Introduction In the realm of cybersecurity, zero-day vulnerabilities are the shadowy boogeymen lurking within our software, hardware, and cloud infrastructure. Like ticking timebombs, they remain undetected and unpatched, posing an imminent risk even to the most sophisticated organizations. As a senior cloud architect and DevSecOps security architect, I recognize the unique challenges zero-days bring to…
Category: cloud
Amazon Web Services (AWS) has become the world’s most comprehensive and broadly adopted cloud platform, as of today (3rd Sept, 2023) AWS offering 202 fully featured services from data centers globally. This article will provide a high-level overview of AWS infrastructure, core services, account creation, and platform access to help newcomers take their first steps…
Developing a scalable cloud-based application requires carefully evaluating a myriad of factors to select the optimal database solutions. The data storage layer has profound impacts on system performance, costs, and the ability to accommodate future growth. Unfortunately, the dizzying array of relational, NoSQL, distributed, and cloud databases leaves many engineers perplexed on how to make…
While Kubernetes excels at automating workload distribution, sometimes you need precise control over where your pods land. Taints and tolerations provide this, ensuring deployments align with your resource management, operational strategies, and cluster infrastructure. Let’s explore how they work and their transformative potential. Taints: The Node’s Mark of Rejection Taints are attributes applied to nodes…
What is Reverse Proxy? A reverse proxy is a type of server that usually sits on a private network behind the firewall and routes the requests from client to backend/web server. Usually, reverse proxies are introduced to help improve security, performance, and reliability. it facilitates the flow of network traffic. Reverse proxy acts as intermediary…
What is Kubernetes Ingress ? Kubernetes ingress is an API object that governs how external users access services running in a Kubernetes cluster. It defines the traffic routing rules like load balancing, SSL termination, path-based routing, protocol. It exposes HTTP and HTTPS routes from outside the cluster to services within the cluster. Kubernetes Ingress is…
I was just curious about the cloud computing and wanted to know the difference between new technical buzz(at least for me! cloud computing) and grid computing, as I have worked on a financial product based on grid computing and trust me I was really amazed about its architecture and its design. Now its time to…
The nature of the ESB is distributed; ESB is more scalable than the hub-and-spoke architecture. With ESB the ability to deploy separate integration services, scaling up and scaling out becomes easier. An ESB is based on open standards. EAI/hub-and-spoke solutions are generally based on proprietary standards.
An Enterprise Service Bus (ESB) can have either a traditional hub-and-spoke architecture or a distributed, peer-to-peer architecture. Hub-and-Spoke systems are easy to administer but difficult to scale, since as processes are added the hub becomes a communication bottleneck. Most ESB’s are based on a peer-to-peer architecture allow hardware resources scattered across the network to be…