Devops articles

Explore a featured selection of my writing work below.

What is Infrastructure as Code? - IaC Explained - AWS

Automation is a key goal across any computing environment. Infrastructure as code (IaC) is used for infrastructure automation to create environments. The most common use of IaC is in software development to build, test, and deploy applications.

Traditionally, system administrators used a combination of scripts and manual processes to set up infrastructure environments. The process was complex and time-consuming. Today, you can use IaC to automatically set up your environment within minutes and

What is APM? - Application Performance Monitoring Explained - AWS

Effective application performance monitoring (APM) is integral to an enterprise's success. It helps ensure your digital services run smoothly, with minimal downtime, and that your customers consistently receive positive experiences.

APM is an effective tool for pinpointing where issues occur across an application. It also highlights common problems in the digital customer journey. So, you can improve the customer experience by identifying areas that deliver maximum value to your end users. APM

Kubernetes vs. Docker - Comparing Container Technologies - AWS

Kubernetes and Docker are both container technologies. Modern applications are made of microservices—independent components that run each application process as a service. Each service performs a single function and communicates with other services via a well-defined interface called API. Containerization provides the software tool to pack microservices as deployable programs on different platforms.

Docker is an open-source container runtime that has gained popularity in recent years. It provid

7 Common Kubernetes Security Pitfalls to Avoid

Kubernetes is a powerful container orchestration platform widely used in modern cloud-native environments.

However, like any system, it’s important to properly secure your Kubernetes clusters to protect against potential vulnerabilities and threats. This article will discuss seven common security pitfalls to avoid when working with Kubernetes and containers.

It’s important to properly secure the Kubernetes API server, as it serves as the central control plane for your cluster. This includes en