Published inDev GeniusAzure API management in 24 hours — Hour 3If you have not read my previous posts on Azure API management, click on the links below: Azure API management in 24 hours — Hour 1 | by…Jun 20Jun 20
Published inDev GeniusAzure API management in 24 hours — Hour 2In hour 1 we got a quick touch about Azure API management. We created a resource, and tested an API. If you missed the post here it is…Jun 17Jun 17
Published inDev GeniusAzure API management in 24 hours — Hour 1In the first hour we’ll look into the basics of Azure API management.Jun 16Jun 16
Published inDev GeniusAzure Durable Functions — Everything you want to know — Part 4This post is a continuation of my previous post Azure Durable Functions — Everything you want to know — Part 3.Jun 9Jun 9
Published inDev GeniusAzure Durable Functions — Everything you want to know — Part 3Azure Durable Functions is an extension of Azure Functions designed to create reliable, stateful applications in a serverless environment…Jun 8Jun 8
Published inDevOps.devUnderstanding Ingress in Kubernetes — Part 7Ingress is a crucial concept in Kubernetes that helps manage external access to services within a cluster. Here’s a detailed overview of…Jun 8Jun 8
Published inDev GeniusUnderstanding Kubernetes Namespaces: Purpose, Use Cases, and Step-by-Step Creation Guide — Part 6Kubernetes namespaces are a fundamental concept that helps in organizing and managing resources in a Kubernetes cluster. This guide will…Jun 7Jun 7
Published inDev GeniusHow to create an Azure Function: Your Ultimate Guide to Serverless Computing and Deployment — Part…If you have missed my previous post on Azure Functions click here.Jun 1Jun 1
Published inDev GeniusMastering Azure Functions: Your Ultimate Guide to Serverless Computing and Deployment — Part 1The software industry is increasingly relying on cloud services, making applications globally available and scalable at any moment without…May 30May 30
Published inDev GeniusSecret and ConfigMap in Kubernetes — A beginner guide — Part 5In Kubernetes, a Secret is used to store sensitive information such as passwords, OAuth tokens, and SSH keys, ensuring this data is kept…May 29May 29