Managing Kubernetes using Rancher

According to kubernetes.io, Kubernetes, also known as K8s, is an open-source system for automating deployment, scaling and management of containerized applications

Kubernetes is the defacto container orchestration platform today. It is a powerful tool that can help you manage your applications more efficiently and reliably. Kubernetes uses a declarative approach to configuration, which means that you define the desired state of your application and Kubernetes will work to make sure that the actual state matches the desired state. This makes it easy to deploy changes to your applications and to scale your applications up or down as needed.

However, managing kubernetes can be a nightmare. It has a steep learning curve and has a lot of features, which can take some time to master. While there is the official kubernetes dashboard, in my opinion Rancher by Suse, is the preferred tool for most administrators. The real power of Rancher is in its ability to manage multiple kubernetes clusters, while providing a single pane of glass for all administrative tasks.

Read More

The Art of Debugging

One of my strengths at work is debugging/troubleshooting technical issues. I have been told that I have a knack for finding and fixing problems that others find hard to solve. Many people come to me for assistance when they encounter difficulties and I often am able to give them effective solutions or workarounds that allow them to continue their work. This is an ability that has come with a lot of practice and experience in dealing with various technical challenges. There are a few core ideas that underpin these abilities, some of which I try to enumerate below

Read More

Bearer, pop the tokens

In modern web architectures, a security token is used to grant access to a protected resource. It typically is a string of random characters that is generated by an identity/authorization server in response to a login/identification request. Bearer tokens are a type of security tokens - one that has gained a lot of popularity due to the introduction of the OAuth2.0 standard. The name “bearer token” comes from the fact that the token can be used by anyone who has it. This is in contrast to other types of tokens, such as proof of possession (PoP) tokens, which can only be used by the specific client that was issued the token. If the PoP token is stolen, it cannot be used by anyone else.

Read More

Transformers - Age of ChatGPT

A transformer model is a neural network architecture that can automatically transform one type of input into another type of output. It was first introduced in the paper “Attention Is All You Need” by Vaswani et al. (2017). Transformer models are distinguished by their use of self-attention, a mechanism that allows them to learn long-range dependencies between input and output sequences. This makes them well-suited for tasks such as machine translation, text summarization, and question answering.

Transformer models are typically composed of two parts: an encoder and a decoder. The encoder takes the input sequence and produces a sequence of hidden representations. The decoder then takes these hidden representations and produces the output sequence. The encoder and decoder are both made up of a stack of self-attention layers. Each self-attention layer takes the hidden representations from the previous layer and produces new hidden representations that are weighted by their attention to each other. This allows the model to learn long-range dependencies between the input and output sequences.

Read More

Load Balancing - A Balancing Act

Load balancing is a technique used to distribute network or application traffic across a number of servers. Load balancers can be used to distribute traffic for a variety of applications, including web servers, databases, and file servers. They can also be used to distribute traffic for different types of traffic, such as HTTP, HTTPS, and DNS. Load balancing is important because it helps to improve the performance, reliability and security of applications. By distributing traffic across multiple servers, load balancing can help to prevent any single server from becoming overloaded. This can improve performance by ensuring that requests are processed quickly and efficiently. Load balancing can also help to improve reliability by preventing a single server failure from taking down an entire application or website. Finally, load balancing can help to improve security by making it more difficult for attackers to exploit a single server.

Read More

Mesmerising Mountains - Our trip to Gangtok & Darjeeling

This is a guest post from my daughter

Our trip to Gangtok started with a lot of excitement and anxiety. Our cab driver was late to pick us up from home, so we had to rush to the airport. At the airport, we met Dipu uncle and his family, who were also going to Gangtok with us. We boarded the flight to Bagdogra just in time, after a confusion with change of gates at the last moment by the airlines company. The flight was smooth and we enjoyed the view of the mountains from the window. We landed in Bagdogra ahead of time and collected our checked-in bags. Since Bagdogra is a military airport, we were asked not to take any pictures in the airport. After landing in Bagdogra, we took a taxi to Gangtok. On the way, we stopped at Santa Banta Dhaba, where we had some delicious breakfast. The drive was very long, about five hours, but we had fun chatting along the way. Finally, we reached Gangtok and checked into our hotel – “The Muscatel Grand Silk Route”. The hotel was a nice and comfy, but the road leading to the hotel was anything but. The 200m of the road from MG Marg to the hotel was a steep downward section with a shard hairpin bend included. Anyone who learns to drive in Gangtok is surely an expert!

Read More