Author: Mayuri Dhote

How To Create Pod Using Kubernetes Python Client?

Reading Time: 3 minutes What Is POD ? Pod is a atomic unit of scheduling in kubernetes. Pods are the smallest deployable units of computing that you can create and manage in kubernetes. Pods are encapsulate the containers within it and it represents your application. A Pod always runs on a Node. A node is a worker machine in kubernetes and may be either a virtual or physical machine, Continue Reading

black laptop computer turned on showing computer codes

How To Create Ingress Using Kubernetes Python Client?

Reading Time: 3 minutes Hello Folks… I hope you all are doing well. In this blog we will see how to create Ingress using kubernetes python client? As we all know that generally we use kubectl commands for creating, listing, updating, deleting the kubernetes resources. But In this blog we will see how we can use python for doing these things with resources. So stay tuned with me. What Is Continue Reading

close up photo of programming of codes

How To Create Config-Map Using K8s Python Client?

Reading Time: 3 minutes Hello Folks… I hope you all are doing well. In this blog we will see how to create config map using k8s python client? As we all know that generally we use kubectl commands for creating, listing, updating, deleting the kubernetes resources. But In this blog we will see how we can use python for doing these things with resources. So stay tuned with me. What Continue Reading

How To Do Vulnerability Scanning In K8s With Kube-Hunter :

Reading Time: 5 minutes Hello Folks.. I hope you all are doing so well. In this blog, we will be looking at How To Do Vulnerability Scanning In K8s With Kube-Hunter or a Vulnerability scanning tool, which is called as Kube-Hunter which is provided to us by AQUA Security. We can use this tool to check if there are any Vulnerabilities in your Kubernetes Cluster. There are many ways Continue Reading

How To Create Deployment via Kubernetes Python Client :

Reading Time: 3 minutes Hello Folks.. I hope you all are doing so well. In this blog we will see how we can create a deployment using Kubernetes python client. Like we all know that generally we use kubectl commands for creating, listing, updating, deleting the kubernetes resources. But In this blog we will see how we can use python for doing these things with resources. Its going to be Continue Reading

How To Create Bucket On Google Cloud Platform:

Reading Time: 4 minutes Hello Folks.. I hope you all are doing fine. So in this blog we are going to learn about how to create bucket on google cloud platform. So what’s the cloud storage is : A cloud storage allows worldwide storage and retrieval of any amount of data at anytime you can use cloud storage for a range of scenarios including serving website content storing data Continue Reading

How To Create and Access Secrets Using Gcloud CLI?

Reading Time: 3 minutes Hello Folks. I hope you all are doing so well. In this blog we will learn about How To Create and Access Secrets Using Gcloud CLI? So stay tuned. Perquisites : Download the Gcloud CLI on your system and configure it properly. What Is Secret Manager In GCP? Secret Manager allows you to store manage and access your secrets like database passwords, API keys, TLS Continue Reading

aws

How to create an ec2 instance with the help of the AWS Cloud Formation template :

Reading Time: 4 minutes Hello Folks.. I hope you all are doing fine. In this Blog, we will be learning how to create an ec2 instance with the help of the AWS Cloud Formation template. Now you must be wondering what is this AWS Cloud formation, So it is a service that is provided by AWS that helps you to model and set up the resources, it is provided Continue Reading

aws

How To Create Store and Retrieve a Secret Via Console:

Reading Time: 4 minutes Hello Folks..I hope you all are doing fine. In this blog we will learn about how to create store and retrieve a aws secret manager via console.So stay tuned. Firstly understand what is AWS Secret manager. AWS Secret Manager : It is a service provided by AWS to store secrets i.e. passwords, credentials, third party keys or any such confidential information. Secrets Manager allows you Continue Reading

monitor displaying computer application

Playing with Branching Strategies (Part-2) :

Reading Time: 3 minutes Hello Readers.. I hope you all are doing so well. So lets get started with another Remaining branching strategies. So stay tuned. 1. Release Branching : Release normally tend to be longer lasting weeks or even months. Since different teams might be working on different releases then we have a branch for each release. One Branch: One team would be working on one release another Continue Reading

unrecognizable hacker with smartphone typing on laptop at desk

How to Setup Instance in AWS Using Terraform :

Reading Time: 3 minutes Hello Readers, I hope you all are doing so well. In this blog we will see that how we can set-up Instance in AWS using terraform. Before starting you must have Terraform, AWS CLI install on your machine and they both must be configure. So stay tuned with me. SO LET’S GET START!! It is easy to set-up Instance using terraform. In order to do so Continue Reading

abstract business code coder

Playing with Branching Strategies (Part-1) :

Reading Time: 4 minutes Hello Reader’s I hope you all are doing so well. So in this blog we are going to learn about Branching Strategies So stay tuned. They are very interesting from many different aspects. To begin with they are a good indication of the theme structures of the frequency of the deployments of technical capabilities of test coverage. So; we are going to explore branching strategies Continue Reading

Let’s See CIDR In Networking:

Reading Time: 3 minutes Hello Readers… I hope you all are doing well. In this blog we are going to learn interesting topic of networking i.e CIDR. So stay tuned. Introduction: First of all CIDR stands for Classless Inter-Domain Routing (CIDR), commonly known as CIDR diagram, is used by users who operate networks and manage IP addresses. This allows you to see the number of IP addresses in each Continue Reading