Pinnedvishal acharyaWAF configuration with NLB | EKS | Digital ocean|GKE| Nginx ingressNGINX Ingress configuration that includes ModSecurity as a Web Application Firewall (WAF) to help protect your application from common web…Jan 6, 2023Jan 6, 2023
vishal acharyaSecuring Docker Images: A Guide to Patching and Vulnerability ManagementWe needed a quick way to fix containers without having to rebuild everything. When security issues in container images pop up and bad guys…Nov 24, 2023Nov 24, 2023
vishal acharyaCreating an Efficient and Lightweight Kubernetes Cluster on Linux with K3D, MetalLB, and Nginx…PrerequisitesAug 26, 20232Aug 26, 20232
vishal acharyaReverse Terraform Infrastructure-as-code (IaC) from existing infrastructureTerraCognita is an open-source tool that allows you to generate infrastructure-as-code (IaC) from existing infrastructure deployed on…Apr 30, 20231Apr 30, 20231
vishal acharyaKubernetes deployment strategiesThere are several deployment strategies that you can use when deploying multiple versions of your application in Kubernetes. Here are a few…Jan 6, 2023Jan 6, 2023
vishal acharyaHorizontal Pod Autoscaling (HPA)What is Horizontal Pod Autoscaling?Jan 4, 2023Jan 4, 2023
vishal acharyaWhy is an engineer called reverse proxy?What is the proxy? Anyways? Let’s take a look. Two common types of proxy are a forward proxy and reverse proxy. A forward proxy is a server…Nov 8, 2022Nov 8, 2022
vishal acharyaWhat is Service Mesh?Kubernetes is fantastic for building microservices. But inside, behind the scene, the networking is transparent, and the services are not…Oct 6, 2022Oct 6, 2022