Ensure heightened security for applications in the ROKS Cluster by employing Istio Egress Gateway and routing through edge nodes for an added layer of protection.
This article delves into the functionalities and strengths of Ansible, Puppet, and Chef in automating configuration management tasks within DevOps workflows.
Learn how you can integrate Large Language Model (LLM) capabilities into your Java application, and how to integrate with LocalAI from your Java application.
Explore the synergy of GitOps and Kubernetes in modern software development. Learn their significance, working principles, and unified capabilities for agility and efficiency.
In this short post, we tried Docker Scout, the Docker image vulnerability detection tool. Thanks to it, we removed one high-level CVE we introduced in the code.
Pipelines that describe CI/CD processes have to be capable of self-testing. Learn some approaches for testing pipelines that reduce time to development and delivery.
This article will help automate the process of creating and configuring ALBs with AWS Load balancer controller and Ingress template on Elastic Kubernetes Service (EKS).
Learn how to update and even upgrade your running instances of JBoss EAP in a fully automated fashion using Ansible and its collection dedicated to EAP!
This guide explores Docker's networking drivers, including their significance, types, and best practices for selection to optimize container networking.
This article will help automate the process of creating and configuring DNS records in Route 53 using ExternalDNS and Ingress on Elastic Kubernetes Service (EKS).
This article provides an overview of technical debt specific to mobile applications. It covers the common reasons, the types of tech debt, and mitigation strategies.