Azure Foundations: A Compliance and Regulations Guide

Choosing Azure to host your cloud infrastructure is the beginning. Depending on any of the following reasons, industry compliance, organizational policies, testing infrastructure compliance, etc. You may decide to implement compliance and regulation on your cloud infrastructure. However, this is easier said than done. Implementing compliance can be daunting without

Daniel Makhoba Emmanuel
Azure

Managing the AWS Cloud Secrets - The Best Possible Way

Imagine this: You are in the charge of running a busy online business with a large cloud infrastructure. Your application processes thousands of transactions and connects to databases, payment gateways, and third-party APIs. One day, you wake up to discover that a developer accidentally exposed the public key in the

Obusor Ezekiel Umesi
Obusor Ezekiel Umesi
AWS

Multi-Cluster with Cilium on Civo cloud

Connecting two Kubernetes clusters can seem counterintuitive at first, as Kubernetes was designed to scale up and scale out workloads. In a previous post, we discussed multi-cluster deployments and how and why they might benefit you. In this post, we will focus on a practical implementation of a multi-cluster Kubernetes

Jubril Oyetunji
Jubril Oyetunji
Cilium

Introduction to eBPF and Cilium

Imagine being able to run programs directly at the core of your operating system—right within the kernel. There's no need to imagine, though, because Extended Berkeley Packet Filters (eBPF) make this possible. eBPF allows you to execute functions safely and securely within the Linux kernel. While it

Prince Onyeanuna
Prince Onyeanuna
Cilium

Build and push Docker images to AWS ECR using Github Actions

Finding Docker as part of the deployment cycle when building modern applications is nothing new. This wide acceptance of Docker stems from the problem it solves—limited stress about the OS where your application will be deployed. Docker containers provide a consistent environment, ensuring your application behaves the same way

Prince Onyeanuna
Prince Onyeanuna
AWS

Unlock the Secrets of Azure: Seamless Authentication with External Secrets Operator, Key Vault, and Workload Identity

In today's cloud-native landscape, securely managing secrets is essential for protecting sensitive data and ensuring compliance. Combining External Secrets Operator (ESO) with Azure Key Vault and Workload Identity authentication provides a robust solution that enhances security while simplifying secret management. By securely storing secrets in Azure Key Vault

Oluwafemi Osho
Oluwafemi Osho
Azure

Hands-On Guide to Distributed Tracing: Encore vs OpenTelemetry

Let's say you're managing an application with multiple moving parts, like an e-commerce app. In this application, you have services such as user authentication, product catalog, payment processing, order management, etc. Each of these services is deployed across different servers and potentially even different regions for

Prince Onyeanuna
Prince Onyeanuna
Monitoring

Introduction to Multi-Cluster Deployment in Kubernetes

When starting out with Kubernetes, you've probably used a single cluster architecture. This architecture is easy to set up and allows you to enjoy the benefits of scaling and deploying your applications. If you've used this setup for a long time and on much larger projects,

Prince Onyeanuna
Prince Onyeanuna
Kubernetes