Archive of posts in category 'DevOps'

Please note: This archive page is only available in English. If a German version of a post is available, you can change the language once you've opened the post.
See all posts

Scroll down to see more ...

post icon GitOps Repository Structures and Patterns Part 6: Example Repositories

10/11/2023 Johannes Schnatterer in DevOps

GitOps Repository Structures and Patterns Part 6: Example Repositories

Learn from example repositories how to apply GitOps-repository structures and patterns to find templates, ideas and tips for your own projects.

Read more
post icon GitOps Repository Structures and Patterns Part 5: Wiring Patterns

09/20/2023 Johannes Schnatterer in DevOps

GitOps Repository Structures and Patterns Part 5: Wiring Patterns

Learn what structures and patterns exist for wiring your GitOps operator with repositories, folders, environments, etc. to help you implement your GitOps process in the best way possible.

Read more
post icon GitOps Repository Structures and Patterns Part 4: Promotion Patterns

09/15/2023 Johannes Schnatterer in DevOps

GitOps Repository Structures and Patterns Part 4: Promotion Patterns

Learn what possibilities there are through patterns and structures to implement environments (also known as stages) with your GitOps.

Read more
post icon GitOps Repository Structures and Patterns Part 3: Repository Patterns

09/11/2023 Johannes Schnatterer in DevOps

GitOps Repository Structures and Patterns Part 3: Repository Patterns

Learn which repository patterns and structures you can use to model your requirements in your GitOps process.

Read more
post icon GitOps Repository Structures and Patterns Part 2: Operator Deployment Patterns

09/07/2023 Johannes Schnatterer in DevOps

GitOps Repository Structures and Patterns Part 2: Operator Deployment Patterns

Learn about the patterns you can use to design your GitOps process and related processes. In this second part, you will be introduced to operator deployment patterns.

Read more
post icon GitOps Repository Structures and Patterns Part 1: Introduction and Overview

09/05/2023 Johannes Schnatterer in DevOps

GitOps Repository Structures and Patterns Part 1: Introduction and Overview

Learn about patterns that you can use to design your GitOps process and the associated processes. This first part introduces the five different categories of patterns.

Read more
post icon Kubernetes least privilege implementation using the Google Cloud as an example

04/07/2022 Lukas von Maikowski in DevOps

Kubernetes least privilege implementation using the Google Cloud as an example

Everyone knows it: granting privileges is always a balance between security, usability and maintenance effort. If permissions are granted very generously, the effort is very low and there are rarely any hurdles to use; however, security is compromised. If permissions are granted sparingly, security is higher, but there are costly processes and a lot of administrative overhead.

Read more
post icon Mastering GitOps Event

03/17/2022 Daniel Huchthausen in DevOps

Mastering GitOps Event

On April 07, 2022, the Heise online event Mastering GitOps will take place with an exciting program around the use of GitOps. In addition to a detailed introduction to the topic, the event will also show how Kubernetes clusters can be managed and how code reviews can be simplified.

Read more
post icon DevOps in medium-sized companies – Is the hype justified?

05/19/2021 Daniel Huchthausen in DevOps

DevOps in medium-sized companies – Is the hype justified?

Is the hype around DevOps justified? Dr. Peer Faßnacht, Head of Customer Services at Cloudogu GmbH, says "yes" – if a few prerequisites are met. Read the interview with the magazine "IT Mittelstand" here.

Read more
post icon Coding Continuous Delivery: CIOps vs. GitOps with Jenkins

04/21/2021 Johannes Schnatterer in DevOps

Coding Continuous Delivery: CIOps vs. GitOps with Jenkins

Continuous delivery (CD) is an agile software development approach that has proven to be a suitable way to reliably and repeatably produce high-quality software in short cycles. The use of containers and the cloud, e.g., on platforms such as Kubernetes (K8s), offers many opportunities to make CD processes more robust and simpler. One such option is GitOps. This article provides some concrete examples to illustrate the differences between classic CD pipelines (CIOps) and GitOps processes.

Read more
post icon Automation assistants: GitOps tools in comparison

03/17/2021 Johannes Schnatterer in DevOps

Automation assistants: GitOps tools in comparison

If you want to switch from classic CI/CD environments to GitOps, then you can choose from any of a large number of available tools. However, it is not always easy to tell which features they support and how suitable they are for your project at first glance. Help in making a decision.

Read more
post icon Kubernetes AppOps Security Part 6: Pod Security Policies (2/2) - Exceptions and Troubleshooting

10/28/2020 Johannes Schnatterer in DevOps

Kubernetes AppOps Security Part 6: Pod Security Policies (2/2) - Exceptions and Troubleshooting

Pod Security Policies (PSP) allow to use cluster wide settings that are used for all new containers. In comparison to the Security Context, the usage of PSPs not as easy, but especially for large organizations with large clusters it can be beneficial to use them, because they reduce the necessity for manual configuration.

Read more
post icon Kubernetes AppOps Security Part 5: Pod Security Policies (1/2) – Good Practices

09/30/2020 Johannes Schnatterer in DevOps

Kubernetes AppOps Security Part 5: Pod Security Policies (1/2) – Good Practices

Pod Security Policies (PSP) allow to use cluster wide settings that are used for all new containers. In comparison to the Security Context, the usage of PSPs not as easy, but especially for large organizations with large clusters it can be beneficial to use them, because they reduce the necessity for manual configuration.

Read more
post icon Kubernetes AppOps Security Part 4: Security Context (2/2) – Background

05/20/2020 Johannes Schnatterer in DevOps

Kubernetes AppOps Security Part 4: Security Context (2/2) – Background

A container is basically a normal Linux process that runs isolated from the rest of the system via certain kernel components. This makes containers lighter but more vulnerable than virtual machines (VMs). To reduce this vulnerability to attack, the container runtimes offer a variety of settings whose default values strike a compromise between usability and security.

Read more
post icon Kubernetes AppOps Security Part 3: Security Context (1/2) – Good Practices

03/17/2020 Johannes Schnatterer in DevOps

Kubernetes AppOps Security Part 3: Security Context (1/2) – Good Practices

The virtual construct of a “container” is a normal Linux process at its core that largely runs in isolation from the rest of the system using certain kernel components. This makes containers lighter but more vulnerable than virtual machines (VMs). To reduce this vulnerability to attack, the container runtimes offer a variety of settings whose default values strike a compromise between usability and security.

Read more
post icon Kubernetes AppOps Security Part 2: Using Network Policies (2/2) - Advanced Topics and Tricks

01/20/2020 Johannes Schnatterer in DevOps

Kubernetes AppOps Security Part 2: Using Network Policies (2/2) - Advanced Topics and Tricks

In a Kubernetes cluster, everything (nodes, pods, Kubelets, etc.) can communicate with each other by default. If an attacker succeeds in exploiting a security vulnerability in one of the applications, he can easily expand his attack to all underlying systems in the same cluster. You can restrict this vulnerability using the on-board network policy features found in Kubernetes.

Read more
post icon Kubernetes AppOps Security Part 1: Using Network Policies (1/2) – Basics and Good Practices

10/29/2019 Johannes Schnatterer in DevOps

Kubernetes AppOps Security Part 1: Using Network Policies (1/2) – Basics and Good Practices

If you deploy applications on a managed Kubernetes cluster, operations is responsible for security, right? Not really! Even though Kubernetes abstracts from hardware, its API offers many possibilities for developers to improve security for the applications that are operated on it, by not just using the default settings. This post explains for which attack vectors network policies can offer protection and it will also show pragmatic good practices based on practical examples.

Read more
post icon Continuous Delivery with Sonatype Nexus, Jenkins and the Cloudogu EcoSystem

05/09/2019 Johannes Schnatterer in DevOps

Continuous Delivery with Sonatype Nexus, Jenkins and the Cloudogu EcoSystem

In order to meet the growing demand to release new features at an increasingly faster pace, these features must be implemented faster and faster. But that's just one side of the coin. After all, these features have to be put into production as well. Often, deployments are made manually and prone to errors. They tie up resources, and they may take a long time. The solution is complete automation, which is called Continuous Delivery.

Read more
post icon Where is DevOps going?

01/22/2019 Jenny Dornberger in DevOps

Where is DevOps going?

A recent study shows where DevOps currently stands and which hurdles are still to be taken. How we tackle the issue, you'll learn in our blog post.

Read more