k8s

Playing with EKS Fargate

Playing with EKS Fargate

The purpose of this tutorial is to deploy a ‘simple’ application to EKS Fargate. I...

Practical example of how to set requests and limits on Kubernetes

Practical example of how to set requests and limits on Kubernetes

In this post, I will share my thoughts on how to properly set requests and limits ...

Scheduled backup of Vault secrets with CronJob of Kubernetes

Scheduled backup of Vault secrets with CronJob of Kubernetes

I am a DevOps engineer and I will share in this post my experience related to auto...

Scheduled backup of Vault secrets with Jenkins on Kubernetes

Scheduled backup of Vault secrets with Jenkins on Kubernetes

I am a DevOps engineer and I will share in this post my experience related to auto...

Endpoint monitoring with Prometheus and Blackbox Exporter

Endpoint monitoring with Prometheus and Blackbox Exporter

As a DevOps engineer, I am working on the migration of the CaaS (Cloudify as a Ser...

Certified Kubernetes Administrator (CKA) Exercises, Network Policy, Namespace

Certified Kubernetes Administrator (CKA) Exercises, Network Policy, Namespace

I started preparation for the CKA Kubernetes exam. In this series, I will share so...

Network policy and Calico CNI to Secure a Kubernetes cluster

Network policy and Calico CNI to Secure a Kubernetes cluster

As a DevOps engineer, I am working on the migration of the CaaS (Cloudify as a Ser...

Certified Kubernetes Administrator (CKA) Exercises, Network Policy

Certified Kubernetes Administrator (CKA) Exercises, Network Policy

I started preparation for the CKA Kubernetes exam. In this series, I will share so...

Secure traffic to your application with Kubernetes and cert-manager

Secure traffic to your application with Kubernetes and cert-manager

As a DevOps engineer, I am working on the creation of the Production Kubernetes (E...