Skip to content

Best Practices and Recommendations

Adopting best practices when using make87 ensures efficient, secure, and maintainable deployments. This section provides practical recommendations for optimal usage of the platform.

Application Design

Modular Architecture

  • Build applications as small, modular services.
  • Define clear interfaces for communication using make87 manifests.
  • Facilitate easy updates, debugging, and independent scaling.

Resource Optimization

  • Explicitly specify resource limits in your manifests (MAKE87.yml).
  • Regularly monitor resource utilization metrics and adjust accordingly.

Deployment Management

Immutable Releases

  • Always deploy applications as immutable releases.
  • Clearly version releases using semantic versioning (e.g., 1.2.3).
  • Maintain a rollback strategy to quickly revert problematic deployments.

Continuous Integration and Delivery (CI/CD)

  • Integrate make87 seamlessly with GitHub to leverage automated build and deployment pipelines.
  • Use branch-based deployments for testing and validation before production release.

Security and Compliance

Secrets and Credentials

  • Store sensitive data exclusively in make87's encrypted vault.
  • Rotate secrets regularly and update applications accordingly.

Permissions Management

  • Follow the principle of least privilege when assigning permissions.
  • Review and adjust permissions periodically to reflect organizational changes.

Observability and Monitoring

Comprehensive Logging

  • Emit structured logs to stdout/stderr for centralized collection.
  • Leverage the Vector log shipper for advanced log processing and integration.

Proactive Monitoring

  • Establish alerts for resource utilization thresholds and application health checks.
  • Regularly review performance metrics to proactively address potential issues.

Scaling and Performance

Dynamic Scalability

  • Regularly assess system performance and identify scaling needs proactively.
  • Optimize application placement (edge vs. cloud) based on latency and computational requirements.

Efficient Networking

  • Design communication flows clearly to minimize unnecessary traffic.
  • Leverage make87's secure overlay network for optimal performance and security.