Introduction In this post, we’ll explore how to expose Availability Zone (AZ) information to your Kubernetes pods using the Kubernetes API and an init container. As an example, we’ll configure AZ awareness in an OpenSearch database. This method, however, can be applied to any application that needs to know the AZ it’s running in. By the end of this post, you’ll understand how to fetch AZ information and pass it into your pod configuration for better resource allocation and high availability.
Introduction TTL, or Time to Live, is a fundamental concept in cloud computing, defining data’s validity period. Google Cloud Storage (GCS), Google’s object storage service, offers the foundation for efficient data storage and retrieval. Terraform, an Infrastructure as Code (IaC) tool, streamlines the creation and management of cloud infrastructure, making it an invaluable asset in the GCS context. In this blog post, we’ll explore how TTL can be harnessed in GCS using Terraform to enhance data management.
Introduction In the world of cloud computing, managing data lifecycle is a crucial aspect of optimizing storage costs and ensuring data security. “TTL” stands for “Time to Live,” and it plays a vital role in defining how long data should be retained before it’s automatically deleted or archived.
Amazon S3 (Simple Storage Service) is a popular cloud storage service by Amazon Web Services that allows you to store and manage vast amounts of data.
Introduction Deploying a Redis database on multiple cloud providers may seem like a logical choice to ensure high availability and survive potential disasters. However, before diving into this approach, it’s important to carefully consider the node topologies and weigh the benefits against the complexities involved. In this blog post, we will delve into the reasons why deploying Redis on multiple clouds may not be worth the effort, focusing on node topologies that can maximize data availability.
Introduction During my daily work very often I need to set up mutual tls for given service or database. The problem appears during local development, because on local Kubernetes cluster mutual authentication is not provided. In that case, cert manager will help us to solve this problem.
Warning Self-signed certificates are very useful for local development and testing, but they shouldn’t be used in production environment. In that case, you can use Vault.
0. Create bucket with files using minio/mc. Tip This step is optional. It can be skipped if you have already created buckets which can be used for testing. auth mc config host add minio-0 https://minio-0.minio.minio.svc.cluster.local:9000 $MINIO_ROOT_USER $MINIO_ROOT_PASSWORD copy file into the bucket mc mb --with-lock minio-0/bucket1 touch test.txt echo "test" > test.txt mc cp ./test.txt minio-0/bucket1 list files in the bucket mc ls minio-0/bucket1 1. Generate certificate with proper commonName variable.