Author: Dipayan Pramanik

How to deploy ELK stack on Kubernetes

Reading Time: 3 minutes ELK stack consists of Elastic Search, Kibana, Logstash. The main purpose of this is to aggregate logs. Rise of micro-service architecture demands better way of aggregating and searching through logs for debugging purpose. ELK stack helps to aggregate these logs and explore through those logs. The main components of ELK stack are: Elastic Search: This is the database which stores all the logs Kibana: Kibana Continue Reading

cert-manager logo

How to generate TLS Certificate using Cert-Manager and ACME Server

Reading Time: 2 minutes Cert-Manager introduces Certificates and Issuers as Custom Resource in the Kubernetes Cluster. This simplifies the process of renewing, obtaining and managing those certificates. ACME stands for Automatic Certificate Management Environment. Let’s Encrypt is an ACME Server, which provides free SSL certificate. But before issuing certificates, it verifies if the domain. This verification is done with the help of orders and challenges. Cert Manager creates Custom Continue Reading

How to deploy Rabbit MQ on Kubernetes

Reading Time: 3 minutes RabbitMQ is message broker which follows AMQP protocol.One of the most important component of Rabbit MQ is broker. The brokers has the responsibility of storing the messages which the producers publish to the message queue. The Consumers consume the message from the broker and send an acknowledgement. Once the broker receives the acknowledgement, the messages are deleted. So, the main focus is to deploy a Continue Reading

How to terminate TLS certificate at traefik Load Balancer

Reading Time: 4 minutes Traefik is a reverse proxy which we can use as an ingress controller for the Kubernetes. Nowadays, security is one the most important thing. So, people prefer https over http. But the challenges with https are managing the TLS certificate, renewing them. Now cert-manager solves this challenge of managing certificates. Traefik also has the built in feature where it can issue certifcate from Let’s Encrypt. Continue Reading


How to implement Chaos Engineering using Kube Invaders

Reading Time: 3 minutes Chaos Engineering is the practice of performing random experiments to disturb the equilibrium of the deployment environment. Thus, this aims to check if an application is fault tolerant and highly available. The important reason behind Chaos engineering is to create highly available applications. Engineers use chaos engineering to cause chaos, random destructive operations in the deployment environment. This helps the engineers to reproduce many real-time Continue Reading


How to enforce TLS using Traefik Middleware

Reading Time: 3 minutes Traefik is reverse proxy and load balancer that makes deploying microservices easy. We can deploy Traefik in the existing infrastructure and we can configure it dynamically. We will just need to point to our orchestrator. There is a feature of middleware which we can use to tweak the requests. With the release of Traefik-v2 lots of features are added. Some of these features are: Middlewares Continue Reading

business code coding computer

How to secure Kong Admin API

Reading Time: 3 minutes Kong is an open source API Gateway and microservice management layer based on Nginx and the lua-nginx-module. It has two versions: the OSS version and the Enterprise mode. The OSS mode provides the admin API and the Kong Manager while the enterprise mode adds on Dev Portal, Vitals and RBAC to these OSS functionalities. The Kong gateway has several plugins and uses them to achieve several Continue Reading

close up photo of programming of codes

Quickstart to using Linux Containers(lxc and lxd)

Reading Time: 3 minutes Containerization has been the leading mode for application deployment today. So tools like Docker has been in the rise. But the Docker containers are built for the purpose of deploying an application and hence a single process. So, Docker containers are not meant to run an Operating System. But what if we want to run multiple Operating Systems on a single host OS. People will Continue Reading


How to monitor MongoDB cluster using Prometheus

Reading Time: 5 minutes MongoDB is an open-source document-oriented no SQL database. It is deployed as a cluster of multiple nodes to solve problems regarding data inconsistency and for purposes of disaster management. But this cluster needs continuous monitoring so as to keep an eye on the health of the nodes. Prometheus is a monitoring tool that helps us collect metrics that we need to monitor an application. Prometheus Continue Reading


How to deploy MongoDB cluster on Kubernetes

Reading Time: 3 minutes MongoDB is an open-source document-oriented no SQL database. It uses JSON and BSON to store the data. MongoDB replicaset is the cluster of MongoDB nodes divided into a primary node and one or more secondary nodes. Primary node acts as the master node and is responsible for write operations. The secondary nodes and the primary node can both be used for read operation. From hereon, Continue Reading

Introduction to Dockerfile and its various Instructions

Reading Time: 4 minutes What is a Dockerfile Dockerfile is a special text document that contains all the commands necessary for building an image. Docker reads the Dockerfile and builds an image based on the commands and instructions provided in the Dockerfile. A Docker image follows a layered architechture. Every line in the Dockerfile forms a new layer in the architecture of the image. Docker chaches individual layers of Continue Reading