PinnedTarrantRoinStackademicSecure your jwt token in Gin with RS256 sign methodsecure your JWT token with RS256 sign method4 min read·Oct 8, 2023----
TarrantRoUsing Linkerd Authorization Policy to restrict API accessLinkerd’s authorization policy allows you to control which types of traffic are allowed to meshed pods. By using Authorization Policy, we…·4 min read·6 days ago----
TarrantRoinStackademicHow to Send Emails Using SMTP in GolangIn this article, we will show how to semd Email in your Golang application using a SMTP server.·2 min read·Apr 28, 2024----
TarrantRoinAWS TipContinuous monitor(2) Using AWS Cloudtrail for log monitoring| AWS Solution for Defense & SecurityMonitoring could be expansive, including multiple sources of information. Advance monitoring could bring values to clients…·5 min read·Apr 14, 2024----
TarrantRoinAWS TipContinuous monitor | AWS Solution for Defense & SecuritySecurity doesn’t end with architecting and configuring resources just once. Continuous monitoring is critical to keep your infrastructure…·5 min read·Apr 12, 2024----
TarrantRoUsing CloudFormation to Provision your AWS CloudWatch Dashboard or AlertsYou can use CloudWatch Alarms and CloudFormation together to make modular and reusable alarm templates to allow you to easily deploy…·5 min read·Jan 1, 2024----
TarrantRoinJina AIUsing Karpenter to manage GPU nodes with time-slicingFor machine learning, featuring GPUs power the computation workloads. This article will help you auto scale up/down GPU nodes.·4 min read·Jul 25, 2022--4--4
TarrantRoUse your own nginx ingress controller in DAPRDAPR provide simple API mesh in your kubernetes microservices, how to expose them with ingress may be important.·3 min read·Jan 22, 2022--2--2
TarrantRoKubernetes monitor using Prometheus and Thanos , (2)DeploymentThe design of persistent and global prometheus monitor system for kubernetes.·6 min read·Dec 11, 2021----