Every application needs to be configured and we need the flexibility to adapt this configuration without recreating the application artifact or image. This constitutes a pattern for a Continuous Delivery approach.
How would we adapt an application in a containerized world to the different setups of development, staging, sandbox and production environments? The answer is to use external configuration data, which is different for each environment.
Often, it is better to keep all the configuration data in a single place and not scattered around in various resource definition files. …
Many — if not most — businesses store an off-site backup of critical client information that can really save them if something goes wrong. Simply backing up data and having an effective backup and disaster recovery plan in place can help mitigate various types of threats.
Cloud providers like Amazon or Google offer automated backup features for AWS RDS and Cloud SQL, respectively.
Let’s suppose we have the requirement to ensure up to 35 days of backups for Google Cloud SQL instances. …
I decided to write these steps because I was recently involved in migrating a complex application from AWS to GCP and as with other systems of this kind we cannot meet their SLAs by relying on CPU or memory usage metrics only.
Autoscaling is an approach to automatically scale up or down workloads based on the resource usage. The K8s Horizontal Pod Autoscaler:
The API Gateway pattern implements a service that’s the entry point into the microservices based application, from external API clients or consumers.
It is responsible for request routing, API composition, and other edge functions such as authentication.
When working with a microservices architecture, either on a greenfield project or during migration from monolith, a best practice is to start addressing cross-cutting concerns. Authentication is such a concern and in this article we’ll cover the Authentication of a multi-tenancy application.
There are numerous technologies we can use to implement an API gateway pattern, including off-the-shelf API Gateway products like Kong.
When it receives a request, the Kong API Gateway searches within a routing map that specifies which upstream service to route the request to. This function is identical to the reverse proxy feature provided by web servers such as NGINX. Kong is based on the NGINX HTTP server, and let us configure flexible routing rules that use the HTTP method, headers and path to select the backend/upstream service and it also provides a bundle of plugins that implement edge functions such as authentication: acl and key auth. …