DevOps

EC2 Image Builder in Action: From AMI Creation to Cross-Account Sharing

Introduction EC2 Image Builder is an AWS service that automates creating, updating, and deploying your Amazon Machine Images (AMIs). EC2 Image Builder creates a pipeline for Linux or Windows Server images for use with Amazon EC2. The pipeline manages all stages, including image creation, maintenance, validation, sharing, and deployment. Image Builder is free to use, […]

DevOps

Securing CI/CD Pipelines: Jenkins + Trivy for Container Image Scanning

Introduction In today’s DevSecOps pipelines, security can no longer be an afterthought and given short shrift; it must be baked in upfront. Container images, on which today’s apps are built, include frequently the operating system packages, the third-party libraries, and the app requirements that may come pre-packaged with known vulnerabilities if not properly controlled. These […]

Mudit Singhal
Mudit Singhal
Read

DevOps

Switching to Valkey on ElastiCache: Cost Savings Without Compromise

Every modern application today has one thing in common: it relies on speed. Users don’t wait around, systems can’t tolerate bottlenecks, and a couple hundred milliseconds can make the difference between a smooth experience and an abandoned page. And at the center of that performance equation, more often than not, is an in-memory data store. […]

Harsh Vardhan
Harsh Vardhan
Read

DevOps

Packer Alternative: Migrating to AWS EC2 Image Builder for Automated AMI Pipelines

Introduction HashiCorp Packer is one of the most popular open-source machine image builders. It helps engineers define infrastructure as code, installing software and layering security updates into AWS Machine Images, or AMIs. Packer is focused on image building. It has no capabilities around testing, scheduling, AWS notifications, or distribution. On the other hand, AWS EC2 […]

DevOps

Securing AWS ALB Behind CloudFront: Using WAF and Security Groups

Introduction A pretty common AWS setup is CloudFront in front of an Application Load Balancer (ALB). CloudFront improves performance and gives you some security features “for free.” But if you leave the ALB wide open, anyone can bypass CloudFront and hit it directly – not ideal. This documentation outlines two effective methods for restricting direct […]

DevOps

Migrating to the Cloud? Here’s Why 9 Out of 10 Clients Stick with TO THE NEW for DevOps

Introduction When companies move to the cloud, most think the hardest part is the migration itself. Truth is — that’s just the start. Over the past few years, we’ve worked with startups, large-scale platforms, and everything in between. What have we learned? Cloud without solid DevOps is like buying a sports car but never changing […]

DevOps

A Step-by-Step Guide to Using Secret Manager with GKE and CSI Driver

Introduction  Management of sensitive information such as API keys, credentials and configuration secrets are an important part of developing safe and reliable Skylands applications. In Google Cloud Ecosystem, Secret Manager provides a centralized and safe way to save, access and manage these secrets.When running applications on Google Kubernetes Engine (GKE), including Secret Manager guarantees that […]

Pooja Bisht
Pooja Bisht
Read

DevOps

Bringing Cloud-Native Power On-Prem: Deploying the Mirantis Ecosystem in Samsung’s Highly Isolated Environment.

Introduction In today’s enterprise IT world, container orchestration often feels like magic. It takes a bunch of servers and makes them behave like a single, well-oiled machine. But what happens when you don’t have the cloud at all? That was exactly the challenge we faced: building a production-grade Kubernetes platform inside Samsung’s fully air-gapped, on-premises […]

DevOps

From Raw Logs to Structured Data: Working with Datadog Log Pipelines

Introduction Logs coming from different services often follow inconsistent formats, naming conventions, and structures. This makes it difficult to search, analyze, and correlate events across your systems. Datadog Log Management solves this challenge with Pipelines, Processors, and Standard Attributes, which let you extract key fields, normalize attributes, and enrich log data at scale. In this […]