Most Popular

1500 questions
4
votes
4 answers

How to manage 10+ team environments with Helm and Kubernetes?

I'm looking for feedback on how we can improve our team environment and staging deployment process. We currently have 10 agile teams, and set up our Kubernetes deployments through Helm as follows: All our helm charts are in a single git repo. At the…
avi
  • 1,279
  • 1
  • 13
  • 32
4
votes
1 answer

What strategies exist to transition DB Migrations with Stored Procedures to Continuous Delivery?

Our company has broken up most of our large Monolith application into smaller Microservices and we have a clear plan on how to get new services on Kubrenetes into a CI/CD pipeline. However, we still have some parts of our applications which have not…
avi
  • 1,279
  • 1
  • 13
  • 32
4
votes
2 answers

What is happening in an Azure Devops build and release?

I'm finding the Azure devops documentation pretty poor - or maybe I'm just not familiar enough with it for it to make any kind of sense to me. Having said that, I've managed to create a build pipeline that runs tests and published my project, then I…
Percy
  • 141
  • 2
4
votes
1 answer

In jenkins, how to re-run old builds of a job?

Some old builds are failed in my jenkins job and I need to re-run them again. How to do that?
Naik
  • 101
  • 2
  • 2
  • 5
4
votes
1 answer

How to use ecs service dicovery

I'm trying to use amazon service discovery to register a Redis server in order to be reachable by other ECS services in the same cluster. I'm using EC2 to deploy my services not Fargate, so service discovery create a simple SRV DNS record, that's…
Mohamed
  • 61
  • 5
4
votes
1 answer

Process auditing in containers

I've read numerous articles on this going back to 2013, but what I wasn't able to ascertain is whether a reliable method has yet been devised for auditing processes inside a container. This question applies primarily to Linux, as I'm not very…
orodbhen
  • 141
  • 2
4
votes
1 answer

How to securely pass sensitive data to EC2 Spot instances?

Right now, we only use EC2 on-demand instances, and we provision sensitive data (credentials, private keys, etc.) on the instances' EBS which are encrypted with a KMS key. My understanding is that I have a few ways to pass those secret data to Spot…
Philippe
  • 155
  • 4
4
votes
2 answers

Best practice for installing new jenkins server

When creating a fresh new Jenkins server is it better to install it on a VM or Docker? I know that for most situations when you want just one bit of software on a server the answer would be Docker. Because of all it's plugins and their updates it is…
Uberhumus
  • 277
  • 4
  • 14
4
votes
1 answer

node js deployment on production server

I wanted to know standard process to deploy nodejs app on production. As of now I am following the process as below Pull the source code git pull git_url Install npm dependencies npm install Build the code npm run build run the application nohup…
Sunil Bhoi
  • 61
  • 1
4
votes
2 answers

How does 'Environment Management' work in a DevOps world?

I've had some very interesting conversations today about the role of Environment Management within teams that follow DevOps practices. The traditional role of an Environment Manager was someone who: Took overall responsibility for coordinating…
Richard Slater
  • 11,612
  • 6
  • 41
  • 81
4
votes
1 answer

Does Prometheus expose the Horizontal Pod Autoscaler's "Current CPU Utilization" as shown in the Kubernetes dashboard?

In the Kubernetes dashboard, I can see for a HPA the following information: Min Replicas: 3 Max Replicas: 11 Target CPU Utilization: 80% Status Current Replicas: 3 Desired Replicas: 3 Current CPU Utilization: 10% Last Scaled: 5 days However, I…
Darragh
  • 141
  • 1
4
votes
2 answers

Coding conventions for docker-compose files?

Is there some globally admitted coding conventions for docker-compose files? Below is a sample docker-compose.yml from a small project we have here: version: 3 networks: net: driver: 'bridge' services: app: build: . networks: -…
Sylvain Leroux
  • 1,550
  • 1
  • 13
  • 25
4
votes
2 answers

Impact on policy after deleting IAM user

I have created one IAM User named "test" with S3 and Glacier Permission. Now with user "test" i created one life cycle policy to move data from S3 to Glacier at every 5 days. Now, i delete IAM user "test" because i don't need it anymore. So my…
Jay
  • 994
  • 2
  • 10
  • 20
4
votes
2 answers

Is containerized deployment of jenkins on ECS better than running jenkins inside EC2 instance to secure pipeline information?

I am new to AWS, docker and jenkins. I want to run a jenkins build pipeline and I have tried using following two ways on AWS: Running jenkins inside the EC2 instance following the steps at this AWS link. I created a new EC2 instance and installed…
bot
  • 141
  • 4
4
votes
1 answer

In Docker, is there any advantage or disadvantage in using 'CMD cmd1 && cmd2' versus 'CMD cmd1 && exec cmd2'?

In Docker, when chaining several startup commands (CMD) in shell form, is there any advantage in using the shell's exec feature to replace it with the last command of the chain instead of just running it as a child process of the startup shell? Here…
Sylvain Leroux
  • 1,550
  • 1
  • 13
  • 25