We will be part of AWS Webinars in Romanian, on 28 October 2021, highlighting our strong expertise in Modern Application Development. In this session, you will learn how we migrated a PHP application from bare-bones VMs to a managed and auto-scalable setup on Amazon EKS. Andrei Petrescu, our CTO, will go through the legacy setup,Continue reading “Join us at AWS Webinars in Romanian, 28 October 2021”
Bucharest, July 7, 2021—CloudHero, a DevOps consulting company becomes an AWS Select Consulting Partner thus providing certified services, expert solutions and ability to guide companies on their journey towards digital transformation through AWS. According to a report published in 2020, 63% of small and medium size businesses aim at increasing the use of public cloudContinue reading “CloudHero Becomes AWS Select Consulting Partner and Expands Cloud Expertise”
CloudHero Becomes Google Cloud Partner Advantage to Enable Cloud Adoption & Cloud Native Data Platforms
CloudHero today announces the beginning of a new journey: becoming part of the Google Cloud Partner Advantage program.
In many corporate system infrastructures, it’s very important for the information to be encrypted end-to-end, to be protected from potential vulnerabilities. We’ve learned from our experience that creating a fully secure setup is essential. The main part of the diagram that we will focus on today will be the traffic going from the Nginx proxy to Istio’s HTTPS port. Keep in mind that, even if it’s not compulsory to have a full HTTPS connection between Nginx and Istio, there are applications that won’t work if you don’t use SSL offloading in front (Keycloak, for example).
The key to success in any application development lifecycle is to have as little discrepancies as possible between environments. Luckily, Kubernetes and Docker give you the necessary tools to achieve environment uniformization. Nonetheless, it was always challenging to create development environments that would work on any operating system, be it Linux, Windows, or MacOS. This short article will guide you through all the necessary steps to create your own development environment with Vagrant and MicroK8S on your laptop or PC.
When it comes to giving people from your organization access to your Kubernetes cluster, things can get a little tricky. Kubernetes does not have an authentication mechanism by default. By doing this, you get stuck with an admin certificate you must share with the developers. In consequence, this gives them access to all the resources in the cluster, which can create holes in your security policy.
At CloudHero, we face challenging situations each day when helping our customers in their digitalization and automation journey. One such challenge was automating the process of cloning the production database and anonymizing the data for development use. Specifically, maintenance is usually done only on the production database, and the staging one has stale data, so there are a lot of differences between the staging and the production environment. Here, we are going to generalize the problem, so we help you adapt these methods to your own use case.
One common use case when sending logs to Elasticsearch is to send different lines of the log file to different indexes based on matching patterns. In this article, we will go through the process of setting this up using both Fluentd and Logstash in order to give you more flexibility and ideas on how to approach the topic.
Looking to increase developer productivity and observability at Otter, we noticed that when using one Elasticsearch index for each application, search becomes faster, the queries become easier, and the logs can be parsed using custom regex patterns, and we have full control over the cleanup policy when using Elasticsearch Curator.
Something went wrong. Please refresh the page and/or try again.
Get new content delivered directly to your inbox.