Microservices - Thinking Outside the Lines

    In our last few posts we’ve talked about two of the architectural and operational weapons of Cloud Native: containers & dynamic management. However, when I go out and talk to Cloud Native users I find...

    Is Dynamic Management the Real Ops Disruptor?

    Are Containers the Best Cloud Native Tool?

    Earlier in this blog series we described how every strategy comprises a goal and the actions we take or tools we use to accomplish it. We’re now going to consider some of the tools that Cloud Native u...

    The 3 Most Common Cloud Native Goals & What Kind of Company Are You?

    Cloud Native Goals In our earlier posts in this series we described a Cloud Native Strategy as a way to achieve business goals by taking a particular set of actions:

    What is a Cloud Native Strategy?

    In the last two blogs on this subject we talked about Cloud Native computing and about strategy. In this blog, we'll put the two together and consider Cloud Native Strategy - what it means and how to ...

    The Seven Elements of Strategy (Which You'll Need To Know If You Are Creating a Cloud Native Strategy)

    In the first post in this series, my colleague Anne Currie said that cloud native was about speed, scale and costs. We discovered that cloud native helps you get your ideas to market quickly; that clo...

    What Is Cloud Native?

     According to the Cloud Native Computing Foundation (CNCF) a Cloud Native strategy is about scale and resilience: “distributed systems capable of scaling to tens of thousands of self healing multi-ten...

    Docker Swarm with Azure Container Services and Azure Resource Manager

    Docker Swarm with Azure Container Services and Azure Resource Manager In an earlier post we explained how easy it is to setup a Docker Swarm cluster in Azure using Azure Container Services and Terrafo...

    Kubernetes Quick Tip: Whitelisting source IP with Ingress in Kubernetes

    If you are using Ingress on your Kubernetes cluster it is possible to restrict access to your application based on dedicated IP addresses. One possible use case would be that you have a development se...