Python in Production (Part 5 of 5)
Welcome back to the Python in Production series. In the fourth part of the series, we learned how to run our program as a service on a linux machine using systemd. In the part of the series, we will learn how to automate our build process using Jenkins.…
Python in Production (Part 4 of 5)
Welcome back to the Python in Production series. Now that we have a runnable binary, we are ready to integrate our program into a system.…
What Makes Entando a Highly Available Architecture?
High availability within the software world means a user can employ a technology to do a piece of work when needed. It needs to be Scalable, Resilient, Reliable, and Durable. Entando is a Highly Available Architecture, because of Kubernetes.…
Python in Production (Part 3 of 5)
In Part 3 of Python in Production we learn how to generate a single file binary executable and why doing so will aid your path to production.…
Coming from an AWS background, when I was asked to help out on a project…
Python in Production (Part 2 of 5)
Welcome back to the Python in Production series. In the first part [https://blog.ippon.…
Python in Production (Part 1 of 5)
Writing Python code is fast and easy. It is thanks to this fact that Python…
Intro DevOps Engineers have moved from on-premise, monolithic applications to large-scale application systems in the…
If you have worked with CI/CD, chances are you have used the likes of…
I have recently been sucked into the field known as DevOps [https://en.wikipedia.org/…
The Trusty Bucket - Access Control Lists
"Just stick it in an S3 bucket." It is a line I have heard countless…
A Beginner's Guide to AWS Cloud Architecture
This is a high-level overview about the most foundational and important pieces that make up the AWS cloud. Some prior knowledge of IP addresses would be beneficial, but not crucial.…
Distributed Tracing using AWS X-Ray
As monoliths have been replaced by microservice applications, growing in size and complexity, the challenge…
Do you have publicly inaccessible database that you need to SSH into? Using SSH Reverse Tunneling, aka SSH Reverse Port Forwarding, you can securely connect to the database without directly opening it up to a vector of attack.…
Start Automating API Tests with Postman
What is Wrong with Cucumber? For a long time now many of us have been…