Skip to main content

How Solv Reduced Quality Engineering Setup Time to One Day for 150 Microservices Using BuildPiper

Solv is a leading Indian B2B marketplace designed to support small and medium businesses (SMBs). The platform offers a one-stop solution for SMBs to access competitive pricing, streamline orders, and access financing options within a user-friendly environment.

Problem Statement

Solv’s growing ecosystem of over 200 microservices led to operational inefficiencies, security vulnerabilities, and inconsistent environments. Manual processes for configuration management, access controls, deployments, and monitoring hindered scalability, highlighting the need for an automated, scalable solution to standardize operations, improve security, and streamline the development pipeline.

Standardization via BuildPiper

Standardized configuration management and various operational practices across multiple environments ensuring secure, consistent, and reliable deployments.

Env. Setup for 150+ Microservices

Leveraging BuildPiper's CLI tool, bpctl, Solv reduced their Quality Engineering environment setup time to just one day for more than 150 microservices, achieving a drastic improvement in efficiency.

DevSecOps Implementation

BuildPiper automated processes like security checks, image validation, and credential scanning. It also integrated Selenium pipelines for test automation, sharing auto-generated reports with users, and enhancing deployment security.

Challenges

  • Managing 200+ microservices with unique configurations across environments created deployment complexities and errors. 
  • Manual access provisioning to servers introduced delays and security risks. 
  • Lack of real-time monitoring and dashboards slowed issue resolution, hindering progress and productivity.
  • Absence of ingress version control caused configuration inconsistencies and downtime risks. 

Solutions

  • Automated Deployments: BuildPiper automated the deployment of over 200 microservices, drastically reducing manual efforts and improving release speed. CI/CD pipelines were optimized for error-free, efficient builds.

  • Self-Service Access Portal: A Jira-integrated portal automated access provisioning to Bastion hosts and databases, streamlining approval processes and removing bottlenecks. Custom Jira fields and webhooks triggered BuildPiper jobs, simplifying access management.

  • Configuration and Ingress Management: ConfigMaps and ingress settings were version-controlled in Bitbucket, ensuring consistent environments. Changes were deployed through approval-based pull requests, enabling authorized updates and easy rollbacks to reduce configuration drift.

  • Centralized Dashboards: Real-time monitoring and reporting dashboards provided visibility into environment health, application performance, and deployment status, empowering proactive issue management.
You can check more info about: Enhanced Security.

Comments

Popular posts from this blog

How to Perform Penetration Testing on IoT Devices: Tools & Techniques for Business Security

The Internet of Things (IoT) has transformed our homes and workplaces but at what cost?   With billions of connected devices, hackers have more entry points than ever. IoT penetration testing is your best defense, uncovering vulnerabilities before cybercriminals do. But where do you start? Discover the top tools, techniques, and expert strategies to safeguard your IoT ecosystem. Don’t wait for a breach, stay one step ahead.   Read on to fortify your devices now!  Why IoT Penetration Testing is Critical  IoT devices often lack robust security by design. Many run on outdated firmware, use default credentials, or have unsecured communication channels. A single vulnerable device can expose an entire network.  Real-world examples of IoT vulnerabilities:   Mirai Botnet (2016) : Exploited default credentials in IP cameras and DVRs, launching massive DDoS attacks. Stuxnet (2010): Targeted industrial IoT systems, causing physical damage to nuclear centrifu...

Comparison between Mydumper, mysqldump, xtrabackup

Backing up databases is crucial for ensuring data integrity, disaster recovery preparedness, and business continuity. In MySQL environments, several tools are available, each with its strengths and optimal use cases. Understanding the differences between these tools helps you choose the right one based on your specific needs. Use Cases for Database Backup : Disaster Recovery : In the event of data loss due to hardware failure, human error, or malicious attacks, having a backup allows you to restore your database to a previous state.  Database Migration : When moving data between servers or upgrading MySQL versions, backups ensure that data can be safely transferred or rolled back if necessary.  Testing and Development : Backups are essential for creating realistic testing environments or restoring development databases to a known state.  Compliance and Auditing : Many industries require regular backups as part of compliance regulations to ensure data retention and integri...

Infrastructure-as-Prompt: How GenAI Is Revolutionizing Cloud Automation

Forget YAML sprawl and CLI incantations. The next frontier in cloud automation isn't about writing more code; it's about telling the cloud what you need. Welcome to the era of Infrastructure-as-Prompt (IaP), where Generative AI is transforming how we provision, manage, and optimize cloud resources. The Problem: IaC's Complexity Ceiling Infrastructure-as-Code (IaC) like Terraform, CloudFormation, or ARM templates revolutionized cloud ops. But it comes with baggage: Steep Learning Curve:  Mastering domain-specific languages and cloud provider nuances takes time. Boilerplate Bloat:  Simple tasks often require verbose, repetitive code. Error-Prone:  Manual coding leads to misconfigurations, security gaps, and drift. Maintenance Overhead:  Keeping templates updated across environments and providers is tedious. The Solution: GenAI as Your Cloud Co-Pilot GenAI models (like GPT-4, Claude, Gemini, or specialized cloud models) understand n...