Open in app

Sign In

Write

Sign In

Johann Gyger
Johann Gyger

496 Followers

Home

About

Published in ITNEXT

·Apr 6, 2021

Renovate Your Software

Code rots. The day you release it, your software becomes a legacy. Some call this technical debt. You have to maintain actively. This article shows you how. Problem statement Today's software contains many dependencies. Typically, you use a plethora of open-source libraries for your programming language of choice. Your build tool will…

Software Development

5 min read

Renovate Your Software
Renovate Your Software
Software Development

5 min read


Published in ITNEXT

·Mar 21, 2021

Pimp your GitLab pipeline permissions

Let’s assume you have a GitLab CI/CD pipeline that changes a repository. Or maybe you want to leverage full access to the GitLab API. What are the options? Option 1: Use a personal access token (PAT) You can create a personal access token and define it as a custom environment variable. You could put it in .gitlab-ci.yml, but…

Gitlab

3 min read

Pimp your GitLab pipeline permissions
Pimp your GitLab pipeline permissions
Gitlab

3 min read


Published in ITNEXT

·Jan 31, 2021

Automatic HTTPS with Azure Container Instances (ACI)

Let’s assume you want to deploy a simple containerized application or service to the Azure cloud. Additionally, your service needs to be reachable publicly via HTTPS. This technical article shows you how to achieve this goal. Azure Container Instances According to the architecture guide Choosing an Azure compute service you’ve got several options…

Azure

4 min read

Automatic HTTPS with Azure Container Instances (ACI)
Automatic HTTPS with Azure Container Instances (ACI)
Azure

4 min read


Published in ITNEXT

·Apr 24, 2019

Effective Secrets with Vault and Kubernetes

Introduction Kubernetes is the de-facto standard for container orchestration, and Vault by HashiCorp is the de-facto standard for secrets management. Now the question is: how do you combine those technologies to use secrets from your central Vault instance in your Kubernetes applications? One solution would be to use the AppRole auth…

Kubernetes

5 min read

Effective Secrets with Vault and Kubernetes
Effective Secrets with Vault and Kubernetes
Kubernetes

5 min read


Apr 4, 2019

Kafka on Kubernetes — a good fit?

Introduction Kubernetes is designed to run stateless workloads. These workloads typically come in the form of a microservices architecture, are lightweight, scale well horizontally, adhere to the 12-factor app principles, and can deal with circuit breakers and chaos monkeys. Kafka on the other side is essentially a distributed database. This means…

Kubernetes

7 min read

Kafka on Kubernetes — a good fit?
Kafka on Kubernetes — a good fit?
Kubernetes

7 min read


Aug 19, 2018

Open Source is Eating the World

Open source turns 20 this year — happy birthday! In this blog I will touch on several aspects of open source software (OSS) and tell you why I think it’s so important. Why is open source so valuable? There are a number of reasons: First of all, you don’t have to pay license fees or subscriptions…

Open Source

4 min read

Open Source is Eating the World
Open Source is Eating the World
Open Source

4 min read


Published in Coinmonks

·Jan 23, 2018

My Journey with the Corda Blockchain

Recently, I was asked if I could help implement a prototype based on the Corda blockchain technology. The idea was to build a novel type of document management system (DMS) which can be used to securely share legal documents between companies or business units. I had never heard of the…

Blockchain

4 min read

My Journey with the Corda Blockchain
My Journey with the Corda Blockchain
Blockchain

4 min read


Oct 31, 2017

Stateless Architectures Win

Computing in distributed systems is difficult. However, we live in a distributed world: the Internet, web apps, and most mobile apps would not be able to run on only one huge central server. …

Serverless

2 min read

Stateless Architectures Win
Stateless Architectures Win
Serverless

2 min read


Jun 22, 2017

Secure Config as Code

How do you manage your database passwords for your application when applying the DevOps practice Everything as Code? This article gives you some directions. What is Config as Code? Before we can dive into Secure Config as Code we have to know what “… as Code” means: Config as Code is about treating the configuration…

DevOps

3 min read

Secure Config as Code
Secure Config as Code
DevOps

3 min read


May 11, 2017

What is DevOps?

DevOps is difficult to explain as there is no exact definition. Here’s my attempt to give a quick explanation and an overview of the pillars of DevOps. DevOps is a cultural movement that aims to improve the collaboration between development and operations, resulting in getting changes faster and more frequently…

DevOps

4 min read

What is DevOps?
What is DevOps?
DevOps

4 min read

Johann Gyger

Johann Gyger

496 Followers

Cloud Consultant at peakscale.ch

Following
  • Petko Karamotchev

    Petko Karamotchev

  • Greg Lim

    Greg Lim

  • Joseph Livni

    Joseph Livni

  • Yoriyasu Yano

    Yoriyasu Yano

  • Dan Lorenc

    Dan Lorenc

See all (463)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech