Tag: Cloud-Native



Blog

How to Build Real-Time Notification Service Using Server-Sent Events (SSE)


Most of the communication on the Internet comes directly from the clients to the servers. The client usually sends a request, and the server responds to that request. It is known as a client-server model, and it works well in most cases. However, there are some scenarios in which the server needs to send messages […]




Blog

Introduction to Kubernetes Security: Container Security


Focusing on Kubernetes security, we have to go through container security and their runtimes. All in all, clusters without containers running does not make much sense. Hardening workloads often is much harder than hardening the cluster itself. Let’s start with container configuration. Basic rules for containers There are two ways how you can get a […]




Blog

Whose Cluster Is It Anyway?


While researching how enterprises adopt Kubernetes, we can outline a common scenario; implementing a Kubernetes cluster in a company often starts as a proof of concept.




Blog

Common Kubernetes Failures at Scale


Currently, Vanilla Kubernetes supports 5000 nodes in a single cluster. It does not mean that we can just deploy 5000 workers without consequences – some problems and edge scenarios happen only in the larger clusters. In this article, we analyze the common Kubernetes failures at scale, the issues we can encounter if we reach a […]




Blog

Kubernetes Cluster Management: Size and Resources


Kubernetes cluster management can be demanding. This article helps you manage your cluster resources properly, especially in an autoscaling environment.




Blog

The Path Towards Enterprise Level AWS Infrastructure – Load Balancing and Application Deployment


Let’s finish up the process of building our AWS infrastructure and discover the last crucial elements of the AWS Cloud needed for our highly available, secure and fault-tolerant cloud system. This article is the third and the last one of the mini-series which walks you through the process of creating an enterprise-level AWS infrastructure and […]




Blog

The Path Towards Enterprise Level AWS Infrastructure – EC2, AMI, Bastion Host, RDS


Let’s pick up the thread of our journey into the AWS Cloud, and keep discovering the intrinsics of the cloud computing universe while building a highly available, secure and fault-tolerant cloud system on the AWS platform. This article is the second one of the mini-series which walks you through the process of creating an enterprise-level […]




Blog

The Path Towards Enterprise Level AWS Infrastructure – Architecture Scaffolding


This article is the first one of the mini-series which will walk you through the process of creating an enterprise-level AWS infrastructure. By the end of this series, we will have created an infrastructure comprising a VPC with four subnets in two different availability zones with a client application, backend server, and a database deployed […]




Blog

Why Nearshoring May Be the Best Choice for Your Software Development


Adapting the latest technologies obligates executives to decide if they should build an in-house team or outsource demanding processes and hire an external team. And while outsourced projects become more sophisticated, leaders responsible for making decisions are taking into account more factors than just cost savings. Here comes nearshoring. Disruptive economy, the fast-changing landscape of […]




Blog

Cloud Foundry Summit 2019 – Continuously Building the Future


Cloud Foundry Summit 2019 in Philadelphia was the first event on our list of conferences we’re heading to this year. It was an excellent season opening and another example that Cloud Foundry community is developing well. “Building the future” – this year’s motto is a good metaphor for the current situation. Cloud Foundry is evolving, […]




Blog

Outsourcing of Authorization and Authentication


Nowadays, we can observe many repetitive patterns in existing implementations. From microservices, to MVC layers, or REST APIs. Authorization and authentication are the fundamental parts of application security. The most popular pattern it the login and password, frequently with the addition of two-factor authentication via SMS code, e-mail or a software token. But the problem […]




Blog

5 Tips for Transferring Legacy Apps to the Cloud


With the growing popularity of cloud computing, legacy apps are driving toward an impending demise, and transferring legacy apps is becoming a must. Gartner forecasts that the worldwide public cloud revenue will grow 21.4 % in 2018 to a total of $186.4 billion, up from $153.5 billion in 2017. These staggering numbers are mainly due […]