Full-Stack DevOps & Kubernetes
Author

Full-Stack DevOps & Kubernetes

Focused on sharing DevOps, Kubernetes, Linux, Docker, Istio, microservices, Spring Cloud, Python, Go, databases, Nginx, Tomcat, cloud computing, and related technologies.

206
Articles
0
Likes
87
Views
0
Comments
Recent Articles

Latest from Full-Stack DevOps & Kubernetes

100 recent articles max
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Apr 22, 2026 · Operations

Avoid 90% of Kubernetes Ops Pitfalls: A Definitive Guide

This guide outlines the five most common Kubernetes operational pitfalls, offers step‑by‑step remediation practices, introduces three emerging trends such as AI‑assisted troubleshooting, serverless clusters, and Tekton CI/CD, and provides three ready‑to‑copy kubectl commands to streamline daily management.

DevOpsKubernetesaiops
0 likes · 9 min read
Avoid 90% of Kubernetes Ops Pitfalls: A Definitive Guide
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Mar 8, 2026 · Artificial Intelligence

Why OpenClaw’s AI Agent Is Trending—and What Security Risks It Brings

OpenClaw, an open‑source AI Agent framework that combines large‑model reasoning, automation scripts, and an execution engine, has exploded in popularity, but a CCTV warning highlights serious security concerns such as network attacks, data leakage, and remote control when deployed without strict permission controls and auditing.

AI AgentAutomationOpenClaw
0 likes · 8 min read
Why OpenClaw’s AI Agent Is Trending—and What Security Risks It Brings
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Feb 22, 2026 · Cloud Native

How to Stabilize Java Services on Kubernetes: A 3‑Year Success Story

This article walks through a real‑world Java service on Kubernetes, detailing the initial confidence, recurring OOM and rollout issues, and a multi‑round remediation that introduced container‑aware JVM settings, refined resource requests, OOM dumps, probes, and metrics, ultimately achieving three years of stable operation with lower resource usage.

JVMJavaKubernetes
0 likes · 10 min read
How to Stabilize Java Services on Kubernetes: A 3‑Year Success Story
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Feb 1, 2026 · Cloud Native

Master Kubernetes Liveness Probes: When, Why, and How to Use Them

This article provides a comprehensive guide to Kubernetes Liveness Probes, explaining their purpose, the three probe types (HTTP GET, TCP Socket, Exec), how they differ from Readiness and Startup probes, practical YAML examples, verification steps, common pitfalls, troubleshooting tips, and best‑practice recommendations for improving pod stability and self‑healing.

KubernetesLiveness ProbePod
0 likes · 10 min read
Master Kubernetes Liveness Probes: When, Why, and How to Use Them
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Dec 17, 2025 · Databases

10 Essential Steps to Optimize Your Database for High‑Performance E‑Commerce

This article shares practical, step‑by‑step guidance from a 15‑year e‑commerce veteran on why, when, and how to optimize databases—including segregation, archiving, query tuning, replication lag detection, parameter tweaks, partitioning, ProxySQL, caching, vertical scaling, and monitoring—to achieve faster, more reliable services.

MySQLPerformance TuningScaling
0 likes · 10 min read
10 Essential Steps to Optimize Your Database for High‑Performance E‑Commerce
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Dec 9, 2025 · Information Security

How to Tame Kubernetes Security: From Roles to Token Risks

This article explains why Kubernetes security feels like navigating in the dark, breaks down the platform’s core resources, outlines common attack vectors such as container escape and token abuse, compares managed versus self‑hosted clusters, and presents a real‑world EKS attack case with practical mitigation insights.

KubernetesOpsServiceAccount
0 likes · 11 min read
How to Tame Kubernetes Security: From Roles to Token Risks
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Nov 18, 2025 · Operations

How to Stop Brute‑Force Logins with Nginx Rate Limiting

Learn how to protect your web application from brute‑force login attacks by configuring Nginx rate limiting, with step‑by‑step instructions, example configurations, testing methods, custom error pages, and best‑practice tips such as IP whitelisting, HTTPS enforcement, and complementary security measures.

Brute-force protectionNginxRate Limiting
0 likes · 8 min read
How to Stop Brute‑Force Logins with Nginx Rate Limiting