Published inpankajtechblogsHubble Observability with Cilium — KubernetesIn continuation with the previous blog on Zero Trust Networking with Cilium on Kubernetes, let us see how we can establish observability…Apr 12Apr 12
Published inpankajtechblogsCilium Network Policy (CNP)—Zero Trust Networking — KubernetesNetworking is at the heart of Kubernetes (K8s). When it comes to the connectivity, we need to look forward at the 4 typical use cases (as…Apr 11Apr 11
Published inpankajtechblogsSpring cloud config server — Auto reload config properties — zero-touchIn a distributed system, Spring Cloud Config provides server-side and client-side support for externalized configuration.Sep 4, 2023Sep 4, 2023
Published inpankajtechblogsJWT validation — Single Usage — One-time validSigned JSON Web Token (JWT) is an industry-standard method for exchanging claims securely between two parties. And for…Aug 22, 2023Aug 22, 2023
Split-key encryption- Securing the data at restWhen working with PII data (sensitive information that can directly identify a user), one needs to ensure that PII data is not stored as…Aug 18, 2022Aug 18, 2022
Published inpankajtechblogsDisaster Recovery Strategies for Cloud ApplicationsWhen we talk about Disaster Recovery aka DR, as a first thought we always think for multi-region replication of workloads. This is true to…Jan 25, 20221Jan 25, 20221
Published inpankajtechblogsDatabase per service — Microservices Design PatternAny enterprise application will need to persist data in some or another way. For temporary purposes maybe it uses the Cache layer, and for…Aug 1, 2021Aug 1, 2021
Published inpankajtechblogsCloud Migration Strategy — On-Premises to CloudLet’s discuss — what is the cloud migration strategy to move the on-prem resources/servers/applications/systems to the cloud.Jul 25, 2021Jul 25, 2021
Published inpankajtechblogsSpring Boot Application Monitoring using Prometheus + GrafanaJul 19, 2021Jul 19, 2021