Implementing Knative Deployment and Routing for Public ExposureKnative revolutionizes serverless computing by seamlessly integrating with Kubernetes. It provides a powerful set of tools for building…Mar 21, 2024Mar 21, 2024
Install Kong with a Database and Custom Values Using Helm by Fetching Chart Locally.Kong API Gateway is a versatile open-source solution for managing microservices architectures. Serving as a centralized entry point, it…Mar 18, 20241Mar 18, 20241
Implement rate limiting on a web API endpoint using OpenResty and Lua.We all know that we can rate the limit in Nginx based on the remote IP address of the client. However, the problem arises because most of…Mar 7, 2024Mar 7, 2024
Configure Kubernetes with strong cipher suitesIn a Kubernetes cluster, security is a critical aspect, and certificates play a crucial role in ensuring secure communication between…Dec 28, 2023Dec 28, 2023
Recover Important Files from ransomware attackMany of us get infected with ransomware on our PC as a result of installing crack software or games. In this way, our important files…Jul 21, 2020Jul 21, 2020