PinnedPublished inStackademicSecure your jwt token in Gin with RS256 sign methodsecure your JWT token with RS256 sign methodOct 8, 2023Oct 8, 2023
Using Linkerd Authorization Policy to restrict API accessLinkerd’s authorization policy allows you to control which types of traffic are allowed to meshed pods. By using Authorization Policy, we…May 7May 7
Published inStackademicHow to Send Emails Using SMTP in GolangIn this article, we will show how to semd Email in your Golang application using a SMTP server.Apr 28Apr 28
Published inAWS TipContinuous monitor(2) Using AWS Cloudtrail for log monitoring| AWS Solution for Defense & SecurityMonitoring could be expansive, including multiple sources of information. Advance monitoring could bring values to clients…Apr 14Apr 14
Published inAWS TipContinuous monitor | AWS Solution for Defense & SecuritySecurity doesn’t end with architecting and configuring resources just once. Continuous monitoring is critical to keep your infrastructure…Apr 12Apr 12
Using CloudFormation to Provision your AWS CloudWatch Dashboard or AlertsYou can use CloudWatch Alarms and CloudFormation together to make modular and reusable alarm templates to allow you to easily deploy…Jan 1Jan 1
Published inJina AIUsing Karpenter to manage GPU nodes with time-slicingFor machine learning, featuring GPUs power the computation workloads. This article will help you auto scale up/down GPU nodes.Jul 25, 20224Jul 25, 20224
Use your own nginx ingress controller in DAPRDAPR provide simple API mesh in your kubernetes microservices, how to expose them with ingress may be important.Jan 22, 20222Jan 22, 20222
Kubernetes monitor using Prometheus and Thanos , (2)DeploymentThe design of persistent and global prometheus monitor system for kubernetes.Dec 11, 2021Dec 11, 2021