ajinkyak423.hashnode.devOvercoming DNS Firewall Restrictions in IBM OpenShift: CI/CD ApproachWe all want a secure Kubernetes cluster. But there’s "secure," and then there’s "locking the windows and bolting the doors" secure. Securing a Kubernetes cluster often involves placing it behind a strict DNS firewall. In our specific case, the requir...Dec 30, 2025·3 min read
ajinkyak423.hashnode.dev🛡️ Securing Your Traefik Services with a Custom Token Checker MiddlewareWhen managing multiple microservices behind Traefik, security is a top priority. One of the most critical challenges is ensuring that only valid requests (those containing valid tokens) are allowed to reach your services. In multi-tenant environments...Apr 21, 2025·5 min read
ajinkyak423.hashnode.devUnderstanding AWS ECR Credentials and ExpirationECR Credentials and Expiration: When working with private container registries, Docker uses credentials to authenticate and pull images securely. These credentials are typically stored in the ~/.docker/config.json file, which is updated when you run ...Jan 7, 2025·2 min read
ajinkyak423.hashnode.devIngress: Enhancing Load Balancing Capabilities in KubernetesIntroduction: The blog provides a demo of domain-based routing using Ingress. It guides readers through creating a ingress.yaml file that defines the Ingress resource for redirecting traffic to a specific service based on the host and path. The neces...Jul 14, 2023·4 min read
ajinkyak423.hashnode.devKubernetes Services: NodePort, LoadBalancerIntroduction : In the world of Kubernetes, where containerized applications thrive, ensuring seamless access to these applications is crucial. This is where Kubernetes services come into play. Services bridge users and applications, providing load ba...Jun 28, 2023·8 min read