EKS Pod Identity is a feature that enables applications running on EKS to securely access AWS services, such as AWS Secrets Manager, without the need for hardcoding or managing access credentials. Instead, EKS Pod Identity uses IAM roles to grant permissions to pods, allowing them to interact with AWS services seamlessly. In my last post, … Read More
When Kubernetes first hit the scene for container orchestration, devops engineers all asked, “Can I run my database in here?” We quickly learned the answer, “Hell no!”
In this episode, our host Keith Gregory talks to Drew Rogers, a consultant here at Chariot. Drew specializes in DevOps, and recently worked with a client that needed to be untethered from any particular cloud platform — like AWS, or Google. So he implemented a solution that involved a Kubernetes cluster running on Azure.
Abstract Introducing Quarkus.io. The rise in popularity of the linux container as the primary way to package your application seemed like a simple change on the surface. Yet, as we saw with the Java Docker Fail problem, it was not a transition completely without challenges for the Java community. Furthermore, we have now seen a … Read More
Abstract In the Java ecosystem, we have historically been enamored by the concept of the “Application Server,” the runtime engine that not only gave us portable APIs (e.g. JMS, JAX-RS, JSF, EJB) but also gave us critical runtime infrastructure for things like farm deployments, configuration, load-balancing, fail-over, distributed management and monitoring. In this session, we … Read More
Linux containers provide the ability to reliably deploy 1000s of application instances in seconds, but how do we manage it all? The answer is CoreOS and Kubernetes. This talk will help attendees wrap their minds around complex topics such as distributed configuration management, service discovery, and application scheduling at scale.