<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: squareops</title>
    <description>The latest articles on Forem by squareops (@squareops).</description>
    <link>https://forem.com/squareops</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3006924%2F3e3f2b46-8cea-47e3-b3ad-5fa23f285986.png</url>
      <title>Forem: squareops</title>
      <link>https://forem.com/squareops</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/squareops"/>
    <language>en</language>
    <item>
      <title>The FinOps Playbook: 10 Automated Checks Every Cloud Team Should Run Weekly</title>
      <dc:creator>squareops</dc:creator>
      <pubDate>Thu, 26 Feb 2026 10:34:34 +0000</pubDate>
      <link>https://forem.com/squareops/the-finops-playbook-10-automated-checks-every-cloud-team-should-run-weekly-4nib</link>
      <guid>https://forem.com/squareops/the-finops-playbook-10-automated-checks-every-cloud-team-should-run-weekly-4nib</guid>
      <description>&lt;p&gt;Cloud costs don’t spike overnight.&lt;br&gt;
They creep.&lt;br&gt;
A forgotten snapshot here.&lt;br&gt;
An oversized instance there.&lt;br&gt;
A dev cluster running all weekend.&lt;br&gt;
By the time finance notices, the waste is already baked into the monthly bill.&lt;br&gt;
That’s why modern FinOps teams don’t wait for monthly reviews.&lt;br&gt;
They run automated weekly checks.&lt;br&gt;
Cloud cost optimization in 2026 isn’t about dashboards.&lt;br&gt;
It’s about discipline.&lt;br&gt;
Here’s a practical &lt;a href="https://squareops.com/spendzero/vs-kubecost" rel="noopener noreferrer"&gt;FinOps playbook&lt;/a&gt;:&lt;br&gt;
 10 automated checks every cloud team should run weekly.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;1️⃣ Idle Compute Instances&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Check for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;EC2 instances with low CPU (&amp;lt; 15–20%)&lt;/li&gt;
&lt;li&gt;Instances with no network activity&lt;/li&gt;
&lt;li&gt;Stopped instances with attached volumes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Idle compute is one of the fastest cost leaks.&lt;br&gt;
Automation should flag:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Underutilized workloads&lt;/li&gt;
&lt;li&gt;Candidates for downsizing&lt;/li&gt;
&lt;li&gt;Termination-ready instances&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;2️⃣ Unattached Storage (EBS &amp;amp; Disks)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Unattached volumes accumulate silently.&lt;br&gt;
Every week, check for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Orphaned EBS volumes&lt;/li&gt;
&lt;li&gt;Unused persistent disks&lt;/li&gt;
&lt;li&gt;Old unattached storage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Storage waste doesn’t look dramatic until it compounds across accounts.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;3️⃣ Snapshot Sprawl&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Snapshots are cheap individually.&lt;br&gt;
But hundreds of unnecessary backups aren’t.&lt;br&gt;
Automated weekly checks should:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identify snapshots older than policy threshold&lt;/li&gt;
&lt;li&gt;Detect duplicates&lt;/li&gt;
&lt;li&gt;Flag snapshots from deleted instances&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Lifecycle enforcement reduces silent cost buildup.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;4️⃣ Overprovisioned Instances&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Most workloads don’t need the instance size they were launched with.&lt;br&gt;
Weekly checks should:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Compare actual CPU &amp;amp; memory usage&lt;/li&gt;
&lt;li&gt;Identify oversized EC2 or VM instances&lt;/li&gt;
&lt;li&gt;Suggest better-fit instance families&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Rightsizing is one of the highest ROI cloud cost optimization actions.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;5️⃣ Kubernetes Resource Requests vs Usage&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In Kubernetes environments, waste often hides in:&lt;br&gt;
resources:&lt;br&gt;
 requests:&lt;br&gt;
   cpu: "2000m"&lt;br&gt;
   memory: "4Gi"&lt;br&gt;
When actual usage is half that.&lt;br&gt;
Weekly automation should:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Compare pod requests vs real utilization&lt;/li&gt;
&lt;li&gt;Identify inefficient workloads&lt;/li&gt;
&lt;li&gt;Highlight bin-packing inefficiencies&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Kubernetes cost optimization must be continuous.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;6️⃣ Idle Load Balancers &amp;amp; Elastic IPs&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Often forgotten after deployments.&lt;br&gt;
Automated detection should flag:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Load balancers with minimal traffic&lt;/li&gt;
&lt;li&gt;Unassociated Elastic IPs&lt;/li&gt;
&lt;li&gt;Legacy networking components&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Networking waste is common in multi-account environments.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;7️⃣ Non-Production Environments Running 24/7&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Dev and staging are notorious cost leaks.&lt;br&gt;
Weekly review should check:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dev clusters running off-hours&lt;/li&gt;
&lt;li&gt;Test environments active overnight&lt;/li&gt;
&lt;li&gt;Auto-scaling misconfigurations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Scheduling shutdowns for non-prod can cut 20–40% in those environments alone.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;8️⃣ Underutilized Reserved Instances &amp;amp; Savings Plans&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Many teams purchase commitments then misallocate them.&lt;br&gt;
Weekly checks should:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Measure RI/Savings Plan coverage&lt;/li&gt;
&lt;li&gt;Identify unused commitments&lt;/li&gt;
&lt;li&gt;Detect overcommitment risk&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Optimizing commitments ensures you're not overpaying twice.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;9️⃣ Tagging Compliance &amp;amp; Cost Allocation Gaps&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Without proper tagging:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cost attribution fails&lt;/li&gt;
&lt;li&gt;Accountability disappears&lt;/li&gt;
&lt;li&gt;Optimization stalls&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Weekly automated checks should:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Detect untagged resources&lt;/li&gt;
&lt;li&gt;Flag policy violations&lt;/li&gt;
&lt;li&gt;Ensure environment classification accuracy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;FinOps thrives on ownership.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;🔟 Anomalous Spend Spikes&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Anomaly detection isn’t optional anymore.&lt;br&gt;
Weekly automation should:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Detect unusual service-level spikes&lt;/li&gt;
&lt;li&gt;Flag unexpected region growth&lt;/li&gt;
&lt;li&gt;Identify sudden Kubernetes scaling anomalies&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The earlier you detect cost anomalies, the smaller the damage.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why Weekly Matters&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Why not monthly?&lt;br&gt;
Because cloud environments change daily.&lt;br&gt;
Deployments happen hourly.&lt;br&gt;
Infrastructure scales automatically.&lt;br&gt;
New services get added constantly.&lt;br&gt;
A monthly review means:&lt;br&gt;
4 weeks of accumulating waste.&lt;br&gt;
Weekly automation means:&lt;br&gt;
Early detection.&lt;br&gt;
Faster remediation.&lt;br&gt;
Smaller financial impact.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Manual Reviews Don’t Scale&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In small environments, manual audits work.&lt;br&gt;
At scale, they fail.&lt;br&gt;
Modern cloud environments require automated cost optimization systems that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Continuously scan for inefficiencies&lt;/li&gt;
&lt;li&gt;Surface actionable insights&lt;/li&gt;
&lt;li&gt;Provide real-time savings opportunities&lt;/li&gt;
&lt;li&gt;Reduce reliance on spreadsheet reviews&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;FinOps is no longer a reporting function.&lt;br&gt;
It’s an operational discipline powered by automation.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Real FinOps Mindset Shift&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Traditional mindset:&lt;br&gt;
“Let’s review the bill at month end.”&lt;br&gt;
Modern mindset:&lt;br&gt;
“Let’s eliminate waste every week.”&lt;br&gt;
Cloud cost optimization succeeds when:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Engineering owns efficiency&lt;/li&gt;
&lt;li&gt;Finance supports governance&lt;/li&gt;
&lt;li&gt;Automation detects waste continuously&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without structured weekly checks, even mature cloud teams drift into inefficiency.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Final Thought&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Cloud scale without cost discipline becomes margin erosion.&lt;br&gt;
But cloud scale with structured, automated FinOps checks becomes a competitive advantage.&lt;br&gt;
If you implement just these 10 weekly automated checks, you’ll likely uncover 15–30% of preventable waste within the first few optimization cycles.&lt;br&gt;
Because in the cloud:&lt;br&gt;
What you don’t review weekly you overpay for monthly.&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>aws</category>
      <category>devops</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Cloud Cost Optimization in 2026: A Practical Guide for DevOps &amp; FinOps Teams</title>
      <dc:creator>squareops</dc:creator>
      <pubDate>Wed, 25 Feb 2026 11:55:25 +0000</pubDate>
      <link>https://forem.com/squareops/cloud-cost-optimization-in-2026-a-practical-guide-for-devops-finops-teams-15in</link>
      <guid>https://forem.com/squareops/cloud-cost-optimization-in-2026-a-practical-guide-for-devops-finops-teams-15in</guid>
      <description>&lt;p&gt;Cloud adoption is no longer the competitive advantage.&lt;br&gt;
Cloud efficiency is.&lt;br&gt;
In 2026, nearly every serious tech company runs on AWS, Azure, or GCP. Infrastructure has become programmable, scalable, and globally distributed.&lt;br&gt;
But here’s the uncomfortable reality:&lt;br&gt;
Most organizations still waste 20–35% of their cloud spend.&lt;br&gt;
Not because the cloud is expensive.&lt;br&gt;
 But because the unmanaged scale is.&lt;br&gt;
That’s why &lt;a href="https://squareops.com/spendzero/" rel="noopener noreferrer"&gt;Cloud Cost Optimization&lt;/a&gt; in 2026 is no longer an optional operational strategy.&lt;br&gt;
Let’s break down what’s changed, what’s broken, and how DevOps and FinOps teams can fix it.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why Cloud Cost Optimization Looks Different in 2026&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Five years ago, optimization meant:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Turning off unused EC2 instances&lt;/li&gt;
&lt;li&gt;Buying Reserved Instances&lt;/li&gt;
&lt;li&gt;Reviewing AWS Cost Explorer once a month&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Today, that’s not enough.&lt;br&gt;
Modern cloud environments include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Kubernetes clusters&lt;/li&gt;
&lt;li&gt;Serverless workloads&lt;/li&gt;
&lt;li&gt;Multi-account architectures&lt;/li&gt;
&lt;li&gt;Multi-cloud deployments&lt;/li&gt;
&lt;li&gt;AI/ML infrastructure&lt;/li&gt;
&lt;li&gt;Ephemeral environments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cloud infrastructure is now dynamic by default.&lt;br&gt;
Which means optimization must also be continuous.&lt;/p&gt;

&lt;h2&gt;
  
  
  **The Biggest Sources of Cloud Waste in 2026
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
&lt;strong&gt;1. Overprovisioned Compute&lt;/strong&gt;&lt;br&gt;
Engineering teams still provision for peak traffic.&lt;br&gt;
CPU averages:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;15–30% utilization&lt;/li&gt;
&lt;li&gt;Memory underused&lt;/li&gt;
&lt;li&gt;Large instance types left untouched&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Across hundreds of instances, that’s serious waste.&lt;br&gt;
Rightsizing is still one of the fastest wins in cloud cost optimization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Kubernetes Inefficiencies&lt;/strong&gt;&lt;br&gt;
Kubernetes now drives a massive portion of cloud spend.&lt;br&gt;
Common issues:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Inflated resource requests&lt;/li&gt;
&lt;li&gt;Poor bin packing&lt;/li&gt;
&lt;li&gt;Underutilized nodes&lt;/li&gt;
&lt;li&gt;Dev clusters running 24/7&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Container orchestration without cost governance becomes a silent budget leak.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Idle &amp;amp; Orphaned Resources&lt;/strong&gt;&lt;br&gt;
As organizations scale:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Snapshots accumulate&lt;/li&gt;
&lt;li&gt;Unattached volumes linger&lt;/li&gt;
&lt;li&gt;Old load balancers stay active&lt;/li&gt;
&lt;li&gt;Elastic IPs sit unused&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No one intentionally creates waste.&lt;br&gt;
But without automation, it grows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Lack of Cost Ownership&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In many organizations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Engineering deploys&lt;/li&gt;
&lt;li&gt;Finance pays&lt;/li&gt;
&lt;li&gt;No one optimizes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without tagging discipline and team-level cost visibility, cloud spend becomes invisible at the workload level.&lt;br&gt;
And invisible costs don’t get fixed.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The 2026 Cloud Cost Optimization Framework&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;High-performing DevOps and FinOps teams follow a structured approach.&lt;br&gt;
Here’s the practical model.&lt;br&gt;
&lt;strong&gt;Step 1: Continuous Visibility (Not Monthly Reports)&lt;/strong&gt;&lt;br&gt;
Static dashboards are reactive.&lt;/p&gt;

&lt;p&gt;In 2026, teams need:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Real-time spend insights&lt;/li&gt;
&lt;li&gt;Service-level breakdowns&lt;/li&gt;
&lt;li&gt;Workload-level cost mapping&lt;/li&gt;
&lt;li&gt;Alerts for anomalies&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Visibility must move closer to engineering not remain in finance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Automated Waste Detection&lt;/strong&gt;&lt;br&gt;
Manual audits cannot keep up with modern cloud velocity.&lt;br&gt;
Automation should detect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Idle resources&lt;/li&gt;
&lt;li&gt;Overprovisioned instances&lt;/li&gt;
&lt;li&gt;Inefficient Kubernetes workloads&lt;/li&gt;
&lt;li&gt;Underutilized storage&lt;/li&gt;
&lt;li&gt;Redundant services&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cloud cost optimization works best when waste is surfaced immediately not discovered weeks later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Continuous Rightsizing&lt;/strong&gt;&lt;br&gt;
Rightsizing is not a migration task.&lt;br&gt;
It’s an ongoing process.&lt;br&gt;
Best practices:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Track utilization trends over time&lt;/li&gt;
&lt;li&gt;Adjust instance types dynamically&lt;/li&gt;
&lt;li&gt;Evaluate ARM/Graviton alternatives&lt;/li&gt;
&lt;li&gt;Reassess commitments (Savings Plans, RIs) regularly&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Optimization should evolve with workloads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: FinOps + DevOps Alignment&lt;/strong&gt;&lt;br&gt;
The biggest shift in 2026?&lt;br&gt;
Collaboration.&lt;/p&gt;

&lt;p&gt;FinOps provides:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cost transparency&lt;/li&gt;
&lt;li&gt;Budget forecasting&lt;/li&gt;
&lt;li&gt;Financial discipline&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;DevOps provides:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Infrastructure control&lt;/li&gt;
&lt;li&gt;Automation&lt;/li&gt;
&lt;li&gt;Performance optimization&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When both teams align around shared KPIs, efficiency improves dramatically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Shift from Reactive to Proactive&lt;/strong&gt;&lt;br&gt;
Traditional model:&lt;br&gt;
Bill increases → investigation → cleanup.&lt;br&gt;
Modern model:&lt;br&gt;
Continuous monitoring → immediate detection → fast remediation.&lt;br&gt;
This is where automated cloud cost optimization platforms make a difference.&lt;br&gt;
Instead of simply reporting spend, advanced solutions continuously scan environments, detect inefficiencies, and recommend actionable savings opportunities.&lt;br&gt;
The key shift is mindset:&lt;br&gt;
From cost tracking&lt;br&gt;
To cost engineering.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Key Metrics DevOps &amp;amp; FinOps Teams Should Track in 2026&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://squareops.com/spendzero/" rel="noopener noreferrer"&gt;Cloud cost&lt;/a&gt; optimization isn’t just about reducing numbers.&lt;br&gt;
It’s about improving efficiency ratios.&lt;/p&gt;

&lt;p&gt;Track:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cost per deployment&lt;/li&gt;
&lt;li&gt;Cost per customer&lt;/li&gt;
&lt;li&gt;Cost per environment&lt;/li&gt;
&lt;li&gt;CPU &amp;amp; memory utilization rates&lt;/li&gt;
&lt;li&gt;Kubernetes node efficiency&lt;/li&gt;
&lt;li&gt;Idle resource percentage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When efficiency improves, profitability follows.&lt;/p&gt;

&lt;h2&gt;
  
  
  **Realistic Savings Expectations
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
Organizations implementing structured optimization typically achieve:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;15–25% reduction within first 60 days&lt;/li&gt;
&lt;li&gt;25–40% reduction over sustained optimization cycles&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Savings don’t come from cutting innovation.&lt;br&gt;
They come from eliminating inefficiency.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Common Mistakes to Avoid&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Treating optimization as a one-time cleanup&lt;/li&gt;
&lt;li&gt;Ignoring Kubernetes costs&lt;/li&gt;
&lt;li&gt;Relying only on native cloud dashboards&lt;/li&gt;
&lt;li&gt;Not assigning ownership&lt;/li&gt;
&lt;li&gt;Delaying automation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cloud complexity increases every quarter.&lt;br&gt;
Your optimization maturity must increase with it.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;A Practical Starting Checklist&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If you're leading DevOps or FinOps in 2026, start here:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Audit top 20 cost-driving services&lt;/li&gt;
&lt;li&gt;Identify underutilized compute&lt;/li&gt;
&lt;li&gt;Review Kubernetes resource requests&lt;/li&gt;
&lt;li&gt;Enforce tagging policies&lt;/li&gt;
&lt;li&gt;Implement automated waste detection&lt;/li&gt;
&lt;li&gt;Schedule monthly cost-performance reviews&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Small, consistent improvements compound.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Final Thought&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Cloud is no longer a startup experiment.&lt;br&gt;
It’s core infrastructure.&lt;br&gt;
In 2026, the companies that win won’t just scale faster.&lt;br&gt;
They’ll scale efficiently.&lt;br&gt;
Cloud cost optimization is not about spending less.&lt;br&gt;
It’s about spending smarter.&lt;br&gt;
And in today’s margin-conscious environment, that difference matters more than ever.&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>discuss</category>
      <category>security</category>
    </item>
    <item>
      <title>Kubernetes Cost Optimization: The Hidden Cloud Leak Most Teams Ignore</title>
      <dc:creator>squareops</dc:creator>
      <pubDate>Tue, 24 Feb 2026 12:29:35 +0000</pubDate>
      <link>https://forem.com/squareops/kubernetes-cost-optimization-the-hidden-cloud-leak-most-teams-ignore-1h22</link>
      <guid>https://forem.com/squareops/kubernetes-cost-optimization-the-hidden-cloud-leak-most-teams-ignore-1h22</guid>
      <description>&lt;p&gt;Kubernetes was built for scalability.&lt;/p&gt;

&lt;p&gt;But for many engineering teams, it has quietly become one of the biggest sources of uncontrolled cloud spend.&lt;/p&gt;

&lt;p&gt;The irony?&lt;/p&gt;

&lt;p&gt;Kubernetes makes infrastructure more efficient at scale yet without proper cost governance, it can leak thousands of dollars every month.&lt;/p&gt;

&lt;p&gt;And most teams don’t even realize it.&lt;/p&gt;

&lt;p&gt;This is where &lt;a href="https://squareops.com/spendzero/kubernetes-cost-optimization" rel="noopener noreferrer"&gt;Kubernetes cost optimization&lt;/a&gt; becomes critical.&lt;/p&gt;

&lt;p&gt;Not as a finance exercise.&lt;br&gt;
But as an engineering discipline.&lt;/p&gt;

&lt;p&gt;Let’s break down where the hidden cloud leak happens and how high-performing teams fix it.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why Kubernetes Costs Spiral So Easily&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Kubernetes abstracts infrastructure.&lt;/p&gt;

&lt;p&gt;That’s its power.&lt;/p&gt;

&lt;p&gt;But abstraction also creates distance between engineers and the actual compute bill.&lt;/p&gt;

&lt;p&gt;Developers think in:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pods&lt;/li&gt;
&lt;li&gt;Deployments&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Services&lt;br&gt;
AWS or GCP charges for:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Nodes&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;CPU cores&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Memory&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Storage&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Network transfer&lt;br&gt;
That disconnect is where waste begins.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Hidden Kubernetes Cost Leaks&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. Overprovisioned Resource Requests&lt;/strong&gt;&lt;br&gt;
In Kubernetes, teams define:&lt;/p&gt;

&lt;p&gt;resources:&lt;br&gt;
requests:&lt;br&gt;
cpu: "1000m"&lt;br&gt;
memory: "2Gi"&lt;/p&gt;

&lt;p&gt;To avoid performance issues, engineers often overestimate.&lt;/p&gt;

&lt;p&gt;The result:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pods request more CPU/memory than they use&lt;/li&gt;
&lt;li&gt;Nodes must allocate capacity for those requests&lt;/li&gt;
&lt;li&gt;Cluster autoscaler spins up more nodes
Actual usage might sit at 30–40%.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But you’re paying for 100%.&lt;/p&gt;

&lt;p&gt;This is one of the largest drivers of Kubernetes waste.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Zombie Dev and Staging Clusters&lt;/strong&gt;&lt;br&gt;
Production gets attention.&lt;/p&gt;

&lt;p&gt;Dev and staging rarely do.&lt;/p&gt;

&lt;p&gt;Common patterns:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Clusters running 24/7&lt;/li&gt;
&lt;li&gt;Test environments not auto-scaled&lt;/li&gt;
&lt;li&gt;Old namespaces never cleaned up&lt;/li&gt;
&lt;li&gt;Feature branches deployed and forgotten
Multiply that by multiple squads and the cost grows silently.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. Inefficient Node Sizing&lt;/strong&gt;&lt;br&gt;
Another frequent issue:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Large instance types selected “just in case”&lt;/li&gt;
&lt;li&gt;No periodic rightsizing review&lt;/li&gt;
&lt;li&gt;No evaluation of ARM/Graviton alternatives&lt;/li&gt;
&lt;li&gt;GPU nodes running underutilized
If nodes consistently operate below 50% utilization, you’re overspending.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Kubernetes cost optimization starts with node efficiency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Poor Bin Packing&lt;/strong&gt;&lt;br&gt;
Kubernetes schedules pods based on requests, not real usage.&lt;/p&gt;

&lt;p&gt;If requests are inflated:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pods don’t pack efficiently&lt;/li&gt;
&lt;li&gt;Nodes fragment&lt;/li&gt;
&lt;li&gt;More nodes are provisioned than needed
The cluster looks healthy.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The bill says otherwise.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. No Visibility at the Pod Level&lt;/strong&gt;&lt;br&gt;
Cloud billing shows you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;EC2 costs&lt;/li&gt;
&lt;li&gt;EBS costs&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Network costs&lt;br&gt;
But it doesn’t show:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Which team caused the spike&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Which deployment consumes the most CPU&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Which namespace wastes the most memory&lt;br&gt;
Without workload-level cost visibility, optimization is guesswork.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why Most Teams Ignore Kubernetes Cost Optimization&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;There are three main reasons:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. It’s Not a Firefighting Issue&lt;/strong&gt;&lt;br&gt;
Unlike outages, cost waste doesn’t trigger alarms.&lt;/p&gt;

&lt;p&gt;No pager goes off because CPU utilization is 22%.&lt;/p&gt;

&lt;p&gt;So it gets deprioritized.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Ownership Is Blurry&lt;/strong&gt;&lt;br&gt;
Who owns optimization?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DevOps?&lt;/li&gt;
&lt;li&gt;Platform engineering?&lt;/li&gt;
&lt;li&gt;Finance?&lt;/li&gt;
&lt;li&gt;Individual squads?
Without clear ownership, waste persists.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. Optimization Is Treated as a One-Time Task&lt;/strong&gt;&lt;br&gt;
Teams often:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Set up cluster autoscaling&lt;/li&gt;
&lt;li&gt;Choose instance types&lt;/li&gt;
&lt;li&gt;Configure monitoring
Then never revisit those decisions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But workloads evolve.&lt;/p&gt;

&lt;p&gt;Traffic changes.&lt;/p&gt;

&lt;p&gt;Architecture shifts.&lt;/p&gt;

&lt;p&gt;Cost optimization must be continuous.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Real Impact of Ignoring Kubernetes Costs&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Let’s put numbers to it.&lt;/p&gt;

&lt;p&gt;If your Kubernetes infrastructure costs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;$25,000/month → 30% waste = $7,500/month&lt;/li&gt;
&lt;li&gt;$100,000/month → 30% waste = $30,000/month&lt;/li&gt;
&lt;li&gt;&lt;p&gt;$250,000/month → 30% waste = $75,000/month&lt;br&gt;
Annually, that’s budget that could fund:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Hiring&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Product development&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Marketing&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Infrastructure upgrades&lt;br&gt;
Instead, it disappears into inefficiency.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How High-Performing Teams Approach Kubernetes Cost Optimization&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Elite engineering teams treat cost as a performance metric.&lt;/p&gt;

&lt;p&gt;Here’s how they do it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Continuous Resource Request Tuning&lt;/strong&gt;&lt;br&gt;
They:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Monitor actual CPU and memory usage&lt;/li&gt;
&lt;li&gt;Compare usage vs requests&lt;/li&gt;
&lt;li&gt;Reduce inflated allocations&lt;/li&gt;
&lt;li&gt;Automate recommendations
Rightsizing pods improves bin packing automatically.&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Cluster and Environment Governance&lt;/strong&gt;
They:&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;Auto-scale non-production clusters&lt;/li&gt;
&lt;li&gt;Shut down dev environments off-hours&lt;/li&gt;
&lt;li&gt;Clean up unused namespaces&lt;/li&gt;
&lt;li&gt;Enforce lifecycle policies
No zombie infrastructure allowed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. Node Efficiency Monitoring&lt;/strong&gt;&lt;br&gt;
They track:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Node utilization trends&lt;/li&gt;
&lt;li&gt;Underutilized instance types&lt;/li&gt;
&lt;li&gt;Over-fragmentation issues&lt;/li&gt;
&lt;li&gt;Spot instance opportunities
If nodes sit below 60% average utilization long-term, they act.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;4. Cost Visibility at Workload Level&lt;/strong&gt;&lt;br&gt;
Instead of only looking at cloud provider dashboards, they implement tooling that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Maps cost to namespace&lt;/li&gt;
&lt;li&gt;Maps cost to deployment&lt;/li&gt;
&lt;li&gt;Identifies inefficient workloads&lt;/li&gt;
&lt;li&gt;Highlights oversized containers
This bridges the gap between Kubernetes abstraction and cloud billing reality.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;5. Automation Over Manual Reviews&lt;/strong&gt;&lt;br&gt;
Manual monthly audits don’t scale.&lt;/p&gt;

&lt;p&gt;Modern teams use automated Kubernetes cost optimization platforms that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Continuously scan cluster efficiency&lt;/li&gt;
&lt;li&gt;Detect overprovisioned workloads&lt;/li&gt;
&lt;li&gt;Recommend rightsizing&lt;/li&gt;
&lt;li&gt;Identify idle resources&lt;/li&gt;
&lt;li&gt;Provide savings estimates
When optimization becomes automated, waste becomes visible immediately.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That’s when real improvement begins.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;A Practical Kubernetes Cost Optimization Checklist&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If you want to start today:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Review top 10 workloads by CPU request vs usage&lt;/li&gt;
&lt;li&gt;Identify underutilized nodes&lt;/li&gt;
&lt;li&gt;Audit dev and staging uptime&lt;/li&gt;
&lt;li&gt;Enforce strict resource request policies&lt;/li&gt;
&lt;li&gt;Enable cluster autoscaler correctly&lt;/li&gt;
&lt;li&gt;Evaluate Graviton or ARM-based instances&lt;/li&gt;
&lt;li&gt;Implement continuous cost monitoring
Even basic improvements can reduce 15–30% of Kubernetes-related spend.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Mindset Shift&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Kubernetes gives you scalability.&lt;/p&gt;

&lt;p&gt;But scalability without cost discipline becomes expensive flexibility.&lt;/p&gt;

&lt;p&gt;Kubernetes cost optimization is not about cutting resources blindly.&lt;/p&gt;

&lt;p&gt;It’s about:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Aligning allocation with real usage&lt;/li&gt;
&lt;li&gt;Designing clusters efficiently&lt;/li&gt;
&lt;li&gt;Making cost visible to engineering teams
The teams that win long-term are not just reliable.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;They’re efficient.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Final Thought&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If your cloud bill keeps growing while cluster utilization stays flat, you likely have a hidden Kubernetes cost leak.&lt;/p&gt;

&lt;p&gt;The question isn’t whether waste exists.&lt;/p&gt;

&lt;p&gt;The question is:&lt;/p&gt;

&lt;p&gt;Are you measuring it?&lt;/p&gt;

&lt;p&gt;Because what you don’t measure in Kubernetes you overpay for.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>awscost</category>
      <category>kubernetes</category>
      <category>awsbill</category>
    </item>
    <item>
      <title>How Engineering Teams Waste 30% of Their AWS Budget — And How to Fix It</title>
      <dc:creator>squareops</dc:creator>
      <pubDate>Mon, 23 Feb 2026 12:57:00 +0000</pubDate>
      <link>https://forem.com/squareops/how-engineering-teams-waste-30-of-their-aws-budget-and-how-to-fix-it-288f</link>
      <guid>https://forem.com/squareops/how-engineering-teams-waste-30-of-their-aws-budget-and-how-to-fix-it-288f</guid>
      <description>&lt;p&gt;The cloud was supposed to make infrastructure efficient.&lt;br&gt;
Instead, for many engineering teams, AWS has quietly become one of the largest and least controlled line items in the company’s budget.&lt;br&gt;
And here’s the uncomfortable truth:&lt;br&gt;
Most engineering teams waste 20–40% of their &lt;a href="https://squareops.com/spendzero/aws-cost-optimization" rel="noopener noreferrer"&gt;AWS spend&lt;/a&gt; without realizing it.&lt;br&gt;
Not because they’re careless.&lt;br&gt;
 Not because they lack expertise.&lt;br&gt;
 But because cloud waste is silent, incremental, and operationally invisible.&lt;br&gt;
Let’s break down where that 30% disappears and how high-performing teams fix it.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Where the 30% Waste Actually Happens&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. Idle and Forgotten Resources&lt;/strong&gt;&lt;br&gt;
Every AWS environment accumulates “cloud leftovers.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Unattached EBS volumes&lt;/li&gt;
&lt;li&gt;Orphaned Elastic IPs&lt;/li&gt;
&lt;li&gt;Old snapshots&lt;/li&gt;
&lt;li&gt;Load balancers from past deployments&lt;/li&gt;
&lt;li&gt;Test instances that were never turned off&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Individually, these costs seem small.&lt;/p&gt;

&lt;p&gt;Collectively, across multiple accounts and teams, they become thousands of dollars per month.&lt;br&gt;
The real problem?&lt;br&gt;
No one owns the cleanup.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;2. Overprovisioned EC2 and RDS Instances&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Engineering teams often provision for peak load “just to be safe.”&lt;br&gt;
Six months later:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CPU usage averages 15–20%&lt;/li&gt;
&lt;li&gt;Memory sits underutilized&lt;/li&gt;
&lt;li&gt;Larger instance types are still running&lt;/li&gt;
&lt;li&gt;No one revisits sizing decisions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Multiply this across production, staging, QA, and dev environments and you’re looking at massive over-allocation.&lt;br&gt;
Rightsizing rarely happens unless there’s a budget crisis.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;3. Kubernetes Clusters Running at Half Efficiency&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Kubernetes (EKS) is powerful but it’s also expensive when mismanaged.&lt;br&gt;
Common patterns include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dev clusters running 24/7&lt;/li&gt;
&lt;li&gt;Nodes over-provisioned for safety&lt;/li&gt;
&lt;li&gt;Poor auto-scaling configurations&lt;/li&gt;
&lt;li&gt;Workloads not bin-packed efficiently&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Container orchestration doesn’t automatically mean cost optimization.&lt;br&gt;
Without continuous review, EKS costs quietly expand month after month.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;4. No Cost Visibility or Ownership&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This is the biggest structural issue.&lt;br&gt;
In many companies:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Engineering deploys resources&lt;/li&gt;
&lt;li&gt;Finance pays the bill&lt;/li&gt;
&lt;li&gt;No team owns optimization&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without enforced tagging and accountability:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Teams don’t see their real consumption&lt;/li&gt;
&lt;li&gt;Projects don’t track cost efficiency&lt;/li&gt;
&lt;li&gt;Leadership lacks actionable insights&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cloud becomes an abstract expense until it becomes a painful one.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why Teams Don’t Catch This Early&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Here’s the hard truth:&lt;br&gt;
Most teams rely on reporting tools not optimization tools.&lt;br&gt;
AWS Cost Explorer tells you what you spent.&lt;br&gt;
It does not:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Continuously detect idle resources&lt;/li&gt;
&lt;li&gt;Recommend rightsizing actions&lt;/li&gt;
&lt;li&gt;Alert you to newly created waste&lt;/li&gt;
&lt;li&gt;Automate remediation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By the time someone manually reviews costs, the waste has already accumulated.&lt;br&gt;
Cloud environments change daily.&lt;br&gt;
Manual reviews can’t keep up.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Financial Impact of 30% Waste&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Let’s make it real.&lt;br&gt;
If your monthly AWS bill is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;$20,000 → ~$6,000 wasted per month&lt;/li&gt;
&lt;li&gt;$100,000 → ~$30,000 wasted per month&lt;/li&gt;
&lt;li&gt;$500,000 → ~$150,000 wasted per month&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Annually, that’s hundreds of thousands, sometimes millions lost to inefficiencies.&lt;br&gt;
For startups, that’s runway.&lt;br&gt;
For enterprises, that’s margin.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How High-Performing Teams Fix It&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Top engineering organizations treat cloud optimization as a continuous engineering discipline not a quarterly finance review.&lt;br&gt;
Here’s their playbook.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Continuous Idle Resource Audits&lt;/strong&gt;&lt;br&gt;
Instead of ad-hoc cleanup:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Weekly scans for unattached storage&lt;/li&gt;
&lt;li&gt;Automatic alerts for unused IPs&lt;/li&gt;
&lt;li&gt;Snapshot lifecycle policies&lt;/li&gt;
&lt;li&gt;Cleanup automation pipelines&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Waste detection becomes part of operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Ongoing Rightsizing&lt;/strong&gt;&lt;br&gt;
Rightsizing is not a one-time migration task.&lt;br&gt;
High-performing teams:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Track CPU and memory trends over time&lt;/li&gt;
&lt;li&gt;Identify consistently underutilized instances&lt;/li&gt;
&lt;li&gt;Move workloads to appropriate instance families&lt;/li&gt;
&lt;li&gt;Evaluate Graviton adoption where possible&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Optimization becomes iterative.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Strong Tagging and Cost Ownership&lt;/strong&gt;&lt;br&gt;
Without accountability, optimization stalls.&lt;br&gt;
Best practices include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enforced tagging policies (team, project, environment)&lt;/li&gt;
&lt;li&gt;Cost dashboards by team&lt;/li&gt;
&lt;li&gt;Monthly cost reviews led by engineering&lt;/li&gt;
&lt;li&gt;Clear ownership of optimization actions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When teams see their own numbers, behavior changes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Automation Over Manual Reviews&lt;/strong&gt;&lt;br&gt;
This is where most organizations evolve.&lt;br&gt;
Instead of relying solely on dashboards, they implement automated cloud cost optimization tools that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Run continuous checks across AWS services&lt;/li&gt;
&lt;li&gt;Detect new idle or oversized resources&lt;/li&gt;
&lt;li&gt;Provide actionable rightsizing recommendations&lt;/li&gt;
&lt;li&gt;Highlight immediate savings opportunities&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For example, automated platforms like &lt;a href="https://squareops.com/spendzero/" rel="noopener noreferrer"&gt;SpendZero&lt;/a&gt; perform dozens of AWS checks across services, identifying inefficiencies within minutes of integration without intrusive agents or risky permissions.&lt;br&gt;
The key shift is this:&lt;br&gt;
Move from “What did we spend?”&lt;br&gt;
To “What are we wasting right now?”&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;A Simple Framework to Reduce AWS Waste&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If you want a practical starting point, use this checklist:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Audit idle resources weekly&lt;/li&gt;
&lt;li&gt;Review instance utilization monthly&lt;/li&gt;
&lt;li&gt;Implement strict tagging policies&lt;/li&gt;
&lt;li&gt;Monitor Kubernetes node efficiency&lt;/li&gt;
&lt;li&gt;Automate detection of new waste&lt;/li&gt;
&lt;li&gt;Assign ownership to optimization&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cloud cost optimization is not a one-time project.&lt;br&gt;
It’s a system.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Real Mindset Shift&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Cloud waste isn’t an engineering failure.&lt;br&gt;
It’s an operational inevitability unless you design against it.&lt;br&gt;
As teams scale:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deployments increase&lt;/li&gt;
&lt;li&gt;Environments multiply&lt;/li&gt;
&lt;li&gt;Infrastructure becomes dynamic&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without automation and accountability, waste compounds.&lt;br&gt;
But with continuous visibility and structured optimization, most teams can realistically reduce 20–50% of unnecessary AWS spend.&lt;br&gt;
Not by cutting innovation.&lt;br&gt;
By eliminating inefficiency.&lt;/p&gt;

&lt;p&gt;** &lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thought
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
If your AWS bill keeps growing faster than your traffic, customers, or revenue that’s a signal.&lt;br&gt;
Somewhere inside your cloud environment, that 30% is hiding.&lt;br&gt;
The question isn’t whether waste exists.&lt;br&gt;
The question is whether you’re actively detecting it or passively paying for it.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>awscost</category>
      <category>awsbilling</category>
      <category>costoptimization</category>
    </item>
    <item>
      <title>A Complete Guide to Managed Cloud Security Services for AWS, Azure, and GCP</title>
      <dc:creator>squareops</dc:creator>
      <pubDate>Mon, 05 Jan 2026 13:09:04 +0000</pubDate>
      <link>https://forem.com/squareops/a-complete-guide-to-managed-cloud-security-services-for-aws-azure-and-gcp-105e</link>
      <guid>https://forem.com/squareops/a-complete-guide-to-managed-cloud-security-services-for-aws-azure-and-gcp-105e</guid>
      <description>&lt;p&gt;As organizations accelerate cloud adoption, security has become a shared responsibility—one that requires continuous monitoring, automation, and expert oversight. This is where Managed Cloud Security Services play a critical role. Instead of managing complex security controls in-house, businesses rely on managed services to protect their cloud environments across AWS, Azure, and GCP.&lt;/p&gt;

&lt;p&gt;This guide explains what managed cloud security services are, why they matter, and how they help organizations build secure, compliant, and resilient cloud infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What Are Managed Cloud Security Services?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://squareops.com/cloud-security/" rel="noopener noreferrer"&gt;Managed Cloud Security Services&lt;/a&gt; refer to the ongoing management, monitoring, and optimization of cloud security controls across public cloud platforms. These services help organizations protect workloads, data, networks, and identities while maintaining compliance and operational efficiency.&lt;/p&gt;

&lt;p&gt;Rather than focusing on one-time security setup, managed cloud security ensures continuous protection through automation, real-time visibility, and best-practice enforcement.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Core objectives include&lt;/strong&gt;:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Reducing security risks and misconfigurations&lt;/li&gt;
&lt;li&gt;Improving compliance and governance&lt;/li&gt;
&lt;li&gt;Strengthening cloud resilience&lt;/li&gt;
&lt;li&gt;Supporting DevOps and cloud-native teams&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Why Managed Cloud Security Is Essential
&lt;/h2&gt;

&lt;p&gt;Cloud platforms evolve rapidly. New services, frequent updates, and complex configurations often lead to security gaps if not managed proactively.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Common challenges organizations face:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Misconfigured storage, networks, or IAM policies&lt;/li&gt;
&lt;li&gt;Limited visibility across multi-cloud environments&lt;/li&gt;
&lt;li&gt;Alert fatigue and delayed incident response&lt;/li&gt;
&lt;li&gt;Difficulty meeting compliance requirements&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Managed cloud security services address these challenges by embedding security into day-to-day cloud operations.&lt;/p&gt;

&lt;h2&gt;
  
  
  Managed Cloud Security Services for AWS
&lt;/h2&gt;

&lt;p&gt;AWS offers a powerful set of native security tools, but managing them effectively requires expertise.&lt;/p&gt;

&lt;p&gt;Key focus areas include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identity and Access Management (IAM): Enforcing least-privilege access&lt;/li&gt;
&lt;li&gt;Network Security: Securing VPCs, security groups, and traffic flows&lt;/li&gt;
&lt;li&gt;Threat Detection: Monitoring logs and events for suspicious activity&lt;/li&gt;
&lt;li&gt;Data Protection: Encryption, key management, and secure backups&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Managed cloud security services help organizations continuously optimize AWS security posture while aligning with the AWS shared responsibility model.&lt;/p&gt;

&lt;h2&gt;
  
  
  Managed Cloud Security Services for Azure
&lt;/h2&gt;

&lt;p&gt;In Azure, security is tightly integrated with identity, networking, and application services. However, complexity increases as environments scale.&lt;/p&gt;

&lt;p&gt;Managed services typically cover:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Azure Active Directory security and identity governance&lt;/li&gt;
&lt;li&gt;Security posture management across subscriptions&lt;/li&gt;
&lt;li&gt;Workload protection for VMs, containers, and PaaS services&lt;/li&gt;
&lt;li&gt;Policy enforcement using automated compliance controls&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By actively managing Azure security configurations, organizations reduce risk without slowing down innovation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Managed Cloud Security Services for GCP
&lt;/h2&gt;

&lt;p&gt;GCP emphasizes secure-by-design architecture, but proper implementation is critical.&lt;/p&gt;

&lt;p&gt;Key managed security capabilities include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;IAM and service account management&lt;/li&gt;
&lt;li&gt;Network segmentation and firewall rules&lt;/li&gt;
&lt;li&gt;Audit logging and monitoring&lt;/li&gt;
&lt;li&gt;Secure container and Kubernetes environments&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Managed cloud security services ensure GCP workloads remain protected while supporting modern, cloud-native development.&lt;/p&gt;

&lt;h2&gt;
  
  
  Core Components of Managed Cloud Security Services
&lt;/h2&gt;

&lt;p&gt;Across AWS, Azure, and GCP, effective managed cloud security services typically include:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Continuous Monitoring &amp;amp; Visibility&lt;/strong&gt;&lt;br&gt;
24×7 monitoring helps detect risks, misconfigurations, and anomalies before they impact operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Security Posture Management&lt;/strong&gt;&lt;br&gt;
Automated checks ensure cloud resources follow security best practices and compliance standards.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Identity &amp;amp; Access Control&lt;/strong&gt;&lt;br&gt;
Strong IAM policies reduce unauthorized access and credential misuse.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Incident Detection &amp;amp; Response Support&lt;/strong&gt;&lt;br&gt;
Faster detection and guided response minimize downtime and business impact.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Compliance Enablement&lt;/strong&gt;&lt;br&gt;
Ongoing alignment with industry and regulatory requirements through automated policies and reporting.&lt;/p&gt;

&lt;h2&gt;
  
  
  Benefits of Managed Cloud Security Services
&lt;/h2&gt;

&lt;p&gt;Organizations adopting managed cloud security gain measurable advantages:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Reduced operational overhead for internal teams&lt;/li&gt;
&lt;li&gt;Improved security consistency across environments&lt;/li&gt;
&lt;li&gt;Faster detection of risks and misconfigurations&lt;/li&gt;
&lt;li&gt;Scalable security aligned with cloud growth&lt;/li&gt;
&lt;li&gt;Better collaboration between DevOps and security practices&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Most importantly, security becomes an enabler, not a bottleneck.&lt;/p&gt;

&lt;h2&gt;
  
  
  Choosing the Right Managed Cloud Security Partner
&lt;/h2&gt;

&lt;p&gt;When selecting a partner, look for expertise that goes beyond tools and dashboards.&lt;/p&gt;

&lt;p&gt;Key considerations:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Deep experience with AWS, Azure, and GCP&lt;/li&gt;
&lt;li&gt;Strong understanding of cloud architecture and DevOps workflows&lt;/li&gt;
&lt;li&gt;Automation-first approach to security&lt;/li&gt;
&lt;li&gt;Focus on reliability, performance, and scalability&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The right partner helps embed security into cloud operations rather than treating it as a separate function.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Conclusion: Secure the Cloud Without Slowing Down&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Modern cloud environments demand continuous security—not occasional audits or manual checks. Managed Cloud Security Services provide the expertise, automation, and visibility needed to protect workloads across AWS, Azure, and GCP while supporting rapid innovation.&lt;/p&gt;

&lt;p&gt;For organizations building and scaling in the cloud, security must evolve alongside infrastructure, applications, and teams.&lt;/p&gt;

&lt;p&gt;At &lt;a href="https://squareops.com/" rel="noopener noreferrer"&gt;SquareOps&lt;/a&gt;, we help organizations implement cloud-native security best practices as part of reliable, scalable cloud operations—ensuring your infrastructure remains resilient, compliant, and ready for growth.&lt;/p&gt;

&lt;h2&gt;
  
  
  Ready to Build a Secure &amp;amp; Scalable Cloud?
&lt;/h2&gt;

&lt;p&gt;Strengthen your cloud security without adding complexity.&lt;br&gt;
Partner with experts who understand cloud, DevOps, and reliability.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>kubernetes</category>
      <category>cloudsecurity</category>
      <category>aws</category>
    </item>
    <item>
      <title>Microservice Delivery with Jenkins, Helm &amp; ArgoCD on K8s</title>
      <dc:creator>squareops</dc:creator>
      <pubDate>Fri, 16 May 2025 05:44:10 +0000</pubDate>
      <link>https://forem.com/squareops/microservice-delivery-with-jenkins-helm-argocd-on-k8s-2i54</link>
      <guid>https://forem.com/squareops/microservice-delivery-with-jenkins-helm-argocd-on-k8s-2i54</guid>
      <description>&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
In the modern software development landscape, microservices and Kubernetes have become a preferred choice for building and deploying applications. The decoupled nature of microservices allows for scalability and maintainability. However, the management and delivery of these services on &lt;a href="https://squareops.com/" rel="noopener noreferrer"&gt;Kubernetes&lt;/a&gt; often present new challenges.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk50hifzfxtwmc5ny9cqk.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk50hifzfxtwmc5ny9cqk.webp" alt=" " width="478" height="478"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  Some of these challenges include
&lt;/h2&gt;

&lt;p&gt;:&lt;br&gt;
**&lt;br&gt;
Configuration Management: Handling the configuration of a large number of microservices can be complex and time-consuming, requiring a robust solution.&lt;br&gt;
Continuous Integration and Continuous Delivery (CI/CD) with Rollbacks and Version Control: Ensuring that applications are always up-to-date and having the ability to quickly revert to a stable previous version in case of issues are essential for maintaining a reliable software delivery pipeline.&lt;br&gt;
Monitoring Multiple Deployments: Keeping track of the status and health of various deployments across the Kubernetes cluster can be overwhelming without proper tools and automation.&lt;br&gt;
Through this blog post, we will showcase an efficient solution to tackle these challenges using Jenkins, Helm charts, and ArgoCD.&lt;/p&gt;

&lt;p&gt;Before we dwell deep into the Microservice Delivery Solution it’s crucial to have a robust Infrastructure in place for deploying these services. One popular tool for infrastructure provisioning and management is Terraform. By leveraging Terraform, you can define your infrastructure as code and ensure consistent and repeatable deployments.&lt;/p&gt;

&lt;p&gt;At SquareOps, we have created a comprehensive guide on building the infrastructure for microservices on AWS using Terraform. We highly recommend referring to our GitHub repository SquareOps GitHub for detailed instructions and code samples.&lt;/p&gt;

&lt;p&gt;In that guide, you will find step-by-step instructions on configuring the necessary resources such as Virtual Private Cloud (VPC), subnets, security groups, EKS cluster and Elastic Load Balancers (ELBs). Additionally, we cover topics such as autoscaling groups, EKS add-ons , Amazon RDS for database management, and integrating AWS services with your microservices architecture. Now , let’s jump back to Helm , Jenkins and ArgoCD for deployment.&lt;/p&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  Streamlining Microservices with Helm Charts
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
Helm, the package manager for Kubernetes, is at the core of our solution. Helm charts are a collection of files that describe a related set of Kubernetes resources. They provide a method to deploy applications onto the Kubernetes platform smoothly.&lt;/p&gt;

&lt;p&gt;We maintain a single Git repository for all services’ Helm charts. Our structure includes a main chart, with each microservice chart added as a dependency. This approach enhances modularity and reusability, allowing each microservice to encapsulate its Kubernetes resources.&lt;/p&gt;

&lt;p&gt;.&lt;br&gt;
├── charts&lt;br&gt;
│   ├── microservice-a&lt;br&gt;
│   │   ├── Chart.yaml&lt;br&gt;
│   │   ├── templates&lt;br&gt;
│   │   │   ├── deployment.yaml&lt;br&gt;
│   │   │   ├── service.yaml&lt;br&gt;
│   │   │   └── ...&lt;br&gt;
│   │   └── values.yaml&lt;br&gt;
│   ├── microservice-b&lt;br&gt;
│   │   ├── Chart.yaml&lt;br&gt;
│   │   ├── templates&lt;br&gt;
│   │   │   ├── deployment.yaml&lt;br&gt;
│   │   │   ├── service.yaml&lt;br&gt;
│   │   │   └── ...&lt;br&gt;
│   │   └── values.yaml&lt;br&gt;
│   └── ...&lt;br&gt;
└── main-chart&lt;br&gt;
    ├── Chart.yaml&lt;br&gt;
    ├── values.yaml&lt;br&gt;
    └── requirements.yaml&lt;br&gt;
view rawhelm-chart hosted with ❤ by GitHub&lt;br&gt;
In this structure:&lt;/p&gt;

&lt;p&gt;The charts directory contains a subdirectory for each microservice, which in turn includes its specific Helm chart.&lt;/p&gt;

&lt;p&gt;Each microservice chart consists of a Chart.yaml file (the chart description), a values.yaml file (the default configuration values), and a templates directory that contains the Kubernetes resource definitions.&lt;/p&gt;

&lt;p&gt;The main-chart directory contains the main Helm chart. It includes a Chart.yaml file, a values.yaml file, and a requirements.yaml file that lists each microservice chart, under /charts directory, as a dependency.&lt;/p&gt;

&lt;p&gt;Application Environment Setup with ArgoCD&lt;br&gt;
ArgoCD, a declarative GitOps continuous delivery tool for Kubernetes, ensures that our cluster configuration matches the state specified in the Git repository. It is a powerful tool that simplifies the process of deploying your applications configured with Helm charts.&lt;/p&gt;

&lt;p&gt;Here, we’ll illustrate the steps to quickly use the Helm Git repository to create an application on the ArgoCD user interface (UI):&lt;/p&gt;

&lt;p&gt;Log into the ArgoCD UI: First, log into the ArgoCD UI using your credentials. The UI is typically accessed via a web browser at the ArgoCD server’s host.&lt;br&gt;
Once logged in, Connect the Git repository for Helm chart under Settings.&lt;br&gt;
Navigate to the “Applications” page and click on the “New Application” button.&lt;br&gt;
Fill in the Application Details and Create the Application:&lt;br&gt;
Application Name: Choose a name for your application.&lt;br&gt;
Project: Select the ArgoCD project where your application will reside.&lt;br&gt;
Sync Policy: Choose ‘Manual’ for the start, you can change it to ‘Automatic’ later based on your requirements.&lt;br&gt;
Repository URL: Select the Git URL of your Helm charts repository.&lt;br&gt;
Revision: Specify the Git revision of your Helm charts repository (for example, a branch name like master or main).&lt;br&gt;
Helm Chart: Enter the path to your main Helm chart within the repository (for example, main-chart).&lt;br&gt;
Values Files: Add the path to your environment-specific values.yaml file in your repository. This file contains configuration overrides for your microservice Helm templates.&lt;br&gt;
ArgoCD will fetch the specified Helm chart from your Git repository, apply the configuration overrides from your values.yaml file, and deploy the application to your Kubernetes cluster. By keeping separate values.yaml files for different environments, we can manage environment-specific configurations efficiently and prevent unnecessary conflicts.&lt;/p&gt;

&lt;p&gt;Once your application is deployed, you can monitor its status and health directly from the ArgoCD UI. Click on your application to view its details. Here you will see a visualization of your application’s dependencies and related Kubernetes resources. This graph is an incredibly useful feature of ArgoCD that lets you see the state of your application at a glance.&lt;/p&gt;

&lt;p&gt;Agro CD&lt;br&gt;
Building and Deploying with Jenkins Pipeline&lt;br&gt;
Jenkins, a popular open-source automation server, is our tool of choice for Continuous Integration and Continuous Deployment (CI/CD). With its multibranch pipeline feature, we can create and manage a pipeline for each branch in our Git repository.&lt;/p&gt;

&lt;p&gt;Here’s an example of a Jenkins multibranch pipeline for a Node.js application:&lt;/p&gt;

&lt;p&gt;pipeline {&lt;br&gt;
    agent any&lt;br&gt;
    environment {&lt;br&gt;
        ECR_REPO_NAME = 'your-ecr-repo-name'&lt;br&gt;
        ECR_URL = '&lt;a href="https://your-ecr-url" rel="noopener noreferrer"&gt;https://your-ecr-url&lt;/a&gt;'&lt;br&gt;
        GIT_CREDENTIALS_ID = 'your-git-credentials-id'&lt;br&gt;
    }&lt;br&gt;
    stages {&lt;br&gt;
        stage('Unit Test') {&lt;br&gt;
            when { changeRequest target: 'develop' }&lt;br&gt;
            steps {&lt;br&gt;
                sh 'npm test'&lt;br&gt;
            }&lt;br&gt;
        }&lt;br&gt;
        stage('Docker Build and Push') {&lt;br&gt;
           when { anyOf { branch 'develop'; branch 'master' } }&lt;br&gt;
            steps {&lt;br&gt;
                script {&lt;br&gt;
                    docker.build("${ECR_REPO_NAME}:${env.BUILD_NUMBER}")&lt;br&gt;
                    docker.withRegistry(ECR_URL, "ecr:us-west-2:${env.CREDENTIALS_ID}") {&lt;br&gt;
                        docker.push("${ECR_REPO_NAME}:${env.BUILD_NUMBER}")&lt;br&gt;
                    }&lt;br&gt;
                }&lt;br&gt;
            }&lt;br&gt;
        }&lt;br&gt;
        stage('Approval') {&lt;br&gt;
           when { anyOf { branch 'develop'; branch 'master' } }&lt;br&gt;
            steps {&lt;br&gt;
                input 'Deploy to environment?'&lt;br&gt;
            }&lt;br&gt;
        }&lt;br&gt;
        stage('Deploy') {&lt;br&gt;
           when { anyOf { branch 'develop'; branch 'master' } }&lt;br&gt;
            steps {&lt;br&gt;
                script {&lt;br&gt;
                    // Determine the environment based on the branch&lt;br&gt;
                    def env = (env.BRANCH_NAME == 'develop') ? 'development' : 'production'&lt;br&gt;
                    // Clone the Helm chart repo&lt;br&gt;
                    git credentialsId: GIT_CREDENTIALS_ID, url: '&lt;a href="https://github.com/your-helm-chart-repo" rel="noopener noreferrer"&gt;https://github.com/your-helm-chart-repo&lt;/a&gt;'&lt;br&gt;
                    // Update the Docker image tag in the values.yaml file&lt;br&gt;
                    sh """&lt;br&gt;
                        sed -i 's|image: .&lt;em&gt;|image: ${ECR_URL}/${ECR_REPO_NAME}:${env.BUILD_NUMBER}|' ${env}/values.yaml&lt;br&gt;
                    """&lt;br&gt;
                    // Commit and push the changes&lt;br&gt;
                    sh """&lt;br&gt;
                        git add ${env}/values.yaml&lt;br&gt;
                        git commit -m "Update Docker image tag for ${env} environment"&lt;br&gt;
                        git push origin HEAD&lt;br&gt;
                    """&lt;br&gt;
                }&lt;br&gt;
            }&lt;br&gt;
        }&lt;br&gt;
    }&lt;br&gt;
}&lt;br&gt;
view rawpipeline-ecr hosted with ❤ by GitHub&lt;br&gt;
In this Jenkinsfile, the Unit Test stage runs only when a pull request is raised from a branch matching the feature-&lt;/em&gt; pattern to the develop branch.&lt;/p&gt;

&lt;p&gt;The Docker Build and Push and Approval stages run only for the develop and master branches. the pipeline builds Docker images and pushes them to the Amazon Elastic Container Registry (ECR)&lt;/p&gt;

&lt;p&gt;On a successful push to ECR, the pipeline triggers a manual approval step for deployment on the development and production environments, respective to the develop and master branches.&lt;/p&gt;

&lt;p&gt;jenkins-pipelines&lt;br&gt;
The Deploy stage includes steps to clone the Helm chart repo, update the Docker image tag in the respective environment’s values.yaml file, and push the changes back to the Git repository. The environment is determined based on the branch name.&lt;/p&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;**The combination of Kubernetes, Jenkins, Helm Charts, and ArgoCD provides a comprehensive solution to seamless Microservice Onboarding, to Kubernetes efficiently.&lt;/p&gt;

&lt;p&gt;At SquareOps Technologies, we specialize in implementing advanced pipeline workflows that includes DevSecOps, performance testing, Blue-green deployments, Rollbacks, DB migrations, Notifications etc.&lt;/p&gt;

&lt;p&gt;We can offer an in-depth, customized implementation to expedite your microservice onboarding process. Contact us today to discover how we can optimize your microservice delivery. &lt;/p&gt;

&lt;p&gt;Source Url: &lt;a href="https://squareops.com/blog/microservice-delivery-on-kubernetes-using-jenkins-helm-charts-and-argocd/" rel="noopener noreferrer"&gt;https://squareops.com/blog/microservice-delivery-on-kubernetes-using-jenkins-helm-charts-and-argocd/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>devops</category>
      <category>cloudcomputing</category>
      <category>aws</category>
    </item>
    <item>
      <title>SquareOps specializes in DevOps,</title>
      <dc:creator>squareops</dc:creator>
      <pubDate>Wed, 02 Apr 2025 10:00:45 +0000</pubDate>
      <link>https://forem.com/squareops/squareops-specializes-in-devops-3k7c</link>
      <guid>https://forem.com/squareops/squareops-specializes-in-devops-3k7c</guid>
      <description>&lt;p&gt;SquareOps is a modern &lt;a href="https://squareops.com/" rel="noopener noreferrer"&gt;DevOps and Cloud&lt;/a&gt; Consulting company enabling startups and enterprises to ship faster, scale seamlessly, and manage cloud infrastructure with confidence. From designing robust CI/CD pipelines to implementing Kubernetes and Site Reliability Engineering (SRE) best practices, SquareOps empowers engineering teams to move from legacy systems to cloud-native environments. With a sharp focus on automation, performance, and reliability, the team at SquareOps combines technical excellence with a deep understanding of business goals—delivering results that drive long-term success.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
