Exploring container security: Use your own keys to protect your data on GKEExploring container security: Use your own keys to protect your data on GKEProduct Manager, Container security

At Google Cloud, we already encrypt data at rest by default, including data in Google Kubernetes Engine (GKE). However, we understand that you may need additional controls over encryption in GKE, especially for sensitive data that is used or accessed by applications running there. Today, we’re releasing two features to Read more…

Setting up a CI/CD pipeline by integrating Jenkins with AWS CodeBuild and AWS CodeDeploy

In this post, I explain how to use the Jenkins open-source automation server to deploy AWS CodeBuild artifacts with AWS CodeDeploy, creating a functioning CI/CD pipeline. When properly implemented, the CI/CD pipeline is triggered by code changes pushed to your GitHub repo, automatically fed into CodeBuild, then the output is Read more…

Exploring Container Security: Vulnerability management in open-source KubernetesExploring Container Security: Vulnerability management in open-source KubernetesProduct Marketing Manager, Container SecuritySoftware Engineer, Kubernetes Engine security

When it comes to open source software (OSS) like Kubernetes, some people get nervous not knowing everyone who’s worked on the code in the project. “How can I trust something when anyone can contribute?” “If there’s a vulnerability, who’s paying attention?” In fact, many OSS projects have robust security teams Read more…

Use GKE usage metering to combat over-provisioningUse GKE usage metering to combat over-provisioningProduct Manager

As Kubernetes has surged in popularity, its users are no longer just early adopters. A growing number of enterprises and SaaS providers also rely on large, multi-tenant Kubernetes clusters to run their workloads, benefitting from increased resource utilization and reduced management overhead.  In many large and medium-sized enterprises, a centralized Read more…

Swipe right for a new guide to PCI on GKESwipe right for a new guide to PCI on GKEStaff Security Solution ConsultantSecurity & Compliance Specialist, Cloud Customer Engineering

Developers love containers. They’re portable, helping to speed up development. They’re easy to inspect and debug, and they’re elastic, making it easy to scale up and down. But if you’re in a highly-regulated industry like financial services, you have complex and challenging regulatory IT requirements to deal with that can Read more…

Using API Gateway as a Single Entry Point for Web Applications and API Microservices

Introduction The benefits of high availability, scalability, and elasticity that AWS offers has proven to be a boon for Software-as-a-Service (SaaS) providers. AWS has also made it seamless to adopt microservices architectures for modernizing these SaaS applications, as well as providing API-based access for external applications. An API management layer Read more…

Automated Disaster Recovery using CloudEndure

There are any number of events that cause IT outages and impact business continuity. These could include the unexpected infrastructure or application outages caused by flooding, earthquakes, fires, hardware failures, or even malicious attacks. Cloud computing opens a new door to support disaster recovery strategies, with benefits such as elasticity, Read more…

Compute Engine or Kubernetes Engine? New trainings teach you the basics of architecting on Google CloudCompute Engine or Kubernetes Engine? New trainings teach you the basics of architecting on Google CloudTechnical Curriculum Developer

Google Cloud wants you to be able to use the cloud on your terms, and we provide a range of computing architectures to meet you where you are. In practice, this often means choosing between Compute Engine and Google Kubernetes Engine (GKE). But, which one will best serve your needs? Read more…