When working with Docker, it's crucial to ensure that your Dockerfiles are secure to prevent potential vulnerabilities. Here are some common...
To solve the problem of role based approval i used input block with submitter. This means that person who listed as the submitter will only be able to...
copying from local to remote= sudo scp -i demo-pipeline.pem boot.catalog ubuntu@ec2-65-2-33-152.ap-south-1.compute.amazonaws.com:/home/ubuntu/ copying...
To add a sample application and visualize its logs using the ELK stack (Elasticsearch, Logstash, and Kibana), you'll need to follow these general...
ClusterIP and NodePort are two types of services in Kubernetes that serve different purposes and have different characteristics. ClusterIP: Purpose:...
how is service discovery done using labels and selectprs or using service ip address Service discovery in Kubernetes can be achieved using labels and...