Optimizing startup pod & readiness in K8sEnsuring the reliability, efficiency, and readiness of applications is paramount. In this article I will explore key concepts and…Feb 161Feb 161
Building a robust application (Introduction II)I began a series on building a robust application; handling the infrastructure aspect. I will continue further with more introduction in…Nov 11, 2023Nov 11, 2023
Building a robust application (Introduction I)The beauty of an application infrastructure-wise is its robustness. The word robust in this context means the application ability to…Oct 30, 2023Oct 30, 2023
Ansible V (Conditional loops & Ansible Vault)I began a series on what you need to know about Ansible, you can click here for the last series. In the concluding aspect of this series…Oct 27, 2023Oct 27, 2023
Ansible IV (Organizing playbooks)I began a series discussing what you need to know about Ansible, you can check the last series here. In this article, we will look at…Oct 26, 2023Oct 26, 2023
Ansible III (Running playbooks)I started a series discussing the major things you need to know about Ansible, you can check this for the first and this for the second. In…Oct 23, 2023Oct 23, 2023
Ansible II (Inventory files, commands & playbooks)We started a series explaining all you need to know about Ansible. We will proceed further in the series by explaining some things to know…Oct 20, 2023Oct 20, 2023
Ansible I (Installation & Configuration)Having to set up and manage multiple servers manually can be stressful, time-consuming, and frustrating. This is one of the reasons why…Oct 18, 2023Oct 18, 2023
Certificates (TLS/SSL) ISSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols that are used to secure communication over the…Jul 26, 2023Jul 26, 2023
Configuration mgt in Kubernetes 2 (Secrets)If I tell you a secret, can you keep it?Jun 10, 2023Jun 10, 2023