From 12 to 3, the number of found vulnerabilities fell 75%, suggesting more secure code and aggressive automated vulnerability mitigation by early testing. From 48 hours to only 8 hours, an 83.3% improvement, time to patch vulnerabilities has changed, hence emphasising quicker incident response and lower security threat exposure. Security policy compliance also rose from 85% to 99%, a 16.5% rise that highlights the pipeline's capacity to consistently apply security criteria. These findings verified that including automation into CI/CD procedures not only simplified deployments but also significantly improved security and compliance results.
4.4. Discussion
The findings showed that automating full-stack Java corporate application deployments utilizing CI/CD pipelines with canary testing significantly improved the scalability, security, and reliability of the system. While less downtime and quicker recovery guaranteed least user disturbance, increased deployment frequency matched flexible delivery objectives.
By permitting gradual traffic changes and early detection of performance regressions or security vulnerabilities, the canary testing method showed efficacy in reducing risks related to new releases. This led to better system stability under load and more successful deployments.
By stressing the need of including security checks inside the CI/CD pipeline, security automation was essential in preserving compliance and quickly resolving weaknesses, hence reflecting the values of DevSecOps.
The research confirmed that automating canary testing creates a strong framework for enterprise-grade applications by matching technological efficiency with business continuity needs.
5. Conclusion
The study showed that automating the deployment of full-stack Java enterprise applications via CI/CD pipelines coupled with canary testing greatly enhanced scalability, security, and dependability. The method reduced downtime and sped up failure recovery while allowing more regular and successful deployments. Including security evaluations into the automated process also improved vulnerability identification and compliance, hence guaranteeing a strong and safe production environment.
All things considered, automating and canary testing worked well to maximize corporate application delivery in dynamic, demanding operational settings.
References
1. A. G. Sánchez. (2024). Azure OpenAI service for cloud native applications. O'Reilly Media, Inc.
2. A. M. Ștefan, N. R. Rusu, E. Ovreiu, & M. Ciuc. (2024). Empowering healthcare: A comprehensive guide to implementing a robust medical information system—Components, benefits, objectives, evaluation criteria, and seamless deployment strategies. Applied System Innovation, 7(3), 51.
3. A. Ostrowski, & P. Gaczkowski. (2021). Software architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++ 20. Packt Publishing Ltd.
4. A. Renuka, & P. K. G. (2024). Pandian, advanced cloud automation workflows for CI/CD pipelines: Tools and Techniques.
5. D. F. R. Ribeiro. (2024). Engineering the SHIDA super-app research, design and development of a literature-centered social network with E-commerce and E-learning.
6. E. Salvucci. (2021). MLOps—Standardizing the machine learning workflow.
7. F. B. U. Team. (2024). Cloud-native application architecture: Microservice development best practice. Springer Nature.
8. J. Nawagamuwa. (2023). Infrastructure as code frameworks evaluation for serverless applications testing in AWS. Tampere University.
9. L. Faubel. (2024). An MLOps platform comparison.
10. L. Van Gerven. (2023). Creation of a cloud-native application: building and operating applications that utilize the benefits of the cloud computing distribution approach. M.S. Thesis, Universidade NOVA de Lisboa, Portugal.
11. N. Vasavada, & D. Sametriya. (2021). Cracking containers with docker and kubernetes: The definitive guide to docker, kubernetes, and the container ecosystem across cloud and on-premises. BPB Publications.