PinnedPublished inDevOps for youKubernetes Troubleshooting: Fixing Pod Issues with Restricted UID in securityContextTroubleshooting is the art of turning frustration into curiosity and chaos into clarity …Jan 17Jan 17
Published inDevOps for youBash String Hacks for Everyday UseIn every slice of code, a whisper of wisdom exists — unravel one string at a time…Mar 11Mar 11
Enhancing macOS Security: A Guide to pfctl and socketfilterfwYou have power over your mind, not to outside events. Realize this and you will find strength… — Marcus AuriliusFeb 3Feb 3
Published inDevOps for youKubernetes Network Policies: Practical Examples for Enhanced SecurityGuard the core, defend the future. In safety, we thrive …Jan 71Jan 71
Published inFAUN — Developer Community 🐾Terraform: Simplifying Subnet Management with cidrsubnet and for loopsTo reshape the mind is to terraform beliefs, crafting new landscapes of thought…Jan 7Jan 7
Published inDevOps for youDeep Dive into Kubernetes Pod Configurations: Demystifying hostNetwork, hostPort, hostPID, and…Can we also cross the boundaries defined in our life, by tweaking our beliefs …Jan 6Jan 6
Published inDevOps for youBehind the Curtain: What Your Application Sees Inside a Kubernetes PodAre we also limited by the beliefs we carry …Jan 51Jan 51
Published inDevOps for youSetting up an Opensearch cluster on AKS“The search is wide open…”Apr 2, 2024Apr 2, 2024
Published inDevOps for youKyverno for Kubernetes Policy management : Part -2“Policies: Sculpting Kubernetes Outlooks”Mar 31, 2024Mar 31, 2024
Published inDevOps for youKyverno for Kubernetes Policy management : Part -1Our attitude defines us and for k8s it is its policies …Jul 5, 2023Jul 5, 2023