Sealed Secrets is a Kubernetes Custom Resource Definition Controller which allows you to store even sensitive information (aka secrets) in Git, which previously has not been an option. In addition, you can use Weave Cloud’s Deploy feature in conjunction with Sealed Secrets to create a continuous deployment pipeline where all operations are git based and where the desired state of your apps is declared in your git repos including your secrets.
Weaveworks, is proud to see Kubeadm become part of the Certified Kubernetes tools. Members of our Developer Experience team Ilya Dmitrichenko and Lucas Käldström are both core contributors of SIG-cluster-lifecycle. This particular SIG works on kubeadm, a tool for bootstrapping a best-practice Kubernetes cluster easily.
In this tutorial you will learn how to set-up OpenFaaS on Kubernetes with monitoring and alerting using Weave Cloud. Using OpenFaaS for serverless avoids being locked-in to one of the cloud vendors. It's easy to run in Kubernetes, letting you mix different services depending on your applications needs.
Weaveworks utilizes Kubernetes on AWS to achieve greater development velocity for a cloud native application to gain control and operational efficiencies. Read up on some of our best practices.
Hear from Weaveworks contractor Lucas Käldström on how far kubeadm has come, where it’s going, and how you can get involved.
Observability can be seen as part of the Continuous Delivery cycle for Kubernetes. Observed state must be compared with the desired state in Git. The role of a GitOps dashboard is to enable observation and speed up understanding and validation of the system, and suggest mitigating actions. Monitoring alone does not answer all questions: metrics are symptoms but not the disease.
Weave Cloud works alongside machine learning platforms such as Seldon’s. In this tutorial you will deploy a predictive service that recognizes drawn numbers from 0 to 9.
Step by step instructions on how you can achieve automated continuous delivery to a Kubernetes cluster using Weave Cloud Deploy. We will cover configuring automated builds, immutable container images, deploying new container images and automating deployments.
GitOps relies on your whole system to be expressed declaratively. The GitOps pipeline model places Git at the design centre - everything upstream of deployment is anchored by Git. As a result a developer can update some code in GitHub and release into production as a pull request.
Canonical's conjure-up makes it easy to deploy and operate Kubernetes in production, using a neat, easy-to-use CLI installer. Weave Cloud fills in the gaps missing with a Kubernetes install and provides the tools necessary for a full development lifecycle.
Alexis Richardson is defining “GitOps” as a methodology for developer tooling to drive operations. This post discussed the use of declarative tools and best practices of configurations being code and therefore should be versions controlled.
This tutorial shows you how to deploy and manage Kubernetes with Rancher. You will then use Weave Cloud to complete the development lifecycle, and Deploy, Explore and Monitor your app as it runs in Kubernetes.
Watch Justin Cormack speak about the ins and outs of Linuxkit. Linuxkit provides a Docker-native experience in IT infrastructures that include a variety of OS’s which are not bundled with a native version of Linux...
The Weave Online User Group talk given by Carter Morgan defines of what a "production-ready" cloud application looks like.
The world has been patiently waiting for the launch of Stringly™, a platform for distributing highly optimized strings that is sure to disrupt the global string market. The VC checks have cleared and its time to give the people what they...
Luke Marsden explores different architecture models for achieving continuous delivery with Kubernetes. He will be discussing best practices such as establishing a single source of truth and utilizing efficient rollbacks without requiring new code changes to be pushed.
Learn how to add a service to Weave Cloud – from naming and organization to security and monitoring, Tom Wilkie shares best practices and lessons learned.