mohamed nasserdevnasser.hashnode.dev·Nov 8, 2024"Understanding Kubernetes Services: ClusterIP, NodePort, and LoadBalancer Explained"three types of Kubernetes services: ClusterIP, NodePort, and LoadBalancer: 1. ClusterIP Purpose: ClusterIP is the default service type in Kubernetes. It allows you to expose a service only within the Kubernetes cluster. How It Works: This service cre...DiscussDevops
Amit Mauryaamitmaurya.hashnode.dev·Nov 3, 2024Deploying Your Website on AWS S3 with TerraformIn the previous article, we learnt about the creation of EC2 instance and Security Group with Terraform Modules. In this article, we are going to host static website on AWS S3 by following best practices of Terraform with the help of modules. Overvie...Discuss·45 readsDevOps ProjectsDevops
Amit Mauryaamitmaurya.hashnode.dev·Oct 30, 2024How to Deploy a Three-Tier Application on GKE: A Step-by-Step GuideHello everyone, today we will deploy a three-tier application on GKE using Jenkins and explore the concept of three-tier architecture. In this article, you will learn how to create a CI/CD pipeline (Jenkinsfile) and deploy it to GKE through Jenkins. ...DiscussDevOps ProjectsDevops
Anish Maradeanishmarade.hashnode.dev·Oct 21, 2024How to Start Contributing to Open Source: A Comprehensive GuideIntroduction Open source software (OSS) powers a large part of the world’s technology infrastructure, from operating systems like Linux and Android to popular development tools like Git, Kubernetes, and Docker. Contributing to open source not only pr...Discuss·10 likeskeptn
Anil Kumaranil-kumar.hashnode.dev·Oct 19, 2024Cloud Native BuildpacksI have recently heard a new thing in CNCf space called Cloud Native Buildpacks and in this blog, I will help you to understand what I know about them in simple words. What is CNB’s: Have u ever wondered how we can transform our application code to Co...Discusscloudnativebuildpack
Amit Mauryaamitmaurya.hashnode.dev·Oct 7, 2024Detailed Overview of Role-Based Access Control and Service AccountsIn Kubernetes architecture, the user's initial request is directed to the API server when a user accesses the Kubernetes cluster. While we understand how this process operates, the key question is: how is the user authenticated and granted access to ...Discuss·40 reads90DaysOfDevOpsDevops
Syed Mahmood Alisyedmahmoodali.hashnode.dev·Sep 29, 2024Taints and Tolerations simplifiedImagine Kubernetes is like a city of houses, where the houses are computers (nodes), and the people living in them are the applications (pods). Kubernetes decides which person (pod) lives in which house (node). But, sometimes, certain houses are spec...Discuss·1 likeKubernetes
Thabelo Ramabulanathab310.hashnode.dev·Sep 15, 2024Kubernetes Network Policies simplifiedEver been to a concert or event where there are different security checkpoints? Each section of the event might have guards that control who can come in and out. This is a lot like how Kubernetes Network Policies work in your cluster. 🔐 Imagine this...Discuss·67 readsKubernetes
Yash SharmaforYash Sharmayashsharmadev.hashnode.dev·Sep 13, 2024KubeCon ChinaIt all started unexpectedly. After submitting many CFPs and facing rejections, I submitted a KubeCon China CFP with the mindset that it would likely get rejected, but I decided to fill it out anyway. After submitting it, I forgot about it and continu...Discuss·12 likes·80 readsKubecon
Pravesh Sudhapraveshstwt.hashnode.dev·Sep 11, 2024Getting Started with Apache Kafka: Real-Time Data Streaming with Node.js💡 Introduction In today’s data-driven world, the ability to process and analyze information in real-time is critical for businesses to stay competitive. Whether it’s tracking user activity, monitoring system health, or processing transactions, organ...Discuss·1 like·45 readskafka