Tel Aviv, Israel
Jul 3, 2019   |  By Eyal Avni
In parts 1-3 of our blog series we walked you through all of the steps of setting up your own AWS Lambda-like FaaS with Knative. All that's left now is triggering our function, so let's begin! Using API Gateway as our example trigger makes things much easier, and hopefully you can learn about the eventing mechanism of Knative.
Jul 2, 2019   |  By Eyal Avni
In parts 1 and 2 of our 4-part blog series, we walked you through preparing your Knative cluster. Now we will bring Lambda into the mix. First things first - let's understand how Knative's design and different components answer and connect with the basic needs of Lambda's execution model: We now understand Knative's basic components, giving us all we need to execute a Lambda function.
Jul 1, 2019   |  By Eyal Avni
In part 1 of our blog series, we discussed how to set up a Kubernetes cluster. We will now begin setting up Knative. Like I mentioned before, there are 2 approaches: If you would like to interactively set it up and watch things progress in the background, it is time you open two terminals and connect with your SSH private key to both the master and the node with their terminal windows side by side. Ignore that 1-click script and move on to the Scripts & Explanation section that comes right after it.
Jun 30, 2019   |  By Eyal Avni
Knative is undoubtedly awesome. It is dynamic, source-centric, extendable, robust and well thought-out. And in a way, it allows you to take back control of your FaaS platform. But nothing good comes easy. Knative is a big system, and as more configurations and extensions appear, the more complex the setup becomes. In this first part of the series, we will try to solve some boilerplate issues, in addition to bringing something new to the table.
Jun 13, 2019   |  By Ido Neeman
Industry leaders (ourselves included) need to be held responsible when they overuse FUD. Enter the FUD button - developed precisely for this purpose.
Apr 2, 2019   |  By Nuweba
As the next logical step in cloud computing, serverless is fundamentally changing the way developers need to think about applications and write code. While new technologies will always raise security questions, claims that serverless poses new risks are incorrect; there are no new cybersecurity threats that are serverless-specific. In fact, serverless can actually improve an application’s security posture. This includes advantages such as that the serverless provider handles security for major parts of the stack and a small, contained blast radius.
Feb 3, 2019   |  By Nuweba
The next (and in our opinion, the best) evolution in cloud computing is serverless. And we’re not the only ones who think so. A recent report shared that more than 75% of companies plan or use this technology. However, as with any new technology, there are certain challenges that need to be addressed.