Pinnedvishal acharyaWAF configuration with NLB | EKS | Digital ocean|GKE| Nginx ingressNGINX Ingress configuration that includes ModSecurity as a Web Application Firewall (WAF) to help protect your application from common web…Jan 6, 2023Jan 6, 2023
vishal acharyaOpenObserve: Affordable Real-Time Observability and Analytics KubernetsReal-time analytics capabilities and analytics are critical to the health and ongoing performance of systems and applications in the…Aug 4Aug 4
vishal acharyaSecuring Docker Images: A Guide to Patching and Vulnerability ManagementWe needed a quick way to fix containers without having to rebuild everything. When security issues in container images pop up and bad guys…Nov 24, 2023Nov 24, 2023
vishal acharyaCreating an Efficient and Lightweight Kubernetes Cluster on Linux with K3D, MetalLB, and Nginx…PrerequisitesAug 26, 20232Aug 26, 20232
vishal acharyaReverse Terraform Infrastructure-as-code (IaC) from existing infrastructureTerraCognita is an open-source tool that allows you to generate infrastructure-as-code (IaC) from existing infrastructure deployed on…Apr 30, 20231Apr 30, 20231
vishal acharyaKubernetes deployment strategiesThere are several deployment strategies that you can use when deploying multiple versions of your application in Kubernetes. Here are a few…Jan 6, 2023Jan 6, 2023
vishal acharyaHorizontal Pod Autoscaling (HPA)What is Horizontal Pod Autoscaling?Jan 4, 2023Jan 4, 2023
vishal acharyaWhy is an engineer called reverse proxy?What is the proxy? Anyways? Let’s take a look. Two common types of proxy are a forward proxy and reverse proxy. A forward proxy is a server…Nov 8, 2022Nov 8, 2022