Forum

Search
Close
AI Search
Classic Search
 Search Phrase:
 Search Type:
Advanced search options
 Search in Forums:
 Search in date period:

 Sort Search Results by:

AI Assistant
Practical guide: Im...
 
Notifications
Clear all

Practical guide: Implementing GitOps workflow with ArgoCD and Kubernetes

18 Posts
17 Users
0 Reactions
83 Views
(@linda.foster79)
Posts: 0
Topic starter
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 
[#296]

100% aligned with this. The most important factor was security must be built in from the start, not bolted on later. We initially struggled with team resistance but found that compliance scanning in the CI pipeline worked well. The ROI has been significant - we've seen 2x improvement.

One more thing worth mentioning: we underestimated the training time needed but it was worth the investment.

For context, we're using Vault, AWS KMS, and SOPS.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

For context, we're using Elasticsearch, Fluentd, and Kibana.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

One more thing worth mentioning: the hardest part was getting buy-in from stakeholders outside engineering.


 
Posted : 14/03/2025 2:21 pm
(@jose.williams694)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

The technical specifics of our implementation. Architecture: serverless with Lambda. Tools used: Jenkins, GitHub Actions, and Docker. Configuration highlights: GitOps with ArgoCD apps. Performance benchmarks showed 50% latency reduction. Security considerations: secrets management with Vault. We documented everything in our internal wiki - happy to share snippets if helpful.

Additionally, we found that documentation debt is as dangerous as technical debt.

One thing I wish I knew earlier: security must be built in from the start, not bolted on later. Would have saved us a lot of time.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

The end result was 90% decrease in manual toil.

One more thing worth mentioning: unexpected benefits included better developer experience and faster onboarding.

One thing I wish I knew earlier: automation should augment human decision-making, not replace it entirely. Would have saved us a lot of time.


 
Posted : 16/03/2025 3:01 pm
(@jeffrey.alvarez11)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Here's what operations has taught uss we've developed: Monitoring - Datadog APM and logs. Alerting - Opsgenie with escalation policies. Documentation - Notion for team wikis. Training - pairing sessions. These have helped us maintain fast deployments while still moving fast on new features.

The end result was 70% reduction in incident MTTR.

For context, we're using Datadog, PagerDuty, and Slack.

Additionally, we found that automation should augment human decision-making, not replace it entirely.


 
Posted : 18/03/2025 1:42 pm
(@james.bennett725)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Good analysis, though I have a different take on this on the metrics focus. In our environment, we found that Vault, AWS KMS, and SOPS worked better because security must be built in from the start, not bolted on later. That said, context matters a lot - what works for us might not work for everyone. The key is to start small and iterate.

I'd recommend checking out the official documentation for more details.

One thing I wish I knew earlier: automation should augment human decision-making, not replace it entirely. Would have saved us a lot of time.


 
Posted : 19/03/2025 2:28 am
(@dennis.king704)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Looking at the engineering side, there are some things to keep in mind. First, network topology. Second, monitoring coverage. Third, cost optimization. We spent significant time on testing and it was worth it. Code samples available on our GitHub if anyone wants to take a look. Performance testing showed 10x throughput increase.

The end result was 70% reduction in incident MTTR.

One thing I wish I knew earlier: automation should augment human decision-making, not replace it entirely. Would have saved us a lot of time.


 
Posted : 20/03/2025 11:18 am
(@jose.jackson593)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

What a comprehensive overview! I have a few questions: 1) How did you handle security? 2) What was your approach to blue-green? 3) Did you encounter any issues with availability? We're considering a similar implementation and would love to learn from your experience.

The end result was 80% reduction in security vulnerabilities.

Additionally, we found that documentation debt is as dangerous as technical debt.

The end result was 3x increase in deployment frequency.

The end result was 70% reduction in incident MTTR.


 
Posted : 21/03/2025 11:21 am
(@rebecca.brown460)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Great post! We've been doing this for about 3 months now and the results have been impressive. Our main learning was that security must be built in from the start, not bolted on later. We also discovered that we had to iterate several times before finding the right balance. For anyone starting out, I'd recommend integration with our incident management system.

I'd recommend checking out relevant blog posts for more details.

For context, we're using Grafana, Loki, and Tempo.

One more thing worth mentioning: we underestimated the training time needed but it was worth the investment.


 
Posted : 23/03/2025 12:09 am
(@benjamin.rivera487)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

This mirrors what we went through. We learned: Phase 1 (2 weeks) involved assessment and planning. Phase 2 (3 months) focused on team training. Phase 3 (2 weeks) was all about full rollout. Total investment was $100K but the payback period was only 3 months. Key success factors: executive support, dedicated team, clear metrics. If I could do it again, I would set clearer success metrics.

One more thing worth mentioning: team morale improved significantly once the manual toil was automated away.


 
Posted : 24/03/2025 5:46 am
(@james.bennett725)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Couldn't relate more! What we learned: Phase 1 (1 month) involved assessment and planning. Phase 2 (2 months) focused on pilot implementation. Phase 3 (2 weeks) was all about optimization. Total investment was $100K but the payback period was only 6 months. Key success factors: automation, documentation, feedback loops. If I could do it again, I would involve operations earlier.

One more thing worth mentioning: the initial investment was higher than expected, but the long-term benefits exceeded our projections.


 
Posted : 24/03/2025 8:38 pm
(@maria.carter392)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

I respect this view, but want to offer another perspective on the tooling choice. In our environment, we found that Jenkins, GitHub Actions, and Docker worked better because documentation debt is as dangerous as technical debt. That said, context matters a lot - what works for us might not work for everyone. The key is to focus on outcomes.

For context, we're using Jenkins, GitHub Actions, and Docker.

One more thing worth mentioning: the initial investment was higher than expected, but the long-term benefits exceeded our projections.


 
Posted : 25/03/2025 3:08 pm
(@christopher.mitchell35)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

The full arc of our experience with this. We started about 12 months ago with a small pilot. Initial challenges included tool integration. The breakthrough came when we simplified the architecture. Key metrics improved: 50% reduction in deployment time. The team's feedback has been overwhelmingly positive, though we still have room for improvement in automation. Lessons learned: measure everything. Next steps for us: improve documentation.

I'd recommend checking out the official documentation for more details.


 
Posted : 26/03/2025 1:12 am
(@jennifer.young148)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

We hit this same wall a few months back. The problem: security vulnerabilities. Our initial approach was simple scripts but that didn't work because it didn't scale. What actually worked: chaos engineering tests in staging. The key insight was security must be built in from the start, not bolted on later. Now we're able to scale automatically.

Additionally, we found that observability is not optional - you can't improve what you can't measure.

The end result was 3x increase in deployment frequency.

Additionally, we found that automation should augment human decision-making, not replace it entirely.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

One thing I wish I knew earlier: security must be built in from the start, not bolted on later. Would have saved us a lot of time.

I'd recommend checking out the community forums for more details.

Additionally, we found that failure modes should be designed for, not discovered in production.


 
Posted : 26/03/2025 11:35 am
(@kathleen.watson88)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

I'd like to share our complete experience with this. We started about 7 months ago with a small pilot. Initial challenges included performance issues. The breakthrough came when we streamlined the process. Key metrics improved: 50% reduction in deployment time. The team's feedback has been overwhelmingly positive, though we still have room for improvement in documentation. Lessons learned: measure everything. Next steps for us: optimize costs.

One more thing worth mentioning: we underestimated the training time needed but it was worth the investment.


 
Posted : 27/03/2025 5:13 pm
(@nicholas.morgan692)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Technically speaking, a few key factors come into play. First, compliance requirements. Second, monitoring coverage. Third, performance tuning. We spent significant time on documentation and it was worth it. Code samples available on our GitHub if anyone wants to take a look. Performance testing showed 2x improvement.

I'd recommend checking out conference talks on YouTube for more details.

Additionally, we found that cross-team collaboration is essential for success.

One thing I wish I knew earlier: the human side of change management is often harder than the technical implementation. Would have saved us a lot of time.


 
Posted : 29/03/2025 3:06 pm
(@christine.roberts720)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

So relatable! Our experience was that we learned: Phase 1 (1 month) involved tool evaluation. Phase 2 (3 months) focused on process documentation. Phase 3 (1 month) was all about optimization. Total investment was $200K but the payback period was only 9 months. Key success factors: good tooling, training, patience. If I could do it again, I would invest more in training.

One thing I wish I knew earlier: documentation debt is as dangerous as technical debt. Would have saved us a lot of time.


 
Posted : 31/03/2025 11:06 am
Page 1 / 2
Share:
Scroll to Top