Optimizing startup pod & readiness in K8sEnsuring the reliability, efficiency, and readiness of applications is paramount. In this article I will explore key concepts and…Feb 16, 20241Feb 16, 20241
Building a robust application (Introduction II)I began a series on building a robust application; handling the infrastructure aspect. I will continue further with more introduction in…Nov 11, 2023Nov 11, 2023
Building a robust application (Introduction I)The beauty of an application infrastructure-wise is its robustness. The word robust in this context means the application ability to…Oct 30, 2023Oct 30, 2023
Ansible V (Conditional loops & Ansible Vault)I began a series on what you need to know about Ansible, you can click here for the last series. In the concluding aspect of this series…Oct 27, 2023Oct 27, 2023
Ansible IV (Organizing playbooks)I began a series discussing what you need to know about Ansible, you can check the last series here. In this article, we will look at…Oct 26, 2023Oct 26, 2023
Ansible III (Running playbooks)I started a series discussing the major things you need to know about Ansible, you can check this for the first and this for the second. In…Oct 23, 2023Oct 23, 2023
Ansible II (Inventory files, commands & playbooks)We started a series explaining all you need to know about Ansible. We will proceed further in the series by explaining some things to know…Oct 20, 2023Oct 20, 2023
Ansible I (Installation & Configuration)Having to set up and manage multiple servers manually can be stressful, time-consuming, and frustrating. This is one of the reasons why…Oct 18, 2023Oct 18, 2023
Certificates (TLS/SSL) ISSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols that are used to secure communication over the…Jul 26, 2023Jul 26, 2023
Configuration mgt in Kubernetes 2 (Secrets)If I tell you a secret, can you keep it?Jun 10, 2023Jun 10, 2023
Configuration mgt in Kubernetes 1 (ConfigMConfiguration management aims to provide a systematic approach to handling configuration data throughout the application lifecycle, from…Jun 6, 2023Jun 6, 2023
Overview of Kubernetes Networking and Service MeshNo Benz stories today (referring to the last article, lol), we just hit the ground writing…May 9, 2023May 9, 2023
Getting to know sidecar containersImagine owning a lovely 2023 Benz, which you drive every day. They are metrics that are taken into consideration as the vehicle moves…May 5, 2023May 5, 2023
Protecting your cluster with RBACOne of the reasons people will use an application is knowing it’s safe. Once an application becomes compromised, its usage will drop…Mar 29, 2023Mar 29, 2023
Setting up a K8s cluster with kubeadm and integrating with AddonsMost applications today rely on Kubernetes for efficient running, and this is the reason it’s a major point of discussion for Platform…Nov 24, 2022Nov 24, 2022
Upgrading a Kubernetes cluster(EKS inclusive)In this article I would be covering how to go about upgrading a cluster for both traditional Kubernetes cluster and Amazon EKS cluster, I…Nov 11, 2022Nov 11, 2022
Automating Java to Ec2 with Github actions(self hosted)In this article, you would have an understanding of how to automate your Java app to AWS Ec2 in other words; building a pipeline for your…Sep 24, 2022Sep 24, 2022
About Kubernetes architecture(4); HelmI have previously discussed some stuffs about Kubernetes architecture ,check out my home page aleqxan.medium.com for them. In this article…Apr 9, 2022Apr 9, 2022
About Kubernetes architecture 3; DebuggingI have done some work on describing Kubernetes architecture do check the link to get both of them aleqxan.medium.com In this article I…Apr 1, 2022Apr 1, 2022
About Kubernetes architecture (2)The first Kubernetes article https://aleqxan.medium.com/about-kubernetes-architecture-1-963a8a62a7bf on this series introduced some basic…Mar 26, 2022Mar 26, 2022