PinnedNathan BrophyHow to Build a Scalable API for Today, Tomorrow and YesterdayIf you are an application developer, a DevSecOps practitioner, or an API consumer, then you have probably asked yourself the question “Will…Feb 10, 2023Feb 10, 2023
PinnedNathan BrophyOLM, and Operator Permissions DeclassifiedHow do I know what this Operator can do to my cluster and what is the recommended pattern for Operators to request permissions?Apr 5, 2022Apr 5, 2022
Nathan BrophyEvent Driven Architecture for Incident ResponseUsing automations and serverless architecture for managing an incident response plan.Jun 6, 2023Jun 6, 2023
Nathan BrophyOperations and Procedure as Code (OPAC)How to fully codify your Operations teamApr 10, 2023Apr 10, 2023
Nathan BrophyKubernetes and the Encyclopedia of Install TechnologiesIf you have ever worked in the Cloud and/or Kubernetes space, then I am sure you have seen a project that has an installation guide the…Mar 3, 2023Mar 3, 2023
Nathan BrophyUsing NFS to Simulate Metropolitan Disaster Recovery in an OpenShift EnvironmentIf you are a production user of Kubernetes and/or OpenShift, then you have probably had the following question: “How can I ensure my…Apr 29, 2022Apr 29, 2022