Discover the design principles behind building an authorization cache for Envoy proxy using Proxy-Wasm and WebAssembly, with integration to 3scale API Management. This article explains the architecture, design decisions, and benefits for API performance and scalability.| Lahiru De Silva
Explore a personal journey through Google Summer of Code with Red Hat. Learn about open source contributions, project experiences, and insights gained during this unique opportunity.| Lahiru De Silva
Learn how we implemented an efficient authorization cache for Envoy proxy using Proxy-Wasm, integrating with 3scale API Management to reduce latency and improve performance. This article covers the technical implementation, cache design, and benchmarking results.| Lahiru De Silva
Read a personal story about preparing for and passing the Certified Kubernetes Administrator (CKA) exam. Get tips, insights, and lessons learned to help you succeed in your own Kubernetes certification journey.| Lahiru De Silva
Learn the fundamentals of gRPC and Protocol Buffers for modern API design. This article explains serialization, efficient communication, and how to build robust APIs using gRPC and Protobuf.| Lahiru De Silva
Take a deep dive into Kubernetes custom controllers and operators. Understand how to automate cluster operations, extend Kubernetes functionality, and build robust custom resources for your workloads.| Lahiru De Silva
Learn how to architect and deploy a scalable distributed tracing system for cloud-native applications using OpenTelemetry, Data Prepper, and OpenSearch. This guide covers instrumentation, collector design, backend storage, visualization, and best practices for resilient, cost-effective observability in Kubernetes environments.| Lahiru De Silva
Explore strategies and best practices for building a secure and scalable API layer. Learn about API architecture, security measures, and techniques to ensure your APIs are robust, efficient, and ready for growth.| Lahiru De Silva
Learn how to implement a Kubernetes operator like a pro. This guide covers operator patterns, automation techniques, and best practices for managing complex Kubernetes workloads efficiently.| Lahiru De Silva
Discover how to set up and manage multi-cluster networking in Kubernetes using Cilium Cluster Mesh. This article covers architecture, configuration, and best practices for achieving seamless connectivity across clusters.| Lahiru De Silva
Blue beach island is a small island located in the Nilwella area in between Dickwella and Tangalle. The island is known for its stunning sunsets and tranquil environment, making it an ideal spot to escape the hustle and bustle of everyday life. The island is connected to the mainland by a small narrow sand dune which can be submerged by sea water during high tides or during the southwest monsoons. For this reason, it is advisable to plan your visit in advance.| Nomad’s Blog
Kubernetes offers a rich ecosystem of extension points that allow developers to tailor and extend its functionality. Among these ability to implement Custom Controllers emerge as a powerful mechanism for extending Kubernetes with your own “Kubernetes logic”. While there are frameworks and tools like Kubebuilder and OperatorSDK that abstracts away the complexity of implementing custom controllers, understanding how custom controllers operate at a fundamental level is crucial for those who ...| Nomad’s Blog
Kubernetes has emerged as the widely accepted standard for deploying and running modern cloud-native applications. With its declarative approach using YAML, it offers a straightforward and intuitive method to define the desired infrastructure state for application deployments. However, managing complex application deployments on Kubernetes requires additional automation and control beyond what Kubernetes provides out of the box. This is where Kubernetes operators come in.| Nomad’s Blog
Passing the Certified Kubernetes Administrator (CKA) exam was an exhilarating milestone in my career. In this article, I’ll take you through my journey of preparing for and cracking the CKA exam.| Nomad’s Blog
APIs (Application Programming Interfaces) have become an integral part of modern software development. They allow different applications to communicate and exchange data, enabling developers to create complex systems that integrate multiple services and technologies. APIs are used by companies of all sizes to power their digital products and services, from social media platforms to financial systems.| Nomad’s Blog
It’s amazing how a single photo can travel you back to a place you visited years ago. Today, I find myself reminiscing about my time in Siwa, Egypt which I visited back in July 2018.| Nomad’s Blog
The grandfather paradox is a famous thought experiment that explores the consequences of time travel. The paradox poses the question: “If you could go back in time and kill your grandfather before he had children, would you still exist?”| Nomad’s Blog
As organizations increasingly adopt distributed architectures and scale their Kubernetes deployments, the need for robust networking and security solutions that can seamlessly operate across multiple clusters becomes paramount. In this blog, we will go through how you can use Cilium Cluster Mesh to effectively manage a fleet of Kubernetes clusters| Nomad's Blog