What is a liveness probe? Liveness probes are used by the kubelet (kubernetes agent) to identify when to restart a container. The kubelet can identify a pod crash and restart the pod in such an event. However, at times, it may happen that the pod is alive but the application is in a state where … Continue reading How to use a liveness probe for applications on Kubernetes?
A zero trust network is exactly what its name implies, a completely untrusted network. It is also called permiterless security and provides five fundamental assertions on which to build the network: All the data sources and computing services are considered resources.All communication is secured, regardless of network location.Every device, user, and network flow is authenticated and authorized.Policies … Continue reading What is a Zero Trust Network?
Golang has a built-in package called flag that enables one to parse command-line flags. The flag package allows you to define String, Bool, or Int flags. To be able to access the parameters passed as arguments to the command line execution of your program, three steps need to be completed. Define the flag.Bind the flag.Parse the flag. Syntax An example of how flag is used … Continue reading Parsing command-line flags in Go
What is a struct in Go? A struct or structure in Go is a user-defined type. It helps with composing different types into a single unit. https://gist.github.com/anjanashankar9/d427d0cfe225c01c7631afd71153bdf7 When can you compare two structures? In order to compare two structures, it is imperative that all struct field types are comparable. If the variables being compared belong to different structures, then you will see a … Continue reading Structure Equality in Golang
Role based access gives an entity the right to perform an action based on the role its assigned to. This entity can be a person or a machine. Roles are used for categorizing, authorizing, and authenticating. Role based access gives us two main advantages: There is no need for access keys.Role based access can be given … Continue reading Role-based access – AWS
Git submodules are a powerful way to use git as an external dependency management tool. It is basically a way to embed a repository into another. When you add a submodule in Git, the code of the submodule does not get added to the main repository, only certain information about the submodule does. It simply … Continue reading Git submodules
Iterating over a list is one of the most common tasks that is required for writing any program. This post will focus on the different ways of iterating over a List in java. It will cover the aspects that should be considered while iterating over the list using a particular method. For all the examples … Continue reading Iterating over a list in Java
In this post, we will discuss all things final in Java. Final Classes, Final Methods, Final Variables and finally Final Arguments. Final Classes Let us look at an example. We have a class A that is declared as final. https://gist.github.com/anjanashankar9/8adc9729a7b4d26d9bb110767b10d1fc Now let us try to create a subclass of A https://gist.github.com/anjanashankar9/5ad56b973687dab6c5bd60042ea5403a This will give a … Continue reading The Magic of Final Keyword in Java
Working with Git. Here are 5 must have settings that make you life so much easier
It's been a long time, since I last wrote a post. And this is going to be a short one. At my recent job, we have all these test environments (about 3500 of them) that have the same username and password. I kind of got tired typing the username and password every time I had … Continue reading Do you ssh too often and to many different machines?