-
Tech should learn
-
AWS(Draft)
-
DevOps Essentials
- DevOps Essentials
- 1. What DevOps really is
- 2. Life before DevOps
- 3. DevOps SDLC.
- 4. DevOps principles
- 6. DevOps Metrics
- 7. DevOps Leadership - People & Change leadership
- 8. Designing a DevOps transformation strategy.
- 9. DevSecOps - Security Embedded into DevOps
- 10. Site Reliability Engineering (SRE).
-
DevSecOps Essentials(Draft)
-
CI/CD
-
Docker
- Docker Mastery
- 1. The Compute Evolution Physical vs. Virtual vs. Containerization
- 2. Docker Internals
- 3. Docker Image Engineering
- 4. Registries and The Secure Supply Chain
- 5. Multi-Container Orchestration - Docker Compose
- 6. Docker Networking: The Connectivity Matrix
- 7. Docker Storage: The Persistence Layer
- 8. Docker Observability: The Eyes and Ears of Your Microservices
- 9. Hardening Security for Containers
- Writing Dockerfile
- Docker Commands
-
Kubernetes (Draft)
-
- Kubernetes ConfigMaps for Decoupling Configuration
- Kubernetes Secrets for Decoupling Configuration
- Kubernetes Downward API for Decoupling Configuration
- Kubernetes Volumes
- Kubernetes PV & PVC
- Kubernetes StorageClasses
- Kubernetes Volume Snapshots
- Kubernetes Volume Expansion using PVC and StorageClass
- Kubernetes Secrets Management at Scale
-
AWS Elastic Kubernetes Service
-
Programming
-
Python
EKS VPC CNI & Network Security
1. AWS VPC CNI: Why every Pod gets a native IP A CNI (Container Network Interface) is the plugin responsible for giving IP addresses to your Pods. Many standard Kubernetes setups use “Overlay” networks (like Flannel), which give Pods fake, virtual IP addresses that the actual cloud provider doesn’t understand.
EKS uses the AWS VPC CNI. It works differently. It talks directly to AWS and provisions real Elastic Network Interfaces (ENIs) and secondary IP addresses from your actual AWS Subnet, assigning them directly to your Pods.
- The Benefit: Because the Pod has a native AWS IP, it can natively route traffic to an AWS RDS database, it can be tracked by AWS VPC Flow Logs, and it performs incredibly fast without the overhead of “un-packaging” virtual network packets.
2. Network Policies: Layer 4 Zero-Trust Since all Pods can communicate by default, we need a virtual firewall inside the cluster. A Network Policy allows you to implement “Zero-Trust.” It operates at Layer 3/Layer 4 of the network (IP addresses and Ports).
- You can define a rule that says: “The Database Pod will drop all incoming traffic UNLESS it comes from a Pod with the label
app: backendon Port3306.”
3. The 2026 Feature: FQDN Egress Filtering For years, restricting outbound traffic (egress) from a Pod to the internet was painful. You had to use IP addresses, but cloud services (like AWS S3 or GitHub) constantly change their IPs! As of 2026, AWS introduced ApplicationNetworkPolicies specifically for EKS Auto Mode. This allows Layer 7 FQDN (Fully Qualified Domain Name) Egress Filtering.
- Instead of maintaining a list of 50 changing IP addresses, you simply write a policy that says: “This Pod is only allowed to talk to
api.github.comand*.s3.amazonaws.com. Block everything else.”