PinnedPublished inDevOps for youKubernetes Troubleshooting: Fixing Pod Issues with Restricted UID in securityContextTroubleshooting is the art of turning frustration into curiosity and chaos into clarity …4d ago4d ago
Published inDevOps for youKubernetes Network Policies: Practical Examples for Enhanced SecurityGuard the core, defend the future. In safety, we thrive …Jan 7Jan 7
Published inFAUN — Developer Community 🐾Terraform: Simplifying Subnet Management with cidrsubnet and for loopsTo reshape the mind is to terraform beliefs, crafting new landscapes of thought…Jan 7Jan 7
Published inDevOps for youDeep Dive into Kubernetes Pod Configurations: Demystifying hostNetwork, hostPort, hostPID, and…Can we also cross the boundaries defined in our life, by tweaking our beliefs …Jan 6Jan 6
Published inDevOps for youBehind the Curtain: What Your Application Sees Inside a Kubernetes PodAre we also limited by the beliefs we carry …Jan 5Jan 5
Published inDevOps for youSetting up an Opensearch cluster on AKS“The search is wide open…”Apr 2, 2024Apr 2, 2024
Published inDevOps for youKyverno for Kubernetes Policy management : Part -2“Policies: Sculpting Kubernetes Outlooks”Mar 31, 2024Mar 31, 2024
Published inDevOps for youKyverno for Kubernetes Policy management : Part -1Our attitude defines us and for k8s it is its policies …Jul 5, 2023Jul 5, 2023
Published inDevOps for youMy experiments with Pod Security Admission in kubernetes clusterThe importance of pod security is increasing in k8s clusters. We need controls to define them using policies.Jul 2, 2023Jul 2, 2023
Published inDevOps for youK8s: Crafting Custom Kubectl Shortcuts“Unleashing the Full Potential of kubectl: Elevating Visibility and Efficiency with Custom Command Output and Shortcuts”Jun 28, 2023Jun 28, 2023