Stark & Wayne

Blog

You can become a superhero of automation and development by learning and practicing. This is our blog from our learnings and practice.

We are consultants and trainers in Cloud Foundry, devops automation and continous delivery. We have the best jobs in the world helping you have the best job in the world.

Which BOSH deployed virtual machines can talk to each other, is the communication 1 way or 2 way? Use arpy to quickly discover the answer to these questions!…

Posted by:Chris Weibel

Read More →

Now that we have everything deployed, let's explore and understand Argo and what it can do for you. Understanding Applications:An Argo Application is a Kubernetes Custom Resource Definition. It is used by Argo to…

Posted by:Konstantin Kiess

Read More →

How to build a Platform…

Posted by:Konstantin Kiess

Read More →

Logs are the lifeblood of a good diagnostic session. Too few of them and you have no idea what's going wrong. Too many, and you can't see the problem for the errors. Join James in this Kubectl trick as we take a look at Pod log retrieval!…

Posted by:James Hunt

Read More →

You've heard of root, but did you know you can get parts of root-iness without being the superuser with complete access to everything all the time?…

Posted by:James Hunt

Read More →

Last time, we successfully finished deploying the first part of our platform. We have bootstrapped an AWS Env via Terraform and deployed a Kubernetes Cluster via Kops. ‌‌‌‌Now that we have the infrastructure in place,…

Posted by:Konstantin Kiess

Read More →

Introdution:A follow along tutorial to build your own Platform. This was inspired by the gaming speedrun community. A speedrun is a play-through, or a recording thereof, of a whole video game or a selected…

Posted by:Konstantin Kiess

Read More →

Today we kick off our Spring 2020 internship and are excited to begin talking about the projects that our team will possibly be working on!…

Posted by:Patrick Jones

Read More →

Kubernetes can use Quarks & KubeCF to generate internal secrets, passwords, and certificates. But how do we rotate these secrets?…

Posted by:Dr Nic Williams

Read More →