Andrei Petrescu, Head of DevOps at CloudHero, has spent hundreds of hours implementing, debugging, and tuning Istio. This video is a workshop he presented at Cloud Native Bucharest on the 29th of September 2022. Watch the video below (available only in Romanian) and learn how to:
This year only, two companies using AWS reached out to us for help because they have been hacked, and their damage was over 30.000$. This is why we created a free ebook with 7 actionable steps that will secure an AWS account in just 30 minutes. And we mean that! Download this free ebook andContinue reading “FREE EBOOK: 7 Steps to Secure Your AWS Account in just 30 minutes”
Here’s a short overview of our first #AWSRoadshow. Great people , awesome partners and delicious beer . Looking forward for the next one and hope you’ll join us!
This video is a recording of the Tech Panel on “How to leverage AWS cloud-native technologies” at the Bucharest AWS Roadshow, powered by CloudHero on May 25th 2022. Learn more about the speakers Alex Bumbacea Software Engineer at Freshful by eMAG Vitalie Robu Backend Software Architect at Eturia Eduard Panfile Development Team Lead at Eturia
Introduction Kubernetes has a built-in feature for secrets management called a Secret. The Secret object is convenient to use but does not support storing or retrieving secret data from external secret management systems such as AWS Secrets Manager. It’s often beneficial to use Kubernetes with an external secrets service that handles secret management. Due to this limitation, GoDaddy cameContinue reading “Getting Started with External Secrets Operator on Kubernetes using AWS Secrets Manager”
Managing Pods distribution across a cluster is hard. Pod affinity and anti-affinity feature of Kubernetes allows some control of Pod placement. However, these features only resolve part of Pods distribution use cases. There is a common need to distribute the Pods evenly across the cluster for high availability and efficient cluster resource utilization. As such, PodTopologySpread schedulingContinue reading “Kubernetes: Evenly Distribution of Pods Across Cluster Nodes”
AWS Certified Solutions Architect is among the most valuable and highly sought-after cloud computing certifications in the world today. Earning AWS Certified Solutions Architect — Associate validates the ability to design and implement distributed systems on AWS. Introduction In your pursuit to pass this prestigious associate-level AWS certificate, we prepared this cheat sheet to help fellowContinue reading “AWS Certified Solution Architect Associate — SAA (C02) — Cheatsheet “
We will be part of AWS Webinars in Romanian, on 28 October 2021, highlighting our strong expertise in Modern Application Development. In this session, you will learn how we migrated a PHP application from bare-bones VMs to a managed and auto-scalable setup on Amazon EKS. Andrei Petrescu, our CTO, will go through the legacy setup,Continue reading “Join us at AWS Webinars in Romanian, 28 October 2021”
In many corporate system infrastructures, it’s very important for the information to be encrypted end-to-end, to be protected from potential vulnerabilities. We’ve learned from our experience that creating a fully secure setup is essential. The main part of the diagram that we will focus on today will be the traffic going from the Nginx proxy to Istio’s HTTPS port. Keep in mind that, even if it’s not compulsory to have a full HTTPS connection between Nginx and Istio, there are applications that won’t work if you don’t use SSL offloading in front (Keycloak, for example).
The key to success in any application development lifecycle is to have as little discrepancies as possible between environments. Luckily, Kubernetes and Docker give you the necessary tools to achieve environment uniformization. Nonetheless, it was always challenging to create development environments that would work on any operating system, be it Linux, Windows, or MacOS. This short article will guide you through all the necessary steps to create your own development environment with Vagrant and MicroK8S on your laptop or PC.