Posts in Blog

Continuous Team Event 2018

February 9th, 2018 Posted by Blog, Events 0 thoughts on “Continuous Team Event 2018”

Nothing else than a great Team Event to¬†reward the Team for their hard work! What happens in Cologne stays in Cologne ūüôā


Continuous Luxembourg & Belgium Celebration 2017

February 9th, 2018 Posted by Blog, Events 0 thoughts on “Continuous Luxembourg & Belgium Celebration 2017”

Following our Paris Continuous Cocktail it was time to celebrate Luxembourg & Belgium Customers!


Continuous Paris Celebration 2017

December 20th, 2017 Posted by Blog, Events 0 thoughts on “Continuous Paris Celebration 2017”

It was another great year for Continuous and it was time to celebrate it with a Continuous Cocktail for our Paris Customers!

Looking forward for the coming Cocktail in Luxembourg and Belgium!



Amazon Aurora relational database engine

September 14th, 2017 Posted by Blog, DevOps 0 thoughts on “Amazon Aurora relational database engine”

Today Pierre Tomasina has presented the Amazon Aurora relational database engine, a fully managed, MySQL-compatible, relational database engine that combines the speed and reliability of high-end commercial databases with the simplicity and cost-effectiveness of open-source databases. It delivers up to five times the performance of MySQL without requiring changes to most of your existing applications.

Visit the AWS User Group Luxembourg meet-up group for more coming talks.

Or if you rather prefer discussing about DevOps around a fresh beverage, check when is the next DevOps Café Luxembourg!

Continuous is now a Registered Education Partner of the DevOps Institute

September 4th, 2017 Posted by Blog, DevOps 0 thoughts on “Continuous is now a Registered Education Partner of the DevOps Institute”

Continuous is now a Registered Education Partner of the DevOps Institute!

The DevOps Institute (DOI) is the global learning community around emerging DevOps practices.   

Working with recognized thought leaders and the strategic examination partner PEOPLECERT, the DevOps Institute is setting the quality standard for DevOps competency-based qualifications.

Continuous provides through the DOI several certification courses: an introductory DevOps Foundation course as well as an entire series of DevOps Practitioner courses that are geared toward modern IT roles:

  • DevOps Foundation
  • Certified Agile Service Manager
  • Certified Agile Process Owner
  • DevOps Test Engineering
  • Continuous Delivery Architecture
  • DevOps¬†Leader
  • DevSecOps¬†Engineering

The DOI board consists of thought leaders within the DevOps community like Gene Kim, author of the highly recommended book the Phoenix Project, as well as the larger IT training community.

If you are starting a DevOps transformation, contact us to start on a solid ground with our quality training and certification courses in French, English or German!


Continuous is now an AWS Consulting and Reseller Partner!

August 7th, 2017 Posted by Blog, DevOps 0 thoughts on “Continuous is now an AWS Consulting and Reseller Partner!”

We are proud to announce that Continuous is now an AWS Consulting and Reseller Partner!

With more than 4 years of extensive experience on Amazon Web Services, we support and accelerate our customers and partners with their Cloud critical infrastructure.

We have worked with startups and large organizations on:

  • Highly Scalable / High Availability infrastructure
  • DevOps Automation/Tool Chains
  • Disaster Recovery Solutions
  • IoT (including Hardware)
  • API Gateways
  • Serverless Apps

As a AWS reseller, we are now able to provide you a complete solution supporting your entire value stream with one point of contact. Don’t hesitate to contact us to know what we can do for you!


WannaCry vulnerability detection with Metasploit

May 22nd, 2017 Posted by Blog, DevOps 0 thoughts on “WannaCry vulnerability detection with Metasploit”

Follow the instruction to install metasploit or create a Kali Linux Virtual Machine.

Let’s start the metasploit console.

=[ metasploit v4.14.17-dev                         ]
+ --- --=[ 1648 exploits -- 946 auxiliary -- 293 post        ]
+ --- --=[ 486 payloads -- 40 encoders -- 9 nops             ]
+ --- --=[ Free Metasploit Pro trial: ]

Then scan our network to identify hosts with db_nmap to run an Nmap against our targets and our scan results will be stored automatically in our metasploit database.

msf > db_nmap -v -A
[*] Nmap: Starting Nmap 7.40 ( ) at 2017-05-21 17:30 CEST
[*] Nmap: NSE: Loaded 143 scripts for scanning.
[*] Nmap: NSE: Script Pre-scanning.
[*] Nmap: Initiating NSE at 17:30
[*] Nmap: Completed NSE at 17:30, 0.00s elapsed
[*] Nmap: Initiating NSE at 17:30

Let’s look at the hosts found with the hosts command.

msf > hosts
address         name                os_name            os_flavor
-------         ----                -------            ---------  kali.local           Linux                      server  metasploitable.local Linux              8.04    server                       Microsoft Windows  8       client                       Windows 10                 client                       Mac OS X           10.7.X  device

Let’s use the auxiliary scanner MS17-010 SMB vulnerability

msf > use auxiliary/scanner/smb/smb_ms17_010

Let’s see the options of the scan.

msf auxiliary(smb_ms17_010) > show options
Module options (auxiliary/scanner/smb/smb_ms17_010):
Name       Current Setting  Required  Description
----       ---------------  --------  -----------
RHOSTS                      yes       The target address range or CIDR identifier
RPORT      445              yes       The SMB service port (TCP)
SMBDomain  .                no        The Windows domain to use for authentication
SMBPass                     no        The password for the specified username
SMBUser                     no        The username to authenticate as
THREADS    1                yes       The number of concurrent threads

As we can see the RHOSTS option is required, let’s set it with our windows hosts IPs

msf auxiliary(smb_ms17_010) > set RHOSTS,

Let’s run the scan

msf auxiliary(smb_ms17_010) > run
[-]    -- Host does NOT appear vulnerable.
[*] Scanned 1 of 2 hosts (50% complete)
[+]    -- Host is likely VULNERABLE to MS17-010!  (Windows 10 Enterprise Evaluation 14393)
[*] Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed

One of our windows host is vulnerable!

Minikube and Helm the Kubernetes Package Manager

April 28th, 2017 Posted by Blog, DevOps, Tips 0 thoughts on “Minikube and Helm the Kubernetes Package Manager”

Minikube is a tool that makes it easy to run Kubernetes locally. Minikube runs a single-node Kubernetes cluster inside a VM on your laptop for users looking to try out Kubernetes or develop with it day-to-day.

Helm is a Kubernetes Package Manager, it is a tool for managing Kubernetes charts. Charts are packages of pre-configured Kubernetes resources.

Let’s install minikube.

For OSX:

curl -Lo minikube && chmod +x minikube && sudo mv minikube /usr/local/bin/

For Linux:

curl -Lo minikube && chmod +x minikube && sudo mv minikube /usr/local/bin/

Let’s start minikube.

minikube start
Starting local Kubernetes cluster…
Starting VM…
SSH-ing files into VM…
Setting up certs…
Starting cluster components…
Connecting to cluster…
Setting up kubeconfig…
Kubectl is now configured to use the cluster.

To be able to work with the docker daemon on your mac/linux host use the docker-env command in your shell, you can get it running:

minikube docker-env
export DOCKER_HOST=”tcp://″
export DOCKER_CERT_PATH=”/Users/oswaldderiemaecker/.minikube/certs”
export DOCKER_API_VERSION=”1.23″
# Run this command to configure your shell:
# eval $(minikube docker-env)

Let’s run the docker-env command.

eval $(minikube docker-env)

To access the Kubernetes Dashboard, run:

minikube dashboard

We have now our minikube running, let’s install Helm the Kubernetes Package Manager.

For OSX:

brew install kubernetes-helm

For Linux:

curl >
chmod 700

Initialize the local CLI and also install Tiller into your Kubernetes cluster.

helm init
$HELM_HOME has been configured at /Users/oswaldderiemaecker/.helm.
Warning: Tiller is already installed in the cluster.
(Use --client-only to suppress this message, or --upgrade to upgrade Tiller to the current version.)
Happy Helming!

Using the search command without arguments lets us fetch all the available packages.

helm search
NAME                          VERSION DESCRIPTION
stable/aws-cluster-autoscaler 0.2.1   Scales worker nodes within autoscaling groups.
stable/chaoskube              0.5.0   Chaoskube periodically kills random pods in you…
stable/chronograf             0.2.0   Open-source web application written in Go and R…
stable/cockroachdb            0.2.2   CockroachDB is a scalable, survivable, strongly…
stable/concourse              0.1.3   Concourse is a simple and scalable CI system.
stable/consul                 0.2.0   Highly available and distributed service discov…
stable/coredns                0.1.0   CoreDNS is a DNS server that chains middleware …
stable/datadog                0.2.1   DataDog Agent

Let’s install the Jenkins package, Helm display informations about the package installed.

helm install stable/jenkins
AME:   original-llama
LAST DEPLOYED: Fri Apr 28 08:32:59 2017
NAMESPACE: default
==> v1/ConfigMap
NAME                    DATA  AGE
original-llama-jenkins  2     0s
==> v1/PersistentVolumeClaim
NAME                    STATUS  VOLUME                                    CAPACITY  ACCESSMODES  AGE
original-llama-jenkins  Bound   pvc-863abb19-2bdc-11e7-ab97-080027de986e  8Gi       RWO          0s
==> v1/Service
NAME                    CLUSTER-IP  EXTERNAL-IP  PORT(S)                         AGE
original-llama-jenkins      8080:30924/TCP,50000:30321/TCP  0s
==> extensions/v1beta1/Deployment
original-llama-jenkins  1        1        1           0          0s
==> v1/Secret
NAME                    TYPE    DATA  AGE
original-llama-jenkins  Opaque  2     0s
1. Get your ‘admin’ user password by running:
printf $(kubectl get secret --namespace default original-llama-jenkins -o jsonpath=”{.data.jenkins-admin-password}” | base64 --decode);echo
2. Get the Jenkins URL to visit by running these commands in the same shell:
NOTE: It may take a few minutes for the LoadBalancer IP to be available.
You can watch the status of by running ‘kubectl get svc --namespace default -w original-llama-jenkins’
export SERVICE_IP=$(kubectl get svc original-llama-jenkins --namespace default --template “{{ range (index .status.loadBalancer.ingress 0) }}{{.}}{{ end }}”)
echo http://$SERVICE_IP:8080/login
3. Login with the password from step 1 and the username: admin
For more information on running Jenkins on Kubernetes, visit:

Look on the minikube Dashboard the status of the Jenkins service and its pod.

When its running, note the internal endpoint, here it is 8080.

Let’s get the Jenkins service name.

kubectl get services
NAME                     CLUSTER-IP   EXTERNAL-IP   PORT(S)                          AGE
kubernetes                  443/TCP                          1d
original-llama-jenkins        8080:30924/TCP,50000:30321/TCP   2h

And use minikube to open the service.

minikube service original-llama-jenkins

We have our Jenkins, it needs now to be configured, it is out of the scope of this post.

Let’s clean up everything but getting the Helm release name.

helm ls
NAME           REVISION UPDATED                  STATUS   CHART         NAMESPACE
original-llama 1        Fri Apr 28 08:32:59 2017 DEPLOYED jenkins-0.3.1 default

and delete it.

helm delete original-llama
release “original-llama” deleted

That’s all!

A New interface with Angular2 and Material

April 24th, 2017 Posted by Blog 0 thoughts on “A New interface with Angular2 and Material”

continuousphp has now a new Interface developed with Angular2 and Material Design.

A particular attention has been paid to the User Experience with a mobile first approach.

In our new modern world, the responsive design is a necessity and user expectation.
Material Design is a set of guidelines and aims to provide clean, semantic and reusable components that make building your application very efficient.

Angular4, the new version of the popular javascript framework and that can help to develop front-end of web applications, has been chosen to revamped ContinuousPHP interface.

So let’s take a tour of ContinuousPHP new interface and features.

Material(ized) Inspiration

You can quick view of your projects and you get a list of organisations to choose from.
In addition, smart and intuitive autocomplete filter allow you to filter your results with a visual feedback.

Intelligent Organisation

You can see at glance your builds for every configured repositories and branches.
A few clicks should provide quick and relevant details based on your builds and deployments.
A new tab to access to your Pull Requests is available.

Customized Experience

We make your Continous deployment process more pleasant.
It should be way easier to imagine the possibilities, without requiring extra effort following your workflow.
You can use breezy interface paired with insightful, useful information about the various pipelines you’re considering.
A visually represented set of pipelines becomes much easier to apprehend and navigate.

Stay tuned for the upcoming changes!

Docker Bench for Security

April 24th, 2017 Posted by Blog, DevOps, Tips 0 thoughts on “Docker Bench for Security”

The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The tests are all automated, and are inspired by the CIS Docker 1.13 Benchmark.

Clone the docker Bench for Security repository:

git clone
cd docker-bench-security

Build the docker Bench for Security image:

docker build -t docker-bench-security .

Run the docker Bench for Security on your system:

docker run -it --net host --pid host --cap-add audit_control \
-v /var/lib:/var/lib \
-v /var/run/docker.sock:/var/run/docker.sock \
-v /usr/lib/systemd:/usr/lib/systemd \
-v /etc:/etc --label docker_bench_security \

Based on the docker Bench for Security Report, check the CIS Docker 1.13 Benchmark for remediation.

Continuous S.A.
Avenue des Hauts-Fourneaux 9
L-4362 Esch-sur-Alzette

© Continuous S.A. 2017