/images/avatar.webp

DevOps

Azure Devops Azure Devops Services APP Tier DB -SQL Server Oncloud dev.azure.com Suppoerts microsoft as well as self hosted agents Azure Devops Server APP Tier DB -SQL Server On Premise on customer network only Self-hosted agents Microsoft Hosted Agents Runs in VM in the cloud Linux, Windows, MAcos Free upto 1800 minutes of build Paid plans for multiple parellel runs Self Hosted Agents Runs on customer MAchine Linux, Windows, MAcos Free for use, unlimited Paid plans for multiple parallel runs

Graph QL

Systems design is the process of defining the architecture, product design, modules, interfaces, and data for a system to satisfy specified requirements. Systems design could be seen as the application of systems theory to product development. There is some overlap with the disciplines of systems analysis, systems architecture and systems engineering.

AWS Services

Lambda function static Jekyll has a rule that any directory not starting with _ will be copied as-is to the _site output. Hugo keeps all static content under static. You should therefore move it all there. With Jekyll, something that looked like ▾ <root> ▾ images logo.png should become <root> ▾ static/ ▾ images/ logo.png Additionally, you’ll want any files that should reside at the root (such as CNAME) to be moved to static.

Azure Services

Azure Event Hubs Azure Event Hubs is a managed, real-time, event streaming platform provided by Microsoft Azure. It is a highly scalable and flexible platform that can process millions of events per second. Here is a high-level overview of how Azure Event Hubs works: Data Ingestion: Applications send data to Azure Event Hubs using a sender client library. The data can be sent in any format such as JSON, XML, or binary.

Databases

This is some content The sidebar consists of multiple widgets. Widgets can be enabled individually using the widgets key with a list of widget names as value. You can add your own widgets, by placing a template under

Docker

Install Docker

Install Docker: Windows

Use the following URL and download the installation file: https://hub.docker.com/editions/community/docker-ce-desktop-windows

Install Docker: Linux

Use the following URL and download the installation file: https://hub.docker.com/editions/community/docker-ce-desktop-windows

Install Docker: Mac

Use the following URL and download the installation file: https://hub.docker.com/editions/community/docker-ce-desktop-windows

Commands

$ docker version // docker version

  • Create Cluster eksctl create cluster –name=eksdemo1 –region=us-east-1 –zones=us-east-1a,us-east-1b –without-nodegroup

  • Get List of clusters eksctl get cluster

Step-02: Create & Associate IAM OIDC Provider for our EKS Cluster

To enable and use AWS IAM roles for Kubernetes service accounts on our EKS cluster, we must create & associate OIDC identity provider. To do so using eksctl we can use the below command. Use latest eksctl version (as on today the latest version is 0.21.0)

Template

eksctl utils associate-iam-oidc-provider
–region region-code
–cluster
–approve

Replace with region & cluster name

eksctl utils associate-iam-oidc-provider –region us-east-1 –cluster eksdemo1 –approve

Step-03: Create EC2 Keypair

Create a new EC2 Keypair with name as kube-demo This keypair we will use it when creating the EKS NodeGroup. This will help us to login to the EKS Worker Nodes using Terminal. Step-04: Create Node Group with additional Add-Ons in Public Subnets These add-ons will create the respective IAM policies for us automatically within our Node Group role.

Create Public Node Group

eksctl create nodegroup –cluster=eksdemo1
–region=us-east-1
–name=eksdemo1-ng-public1
–node-type=t3.medium
–nodes=2
–nodes-min=2
–nodes-max=4
–node-volume-size=20
–ssh-access
–ssh-public-key=kube-demo
–managed
–asg-access
–external-dns-access
–full-ecr-access
–appmesh-access
–alb-ingress-access

eksctl create nodegroup –cluster=eksdemo1 –region=us-east-1 –name=eksdemo1-ng-public1 –node-type=t3.medium –nodes=2 –nodes-min=2 –nodes-max=4 –node-volume-size=20 –ssh-access –ssh-public-key=ekc-ecs-demo-2022 –managed –asg-access –external-dns-access –full-ecr-access –appmesh-access –alb-ingress-access

Step-05: Verify Cluster & Nodes

List EKS clusters

eksctl get cluster

List NodeGroups in a cluster

eksctl get nodegroup –cluster=

List Nodes in current kubernetes cluster

kubectl get nodes -o wide

Our kubectl context should be automatically changed to new cluster

kubectl config view –minify

Install KubeCtl

Reference: https://docs.aws.amazon.com/eks/latest/userguide/install-kubectl.html

Primary scalar types

  • Create Cluster eksctl create cluster –name=eksdemo1 –region=us-east-1 –zones=us-east-1a,us-east-1b –without-nodegroup

  • Get List of clusters eksctl get cluster

Step-02: Create & Associate IAM OIDC Provider for our EKS Cluster

To enable and use AWS IAM roles for Kubernetes service accounts on our EKS cluster, we must create & associate OIDC identity provider. To do so using eksctl we can use the below command. Use latest eksctl version (as on today the latest version is 0.21.0)

Template

eksctl utils associate-iam-oidc-provider
–region region-code
–cluster
–approve

Replace with region & cluster name

eksctl utils associate-iam-oidc-provider –region us-east-1 –cluster eksdemo1 –approve

Step-03: Create EC2 Keypair

Create a new EC2 Keypair with name as kube-demo This keypair we will use it when creating the EKS NodeGroup. This will help us to login to the EKS Worker Nodes using Terminal. Step-04: Create Node Group with additional Add-Ons in Public Subnets These add-ons will create the respective IAM policies for us automatically within our Node Group role.

Create Public Node Group

eksctl create nodegroup –cluster=eksdemo1
–region=us-east-1
–name=eksdemo1-ng-public1
–node-type=t3.medium
–nodes=2
–nodes-min=2
–nodes-max=4
–node-volume-size=20
–ssh-access
–ssh-public-key=kube-demo
–managed
–asg-access
–external-dns-access
–full-ecr-access
–appmesh-access
–alb-ingress-access

eksctl create nodegroup –cluster=eksdemo1 –region=us-east-1 –name=eksdemo1-ng-public1 –node-type=t3.medium –nodes=2 –nodes-min=2 –nodes-max=4 –node-volume-size=20 –ssh-access –ssh-public-key=ekc-ecs-demo-2022 –managed –asg-access –external-dns-access –full-ecr-access –appmesh-access –alb-ingress-access

Step-05: Verify Cluster & Nodes

List EKS clusters

eksctl get cluster

List NodeGroups in a cluster

eksctl get nodegroup –cluster=

List Nodes in current kubernetes cluster

kubectl get nodes -o wide

Our kubectl context should be automatically changed to new cluster

kubectl config view –minify

ECR (Elastic Container registory)

URL https://aws.amazon.com/ecr/pricing/

//Create repo aws ecr create-repository –repository-name demo-repository // Delete repo aws ecr delete-repository –repository-name demo-repository