PinnedPublished inDevOps for youKubernetes Troubleshooting: Fixing Pod Issues with Restricted UID in securityContextTroubleshooting is the art of turning frustration into curiosity and chaos into clarity …Jan 17Jan 17
Quick 9: Understanding OIDC Workflow with AWS Lambda, API Gateway, Cognito & Google Sign-InIntroduction: Why Identity Matters in Modern Apps2d ago2d ago
Docker Compose Made Powerful: Full Stack with Monitoring and Logging“Simplicity is the ultimate sophistication.” — Leonardo da Vinci3d ago3d ago
Published inFAUN — Developer Community 🐾Quick 8: From Kubernetes to Docker ComposeAs modern DevOps engineers, we often default to Kubernetes for container orchestration — and for good reason. Its power, scalability, and…5d ago5d ago
Quick 7: Understanding Projected Volumes in k8sProjected volumes allow you to combine several volume sources into a single volume mount. eg:emptyDir, hostPath, configMap, and secret6d ago6d ago
Using bash script to reload config in K8s podsEven the mind needs to reload — in silence, in solitude, in stillness; while reflecting its true identity…Jun 18Jun 18
Published inDevOps for youBest Practices to Consider Before Launching a Pod in Kubernetes (K8s)To launch is to trust the invisible — the wind, the will, and the whisper that says, ‘now’…Jun 16Jun 16
Quick 5: Reverse-Engineering Dockerfiles from Images: A Command-Line ApproachWhen troubleshooting or reverse-engineering a Docker image, understanding how it was built can be invaluable. The following command offers…Jun 14Jun 14
Quick 4: AWS Lambda Cost Awareness and Comparison with Traditional VM and EKS DeploymentsIf you’re building a frontend application that talks to AWS Lambda via API Gateway, you’re probably loving how little infrastructure you…Jun 13Jun 13