For an upcoming event, I was asked to give a demo of how to run Neo4j on Kubernetes. I had very little experience with Kubernetes, so I decided to document my journey for later reference.
-
Fearless Distroless
Distroless images are a solution to reduce your image size and improve its security, by providing neither a package manager nor a shell.
-
Modular Monolithic in Practice
In this article, you learn about the Modular Monolithic architecture and how you can create it using the Spring Framework and Gradle.
-
Vaadin 23.3 Improves Kubernetes Support, Adds Three New Components
Vaadin 23.3 includes improved clustering support for high availability and rolling updates. It also includes 3 new components.
-
Introduction to Kubernetes Extensibility
Let’s browser through several extension points in Kubernetes: the data model, admission controllers, and client-side.
-
Running your Database on OpenShift and CodeReady Containers
An introductory run-through of setting up your database on OpenShift, using your own hardware and RedHat’s CodeReady Containers.
-
Learning by Auditing Kubernetes Manifests
Find out about Checkov, which scans cloud infrastructure configurations to find misconfigurations before they’re deployed.
-
Back to Basics: Accessing Kubernetes Pods
When Kubernetes is set up, you’ll want to expose some pods outside the cluster. Here I describe different ways Kubernetes provides to do it.
-
Stateless, Secretless Multi-cluster Monitoring in Azure Kubernetes Service with Thanos, Prometheus and Azure Managed Grafana
This article aims at cloud native engineers that face the challenge of observing multiple Azure Kubernetes Clusters (AKS) and need a flexible, stateless solution.
-
Diving into JVM Framework Monitoring and Profiling
Let’s look at how frameworks work under the hood, namely Quarkus and Spring Boot, and how many threads they initiate to serve up results.
-
Modernize Legacy Code In Production: Rebuild Your Airplane Midflight Without Crashing
Table of Contents Why Modernize?Challenges1. Access to Legacy Source Code2. Inability to Isolate Legacy System3. Odd Formats and Custom StoresPreparation1. Feature Extraction2. Compliance Tests3. Code Coverage4. Recording and Backup5. ScaleTargets1. Authentication and Authorization2. Database3. CachingStrategy1. Module by Module2. Concurrent Deployment3. …