Posts by Category

Containers

Container Competition

13 minute read

Last year, Nathan invited us to take part in a little internal competition. The idea was to get people to play with Docker in a way that they might not other...

Auto Expiration Of Transient Quay.io Images

2 minute read

If you use a Quay.io repository to store Dockerfile images that can be regarded as transient, e.g. branch integration tests, then you can tag those Docker im...

Back to Top ↑

Presentations

Keynote - Cloud Security Summit

less than 1 minute read

Wes Childs was invited to present a keynote at the 2017 Cloud Security Summit, London. This talk covers our journey to the cloud and you can watch it here: ...

Back to Top ↑

Testing

Back to Top ↑

Team

Back to Top ↑

Kubernetes

Managing multiple Kubernetes clusters

5 minute read

Working with multiple Kubernetes (K8s) clusters has become commonplace, thanks to the availability of managed clusters by every major cloud provider and adva...

Back to Top ↑

Docker

Container Competition

13 minute read

Last year, Nathan invited us to take part in a little internal competition. The idea was to get people to play with Docker in a way that they might not other...

Back to Top ↑

Practices

Continuous Integration @ IDBS

3 minute read

Originally this was to be a quick post highlighting that IDBS engineering is moving to trunk-based development, but it occurred to me, as a new member of the...

Back to Top ↑

Principles

Continuous Integration @ IDBS

3 minute read

Originally this was to be a quick post highlighting that IDBS engineering is moving to trunk-based development, but it occurred to me, as a new member of the...

Back to Top ↑

Onboarding

Continuous Integration @ IDBS

3 minute read

Originally this was to be a quick post highlighting that IDBS engineering is moving to trunk-based development, but it occurred to me, as a new member of the...

Back to Top ↑

security

IDBS and the Log4j2 Vulnerability

4 minute read

Some people see December as the month that brings lots of gifts, but in 2021 it included several that no one wanted, including a critical security vulnerabil...

Back to Top ↑