PinnedDerek.KimKubernetes as a Subway: Overprovisioning, Priority, and PreemptionKubernetes is a powerful tool for managing containerized applications, but even the most powerful tools need careful management to function…Aug 12Aug 12
PinnedDerek.KimHow to access GCP securely from AWS with Workload Identity FederationFeatures of IAMJan 27, 20232Jan 27, 20232
Derek.Kim6 Tips to Build a Service Ownership Catalog for Your DevOps SuccessBuilding a Service Ownership Catalog might seem like an administrative task, but it’s a crucial first step in preventing chaos within a…1d ago1d ago
Derek.KimWhy Service Ownership is the First Step in DevOpsWithout clear service ownership, DevOps efforts can lead to chaos. Here’s how building a service ownership catalog can prevent costly…Sep 8Sep 8
Derek.KimMaximizing Your AWS Managed OpenSearch Storage: Don’t Forget Reserved Space!AWS Managed OpenSearch reserves up to 20% of disk space per data node for internal operations. Plan your cluster storage accordingly to…Sep 3Sep 3
Derek.KimSimple Troubleshooting Elasticsearch Disk Space-Watermark Settings GuideExplore Elasticsearch’s watermark settings to prevent disk issues and learn practical strategies to manage read-only states and avoid data dAug 27Aug 27
Derek.KimGCP Log-based Metrics in Minutes? Yes, with Gemini AI Chat!See how Gemini AI Chat helps you create log-based metrics in less than 10 minutes, improving efficiency in GCP Cloud Run and beyond.Aug 22Aug 22
Derek.KimBoost Your Go Development with Air: Efficient Live ReloadingDiscover how Air can streamline your Go development with live reloading. Improve productivity and efficiency in your coding workflow.Aug 20Aug 20
Derek.KimGCP’s Secret Players — Understanding the Crucial Role of Service AgentsStruggling with GCP permission issues? Discover how GCP Service Agents play a crucial role and how they differ from service accounts.Aug 18Aug 18
Derek.KimTest AWS Permissions: How to Assume IAM Roles with aws-vaultLearn how to assume IAM Roles with `aws-vault` to ensure your local tests mimic production environments, avoiding common permission pitfallsAug 17Aug 17