Skip to main content

How Solv Reduced Quality Engineering Setup Time to One Day for 150 Microservices Using BuildPiper

Solv is a leading Indian B2B marketplace designed to support small and medium businesses (SMBs). The platform offers a one-stop solution for SMBs to access competitive pricing, streamline orders, and access financing options within a user-friendly environment.

Problem Statement

Solv’s growing ecosystem of over 200 microservices led to operational inefficiencies, security vulnerabilities, and inconsistent environments. Manual processes for configuration management, access controls, deployments, and monitoring hindered scalability, highlighting the need for an automated, scalable solution to standardize operations, improve security, and streamline the development pipeline.

Standardization via BuildPiper

Standardized configuration management and various operational practices across multiple environments ensuring secure, consistent, and reliable deployments.

Env. Setup for 150+ Microservices

Leveraging BuildPiper's CLI tool, bpctl, Solv reduced their Quality Engineering environment setup time to just one day for more than 150 microservices, achieving a drastic improvement in efficiency.

DevSecOps Implementation

BuildPiper automated processes like security checks, image validation, and credential scanning. It also integrated Selenium pipelines for test automation, sharing auto-generated reports with users, and enhancing deployment security.

Challenges

  • Managing 200+ microservices with unique configurations across environments created deployment complexities and errors. 
  • Manual access provisioning to servers introduced delays and security risks. 
  • Lack of real-time monitoring and dashboards slowed issue resolution, hindering progress and productivity.
  • Absence of ingress version control caused configuration inconsistencies and downtime risks. 

Solutions

  • Automated Deployments: BuildPiper automated the deployment of over 200 microservices, drastically reducing manual efforts and improving release speed. CI/CD pipelines were optimized for error-free, efficient builds.

  • Self-Service Access Portal: A Jira-integrated portal automated access provisioning to Bastion hosts and databases, streamlining approval processes and removing bottlenecks. Custom Jira fields and webhooks triggered BuildPiper jobs, simplifying access management.

  • Configuration and Ingress Management: ConfigMaps and ingress settings were version-controlled in Bitbucket, ensuring consistent environments. Changes were deployed through approval-based pull requests, enabling authorized updates and easy rollbacks to reduce configuration drift.

  • Centralized Dashboards: Real-time monitoring and reporting dashboards provided visibility into environment health, application performance, and deployment status, empowering proactive issue management.
You can check more info about: Enhanced Security.

Comments

Popular posts from this blog

Cloud Data Warehouses vs. Data Lakes: Choosing the Right Solution for Your Data Strategy

In today’s data-driven world, companies rely on vast amounts of data to fuel business intelligence, predictive analytics, and decision-making processes. As businesses grow, so do their data storage needs. Two popular storage solutions are cloud data warehouses  and data lakes . While they may seem similar, these technologies serve distinct purposes, each with unique advantages and challenges. Here’s a closer look at the key differences, advantages, and considerations to help you decide which one aligns best with your data strategy. What Are Cloud Data Warehouses? Cloud data warehouses are designed for structured data and are optimized for analytics. They allow businesses to perform fast, complex queries on large volumes of data and produce meaningful insights. Popular cloud data warehouses include solutions like Amazon Redshift, Google BigQuery , and Snowflake. These tools enable companies to store, query, and analyze structured data, often in real-time, which can be incredibly use...

Cloud Security Posture Management – How to Stay Compliant

  Cloud computing has become the backbone of modern business operations. Organizations are increasingly migrating their workloads, applications, and data to the cloud to leverage its scalability, flexibility, and cost-efficiency. However, with this shift comes a new set of challenges, particularly in ensuring cloud data protection, security, and compliance of cloud environments. This is where Cloud Security Posture Management (CSPM) comes into play.   CSPM is a critical component of cloud security that helps organizations identify and remediate risks, enforce compliance, and maintain a strong security posture in their cloud infrastructure. In this blog, we’ll explore what CSPM is, why it’s essential, and how organizations can use it to stay compliant with industry regulations and standards.   What is Cloud Security Posture Management (CSPM)? Cloud Security Posture Management (CSPM) refers to a set of tools, processes, and practices designed to continuously monitor, assess...

Optimizing Cloud Spending: The Synergy Of DevOps And FinOps

In the rapidly growing field of cloud computing, managing expenses continues to be a challenge for businesses of all sizes. As organizations increasingly engage with cloud services, efficient management of cloud spend becomes an even more important responsibility. In this blog, we will explore how collaboration between DevOps and FinOps practices can lead to significant cost savings and increased operational efficiency. The Rise of Cloud Computing One of the major technological innovations that have changed the way organizations operate over recent years is the rise of cloud computing. Cloud computing has brought about a complete transformation in the way businesses operate making rapid scaling, high flexibility and maintaining cost-effectiveness for them, unlike traditional on-premises solutions that struggle to keep up with the growing demand. On the other hand, the cloud services billing model has its drawbacks. For example, it can lead to uncontrolled costs if the users don’t handl...