Forum

Search
Close
AI Search
Classic Search
 Search Phrase:
 Search Type:
Advanced search options
 Search in Forums:
 Search in date period:

 Sort Search Results by:

AI Assistant
Update: Implementin...
 
Notifications
Clear all

Update: Implementing GitOps workflow with ArgoCD and Kubernetes

22 Posts
18 Users
0 Reactions
76 Views
(@gregory.brooks453)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Let me dive into the technical side of our implementation. Architecture: microservices on Kubernetes. Tools used: Kubernetes, Helm, ArgoCD, and Prometheus. Configuration highlights: CI/CD with GitHub Actions workflows. Performance benchmarks showed 50% latency reduction. Security considerations: container scanning in CI. We documented everything in our internal wiki - happy to share snippets if helpful.

Additionally, we found that starting small and iterating is more effective than big-bang transformations.


 
Posted : 13/08/2025 10:04 pm
(@tyler.foster787)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

The technical implications here are worth examining. First, data residency. Second, monitoring coverage. Third, security hardening. We spent significant time on monitoring and it was worth it. Code samples available on our GitHub if anyone wants to take a look. Performance testing showed 2x improvement.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

The end result was 3x increase in deployment frequency.

I'd recommend checking out the community forums for more details.


 
Posted : 14/08/2025 9:30 pm
(@opsx-tom)
Posts: 76
Member Admin
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Diving into the technical details, we should consider. First, data residency. Second, backup procedures. Third, cost optimization. We spent significant time on automation and it was worth it. Code samples available on our GitHub if anyone wants to take a look. Performance testing showed 50% latency reduction.

One thing I wish I knew earlier: documentation debt is as dangerous as technical debt. Would have saved us a lot of time.

The end result was 40% cost savings on infrastructure.


 
Posted : 15/08/2025 3:38 pm
(@tyler.robinson235)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Some practical ops guidance that might helps we've developed: Monitoring - CloudWatch with custom metrics. Alerting - Opsgenie with escalation policies. Documentation - Confluence with templates. Training - pairing sessions. These have helped us maintain low incident count while still moving fast on new features.

For context, we're using Elasticsearch, Fluentd, and Kibana.

The end result was 3x increase in deployment frequency.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.


 
Posted : 17/08/2025 11:03 am
(@nicholas.morgan692)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Good point! We diverged a bit using Istio, Linkerd, and Envoy. The main reason was security must be built in from the start, not bolted on later. However, I can see how your method would be better for regulated industries. Have you considered chaos engineering tests in staging?

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

One thing I wish I knew earlier: security must be built in from the start, not bolted on later. Would have saved us a lot of time.


 
Posted : 17/08/2025 9:30 pm
(@donna.jimenez105)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Adding my two cents here - focusing on security considerations. We learned this the hard way when we had to iterate several times before finding the right balance. Now we always make sure to document in runbooks. It's added maybe 30 minutes to our process but prevents a lot of headaches down the line.

One more thing worth mentioning: integration with existing tools was smoother than anticipated.

The end result was 50% reduction in deployment time.

The end result was 3x increase in deployment frequency.


 
Posted : 18/08/2025 9:57 pm
(@elizabeth.perez157)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Allow me to present an alternative view on the team structure. In our environment, we found that Istio, Linkerd, and Envoy worked better because automation should augment human decision-making, not replace it entirely. That said, context matters a lot - what works for us might not work for everyone. The key is to start small and iterate.

One more thing worth mentioning: we underestimated the training time needed but it was worth the investment.

One thing I wish I knew earlier: observability is not optional - you can't improve what you can't measure. Would have saved us a lot of time.

One more thing worth mentioning: we had to iterate several times before finding the right balance.

Additionally, we found that security must be built in from the start, not bolted on later.

Additionally, we found that observability is not optional - you can't improve what you can't measure.

The end result was 60% improvement in developer productivity.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.


 
Posted : 20/08/2025 5:11 am
Page 2 / 2
Share:
Scroll to Top