PinnedTarrantRoinStackademicSecure your jwt token in Gin with RS256 sign methodsecure your JWT token with RS256 sign methodOct 8, 2023Oct 8, 2023
TarrantRoUsing Linkerd Authorization Policy to restrict API accessLinkerd’s authorization policy allows you to control which types of traffic are allowed to meshed pods. By using Authorization Policy, we…May 7May 7
TarrantRoinStackademicHow to Send Emails Using SMTP in GolangIn this article, we will show how to semd Email in your Golang application using a SMTP server.Apr 28Apr 28
TarrantRoinAWS TipContinuous monitor(2) Using AWS Cloudtrail for log monitoring| AWS Solution for Defense & SecurityMonitoring could be expansive, including multiple sources of information. Advance monitoring could bring values to clients…Apr 14Apr 14
TarrantRoinAWS TipContinuous monitor | AWS Solution for Defense & SecuritySecurity doesn’t end with architecting and configuring resources just once. Continuous monitoring is critical to keep your infrastructure…Apr 12Apr 12
TarrantRoUsing CloudFormation to Provision your AWS CloudWatch Dashboard or AlertsYou can use CloudWatch Alarms and CloudFormation together to make modular and reusable alarm templates to allow you to easily deploy…Jan 1Jan 1
TarrantRoinJina AIUsing Karpenter to manage GPU nodes with time-slicingFor machine learning, featuring GPUs power the computation workloads. This article will help you auto scale up/down GPU nodes.Jul 25, 20224Jul 25, 20224
TarrantRoUse your own nginx ingress controller in DAPRDAPR provide simple API mesh in your kubernetes microservices, how to expose them with ingress may be important.Jan 22, 20222Jan 22, 20222
TarrantRoKubernetes monitor using Prometheus and Thanos , (2)DeploymentThe design of persistent and global prometheus monitor system for kubernetes.Dec 11, 2021Dec 11, 2021