Author: etash2901

Threat Modelling: An Overview

Reading Time: 3 minutes A secure architecture has become the need of the hour for almost everyone. As a result, no one needs any vulnerabilities in their clusters. But is it wise to add security after a mishap has occurred? What if we can identify potential risks at the time of development itself? This is exactly where Threat Modelling fits almost perfectly while helping organisations excel in creating more Continue Reading

Understanding DevSecOps for Kubernetes

Reading Time: 4 minutes Increase in Security Demands for Cloud Native Ecosystems In today’s world, the need for securing our cloud native clusters has increased more than ever. Also this year, cloud-native security is again top trending, according to a report published by Gartner. DevSecOps is a simple answer to multiple questions. In the recently concluded KubeCon 2020, we saw that a lot of organisations are taking huge strides Continue Reading

Linking Logs to Grafana Panels using Loki

Reading Time: 4 minutes Hi folks, in this blog, we will be discussing what challenges we face when we want to view logs with respect to metrics and how we can achieve this using Grafana, Loki, and Promtail. Problem Statement When using monitoring solutions like Grafana, Prometheus, Elatic Stack etc for our infrastructure, we have metrics and logs decoupled to an extent that it is very difficult to look Continue Reading

What is the ELK Stack?

Reading Time: 3 minutes ELK Stack or more recently called Elastic Stack, is a combination of three open source projects – Elasticsearch, Logstash and Kibana – all developed by Elastic and used for storing and analyzing logs. Even though these are three separate products, they compliment each other to the extend that they have come to be recognised as one. Why Log Analysis? Before getting to know more about Continue Reading

Flink on Kubernetes

Reading Time: 3 minutes Introduction Apache Flink is a framework and distributed processing engine for stateful computations over unbounded and bounded data streams. The design of Flink is such as to run in all common cluster environments, perform computations at in-memory speed and at any scale. There are two Flink’s clusters: Flink session cluster and Flink job cluster. A job cluster is a dedicated cluster that runs a single job. The job is part of Continue Reading

Deploying Elasticsearch on Kubernetes

Reading Time: 3 minutes Hello guys, in this article, we will be looking how to deploy Elasticsearch cluster on Kubernetes on a cluster setup on Google Kubernetes Engine. We will be following these steps given below to successfully deploy Elasticsearch on Kubernetes:1. Setup Persistant Volume via Storage Classes2. Enable node discovery for Elasticsearch through Headless Service3. Deploy Elasticsearch cluster using StatefulSet Prerequisites Cluster setup on Google Kubernetes Engine with Continue Reading

protecting sensitive data in docker

Docker Build Caching: Basics

Reading Time: 3 minutes Packaging can often be slow and Docker builds are no exception. Downloading and installing system and Python packages, compiling C extensions, building assets—it all adds up. In order to speed up your builds, Docker implements caching: if your Dockerfile and related files haven’t changed, a rebuild can reuse some of the existing layers in your local image cache. With regard to Docker itself, using it on Continue Reading

Creating Custom Daemons in Linux

Reading Time: 3 minutes Hello readers, in this blog we will be looking at what are daemons and how can we create a custom daemons in our systems. Daemon is called as a type of program which quietly runs in the background rather than under the direct control of a user. It means that a daemon does not interact with the user. Systemd Management of daemons is done using systemd. It is Continue Reading

Python Scripts: An Introduction

Reading Time: 7 minutes Introduction Python is a great flexible programming language that can be used in many situations. In this tutorial, we will focus primarily on it’s ability to enhance the Unix/Linux shell environment. Typically in Unix we will create “bash” shell scripts, but we can also create shell scripts using python, and it’s really simple! We can even name our shell scripts with the .sh extension and Continue Reading

Ansible Roles: Directory Structure

Reading Time: 4 minutes Hi readers, in this blog we will be discussing about Ansible roles and the directory structure used in Ansible. Above all, we will be looking at what different directories in a role do and how they can be created. What are Ansible Roles? According to the official Ansible documentation ‘roles are ways of automatically loading certain vars_files, tasks, and handlers based on a known file Continue Reading

Handling Errors in Ansible

Reading Time: 3 minutes Hello readers, in this blog we will be looking at how to handle errors in Ansible Playbooks. There are multiple ways for doing the same and we will be looking at them and how to use it in our Playbook. By default, Ansible will check the return codes of commands and modules and it fails fast. This means that we will be forced to deal Continue Reading

Akka-Http Marshalling and Unmarshalling in JAVA

Reading Time: 3 minutes Hello folks! In today’s HTTP request/response world, we may get different types of data from a client side application which we need to process and send an appropriate response. This may get a bit of a mess. To solve this, we can use the marshalling and unmarshalling feature of Akka-Http for easier conversion of theses data. In this blog, we will be looking how to Continue Reading