25 June 2021

Service-worker and static content authorization

Many web applications display various content in the browser. Many of these are only available to logged users or those with a specific role. Often API is secured by JSESSIONID or JWT cookie. While in the first case there is no problem with using the browser, in the case of JWT there is one problem. What is it?

14 May 2021

ELK Stack configuration using Ansible

We often receive information from a client that there was an error with the http 500 code on an application. The tester quickly creates a scenario to reproduce the error and another problem arises. Behind a nice frontend there are a dozen or so applications installed on different servers. The error information is undoubtedly in the log - just in which one? You can spend days trying to find the right file on the right server, or you can use a toolkit that allows you to aggregate logs.

15 March 2021

Environment Virtualization using KVM

Virtualizing your environment allows you to work with IT systems quickly and securely.  However, not every application can be containerized and packaged in a Docker container - this is where KVM comes to the rescue. KVM, or Kernel-based Virtual Machine, is an environment on which it is possible to run a virtual machine. The association with VirtualBox is most accurate - the idea is exactly the same. There are, of course, more technologies allowing to create virtual environments - such as VMware or Hyper-V.



25 May 2020

How to build Electronic Registered Delivery System

Can you have the confidence, proof of delivery and reliability of a traditional registered letter, and the convenience and speed of an email? Now, you can.

5 May 2020

How to migrate with Kubernetes

Kubernetes in practice. We are giving you the checklist.

21 April 2020

Which Objects in Kubernetes

For a beginner Kubernetes (k8s) user the variety of objects that you should be aware of can be overwhelming a little bit. In this article I would like to give you an overview of pod controllers object.

6 April 2020

Kubernetes Security

Security in your infrastructure should be considered as a key thing. According to type of your business, your requirements can be more or less tightened, but you always should keep an eye on it.

5 March 2020

Monitoring in Kubernetes

Going towards microservice architecture, you should be aware of complexity that it brings. Multiplication of replicas causes your infrastructure harder to monitor and maintain. You are simply not capable of keep an eye of each service by yourself. Additionally Kubernetes (k8s) infrastructure by itself must be monitored.

5 February 2020

How to provision your Kubernetes Cluster?

There are many tools that can help you with your cluster provisioning / setup.

15 January 2020

Why exposing Services in Kubernetes (k8s)

While working with Kubernetes, sooner or later you will need to call one application from the another. It’s obvious that we need a part of infrastructure which act as a Load Balancer and for the outside call we need also reverse proxy component. And this is where k8s Service and Ingress Controller come into play.


Your software development experts

We’re a team of experienced and skilled software developers – and people you’ll enjoy working with.

Start Your Projectadd