NAYAN PATELEnvoy proxy Reverse Proxy Basic ExampleWe will deploy Envoy as a proxy in front of our microservice server. All incoming requests will be directed to the Envoy server, which will…Jun 26Jun 26
NAYAN PATELWhy Reverse proxy is called ReverseWhen proxy servers were first introduced, they primarily served as client-forward proxies. As the need for managing server-side traffic…Jun 21Jun 21
NAYAN PATELHow ELK Works — Elastic search, log stash, and KibannaStep 1 — API services are deployed to Kubernetes. Step 2 — Add logs to the Kubernetes console. Step 3 — Log stash picks up the logs and…Jun 18Jun 18
NAYAN PATELWhy Sustainable Living?People are thinking — We will die after some years, why think about those things, let's enjoy. But they forget the enjoyment will be more…Jun 18Jun 18
NAYAN PATELGit reflog, after git rebaseI did a git rebase, and now I realize that the current functionalities are failing. But I know it was working on some commit, but now all…Jun 2Jun 2
NAYAN PATELUnderstanding When Browsers Trigger Preflight RequestsWhen the browser makes a CORS request —Jun 2Jun 2
NAYAN PATELWe can regularly fetch changes into our forked branches, which minimizes the potential of conflicts.In case there are changes in main.yml file in both the branches, and into the same lines, in that case, the merge conflict needs to be…Apr 27Apr 27
NAYAN PATELSome common Apache Kafka Doubts/ QuestionsApache Kafka is an open-source platform designed for building real-time data pipelines and streaming applications. It is often used to…Dec 21, 2023Dec 21, 2023
NAYAN PATELWhat is cryptographyCryptography is the science and practice of securing communication and information using codes and ciphers.Sep 10, 2023Sep 10, 2023