have a bug-free user experience. Since bugs show up whenever a new code is deployed, your deployment process should be set up to identify bugs at an advanced stage before these bugs can affect your users. 

Here’s how canary deployment comes into the picture and takes care of everything to enable a seamless and bug-free app release ensuring a flawless experience for your users. Learn and know more about Canary deployment,  its different stages, the benefits of implementing canary deployments and how they are different from blue-green deployments on AWS and ECS, here in this blog. Let’s take a look!

Continue reading “A Detailed Guide to Canary Deployments!”

Know How to Get Started with Buildkite

We’re on the verge where all the small to big organisations are shipping software to customers in minutes. Earlier this was not possible, but thank’s to Continuous Integration (CI) and Continuous Delivery (CD) that made it possible.

Continuous Integration (CI) is the practice of integrating code changes from multiple contributors into a single project via automation. Continuous Delivery (CD) is the automated process to build, test, configure & deploy software into the production environment. Both methods combined make it possible to build, test & deploy everyday code changes into the production environment.

There are lots of tools in the market to implement CICD, one among which we are about to discuss today in this post.

Let me introduce you to Buildkite.

Continue reading “Know How to Get Started with Buildkite”

Know How to Access S3 Bucket without IAM Roles and Use Cases

We all have used IAM credentials to access our S3 buckets. But it’s not a very safe or recommended practice to keep our Access keys and Secrets stored in a server or hard code them in our codebase.
Even if we have to use keys, we must have some mechanism in place to rotate the keys very frequently (eg: using Hashicorp Vault). Another widely adopted method is to use IAM roles attached on the EC2 instance or the AWS service accessing the bucket.

But, what if we need access to the bucket from an on-premise Data Center where we can not attach an IAM role?

Yes, we can obviously use IAM credentials and secret tokens with the rotating mechanism. But setting up the key rotation mechanism itself could be another overhead if we do not have one already in place. What if we do not require keys or roles without making the bucket public?

In this blog, I will make an attempt to cater to this problem with another alternate and easy solution.

Continue reading “Know How to Access S3 Bucket without IAM Roles and Use Cases”