Kubernetes with CoreOS on AWS
This article provides reproducible steps for quick start of kubernetes cluster on AWS. The kube-aws part is roundup of CoreOs guide for kube-aws and first address »
This article provides reproducible steps for quick start of kubernetes cluster on AWS. The kube-aws part is roundup of CoreOs guide for kube-aws and first address »
In my last post i've complained about AWS native container management solution - ECS. Basically it's about lack of Service Discovery & Distributed Configuration as well »
During the past weeks i was involved into service migration project. We are migrating some mostly java-based services from legacy infrastructure to the Cloud. Amazon Web »
Modern applications of the microservices age are defined by a set of microservices. Still most of the applications need some sort of authentication and authorization mechanism. »
Modularity in Software Systems means composing a system from a set of loosely coupled and highly cohesive components. Good example of a loosely coupled, highly cohesive »
Recently i wrote about first steps with ansible. Meanwhile continue working with ansible and recently started second project that uses ansible as well and suddenly i »
I've just started programming some DevOps tasks in Go (golang) and I like it. In this article i'm going to show how easy it is start »
Ansible is a configuration and multi-node deployment tool. In contrast to other Configuration Management Software (particular Chef, Puppet...) Ansible manages nodes over SSH. This is one »
In information security, message authentication or data origin authentication is a property of data integrity and authenticity. How this can be assured vie cryptography? I've already »
As mentioned in the previous post previous post in Symmetric key cryptosystems, both the sender and receiver use the same key - secret key. The picture »
Lastly i've wrote about Cryptographic Hash Functions and i've recognized, that it's might be important to have a clear understanding of the cryptography basics at all. »
Hash functions are important and ubiquitous cryptography building block. They are relatively simple to understand and to use. Most cryptographic hash functions are designed to take »