How To Run Symfony On Google Cloud Run With The Demo App [Step-by-Step Guide] Symfony is without doubts one of the most popular PHP frameworks. It has amazing flexibility and is written in an applaudable modular fashion. Some Symfony components even power other prominent frameworks like Laravel. Running Symfony is a bit tricky at times, especially the permissions of the cache and logs folder, this blog post demystifies running the Symfony Demo App in a docker container and hosting it serverless on Google Cloud Run. Prerequisites You have done at least one project with Symfony (of course you are comfortable with PHP and composer) You have a good working knowledge of git and Github Know a fair bit of docker, maybe even multi-stage build Have a working Google cloud account (they give you $300 credit free for 1 yr, no reasons not to have an account) Read full article or {TWEET THIS} byGeshan Manandhar Musings On Software Architecture: Monoliths to Microservices But I believe it is a bad idea to use the microservice architectural style from the start of a new project. I see that a microservices architecture adds a huge complexity overhead on the infrastructure, and the developers need to take a lot of extra steps not directly related to code to do their job, i.e. communication and coordination. Basically, you need not only a team to build a microservices architecture, but you need a very good team. It is very easy to build a bad microservices architecture, because it involves very high-level tasks which are not intuitive to the average developer or infrastructure manager. Read full article or {TWEET THIS} byLeonardo Venturini IoT Electric Scooter Cloud Data Collection and Visualization with Soracom + Raspberry Pi [Part 2] We'll send each data packet through Soracom's secure cellular network, so it’ll be incredibly difficult for a malicious hacker to tamper with the electric scooter and access its data. We’ll also be able to easily track the electric scooter’s location, battery, and speed. Normally, we’d have to create and manage our own database and server solutions to do all this, but luckily, Soracom has their own solution for managing data. We can just use SORACOM Harvest to collect and store data. It’s super easy to set up too. All the Raspberry Pi has to do is send an API request to the Harvest endpoint which can be accomplished in a couple lines of code. Soracom conveniently has another service on their platform called SORACOM Lagoon that lets us easily visualize our data with charts, maps, and tables. We don’t even have to write any code! Lagoon can connect to Harvest automatically, so we don’t need to worry about shuffling data between different servers and services. Read full article or {TWEET THIS} byAaron Huang Serverless Can Help You To Focus Much like high-level programming languages are an abstraction of machine code, Serverless is an abstraction for cloud infrastructure. When programming in a low-level language, we need to understand the memory requirements for our code to run, explicitly allocate and de-allocate it. Same with traditionally hosted applications, we need to estimate the workload at any given moment in time and provision the infrastructure required to run it. Just like how high-level programming languages abstract away the burden of configuration, enabling us to build applications faster, Serverless enables us to focus on the code that’s relevant to our product without having to worry about babysitting servers. Read full article or {TWEET THIS} bySimona Cotin Serverless Myths Debunked - Top Things You Thought You Knew The shift to a cloud-native technology stack, such as the move to serverless applications, actually has the ability to accelerate implementation and improve application security. In order to accomplish this, a clear blueprint is critical in order to fully understand what it is, and what it enables, so that organizations can have confidence that they are using the right tools and processes to avoid risk. In fact, organizations that have taken this approach when deploying sensitive serverless applications have been able to adopt the right set of security solutions to minimize risk and maximize security, and are finding these applications to be the most secure applications they are operating. Read full article or {TWEET THIS} byJessica Bruce |