article thumbnail

Continuous integration with the Google Cloud Run orb

CircleCI

This post will demonstrate how to use the Google Cloud Run platform in a CI/CD pipeline. The pipeline will test the application’s code, build a Docker image, and deploy the image as a Google Cloud Run service on the Google Cloud Platform. Google Cloud Run. Google Kubernetes Engine (GKE).

article thumbnail

Infrastructure as code, part 3: automate Kubernetes deployments with continuous integration and deployment

CircleCI

In this post, I will demonstrate how to create continuous integration and deployment (CI/CD) pipelines that automate the Terraform IaC deployments that were covered in part 1 and part 2 of this series. Continuous integration and continuous deployment. Terraform Cloud. Google Cloud Platform.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cloud Computing Trends and Innovations

Apiumhub

Implementation: Implementing BeyondCorp principles using identity and access management tools, such as Google Cloud Identity-Aware Proxy or Microsoft Azure Active Directory Conditional Access. Confidential Computing Confidential computing addresses the challenge of securing data during processing.

Trends 52
article thumbnail

Simplifying your CI/CD build pipeline to GKE with CircleCI orbs

CircleCI

CircleCI - Used for continuous integration and continuous deployment (CI/CD). This lowers the cost of cloud computing expenses and simplifies operations and architecture. If you don’t have a Google Cloud Platform account, you can get one here. Authenticate it by entering this: gcloud auth login.

article thumbnail

Deploying an App to Google Kubernetes Engine with Codegiant

Codegiant

Continuous Integration and Continuous Deployment (CI/CD) are key practices in managing and automating workflows in Kubernetes environments. In this article, we'll learn how to use Codegiant to set up and manage CI/CD pipelines for applications deployed on Google Kubernetes Engine (GKE).

article thumbnail

Mitigate Cloud Breaches With a Holistic Approach to Cloud Identity and Access

Prisma Clud

Key Findings : 83% of organizations have hard-coded credentials in their source control management systems 85% of organizations have hard-coded credentials in virtual machines’ user data Issue 2: Weak Authentication and Unauthorized Access Incident #1: Two new users were created to impersonate valid employees.

Cloud 52
article thumbnail

Technology Trends for 2023

O'Reilly Media - Ideas

Companies are increasingly using training programs, password managers, multifactor authentication, and other approaches to maintaining basic hygiene. We took a separate look at the “continuous” methodologies (also known as CI/CD): continuous integration, continuous delivery, and continuous deployment.

Trends 133