In this blog we provide some context around why you need microservices and explain how the adoption of microservices was the catalyst that ultimately led to continuous delivery and continuous processes.
In this Part 2 of our top 11 CICD tools for creating an automated pipeline to Kubernetes, we looked at tools designed for Continuous Delivery.
In this blog we look at the top 11 tools for continuous delivery to Kubernetes and discuss the pros and cons of each one.
Looking at a CICD pipeline with security in mind, reveals some interesting concerns. Consider the credentials and access typically assigned to each step, and what’s actually required for each step - Read Write access, and Read Only access. The CI system can be a target, because it’s got credentials for the source code, the image repo and the cluster, and it crosses two logical security boundaries. Learn how you can mitigate this with a GitOps approach.
A “you build it, you own it” development process requires tools that developers know and understand. “GitOps” is our name for how we describe modern best practices for high velocity application development with cloud native tools. Read this summary post about the GitOps pipeline model, why its beneficial to adopt this methodology and how to get started.