<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Raju Nandi</title>
    <description>The latest articles on DEV Community by Raju Nandi (@nanditechbytes).</description>
    <link>https://dev.to/nanditechbytes</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2231223%2F2d914c49-1a9d-40ad-ba5e-5dc998c15150.jpg</url>
      <title>DEV Community: Raju Nandi</title>
      <link>https://dev.to/nanditechbytes</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/nanditechbytes"/>
    <language>en</language>
    <item>
      <title>Your DevOps Tip#2 - On Managing Terraform Variables</title>
      <dc:creator>Raju Nandi</dc:creator>
      <pubDate>Tue, 29 Oct 2024 17:39:52 +0000</pubDate>
      <link>https://dev.to/nanditechbytes/your-devops-tip2-on-managing-terraform-variables-3pbp</link>
      <guid>https://dev.to/nanditechbytes/your-devops-tip2-on-managing-terraform-variables-3pbp</guid>
      <description>&lt;p&gt;Hi and welcome to Your Devops Tip blog series. In this series I am going to share some interesting scenarios, challenge and solutions on topics related to realtime use cases on Cloud and Devops.&lt;/p&gt;

&lt;h1&gt;
  
  
  Scenario
&lt;/h1&gt;

&lt;p&gt;Imagine you're working with Terraform and managing multiple .tfvars files to define your infrastructure variables. &lt;/p&gt;

&lt;h1&gt;
  
  
  Challenge
&lt;/h1&gt;

&lt;p&gt;How do you ensure that the correct variable values are applied, especially when dealing with multiple .tfvars files with potentially conflicting settings?&lt;/p&gt;

&lt;h1&gt;
  
  
  Solution
&lt;/h1&gt;

&lt;p&gt;Understanding how Terraform prioritizes these files can streamline your configuration management and avoid unexpected results.Here’s a quick glance on how Terraform handles variable files:&lt;/p&gt;

&lt;h2&gt;
  
  
  Automatic .tfvars Files
&lt;/h2&gt;

&lt;p&gt;abc.auto.tfvars and terraform.tfvars are picked up automatically by Terraform.&lt;br&gt;
abc.auto.tfvars has precedence over terraform.tfvars.&lt;br&gt;
&lt;strong&gt;Example&lt;/strong&gt;: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;abc.auto.tfvars has below values&lt;br&gt;
instance_type = "t3.medium"&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;terraform.tfvars has below values &lt;br&gt;
instance_type = "t2.micro"&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Result: Terraform will use instance_type = "t3.medium" during terraform plan/apply.&lt;/p&gt;

&lt;h2&gt;
  
  
  Custom .tfvars Files
&lt;/h2&gt;

&lt;p&gt;Custom files (e.g., xyz.tfvars) require you to explicitly specify them using the -var-file option. These files override all other .tfvars settings when provided.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;xyz.tfvars has below value
instance_type = "p3dn.24xlarge"&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When specified during terraform plan or terraform apply, instance_type = "p3dn.24xlarge" will be used. If xyz.tfvars does not include all variables, Terraform will use values from terraform.tfvars or abc.auto.tfvars for any missing variables.&lt;/p&gt;

&lt;p&gt;Now you know this, you can control which variables are applied and manage multiple .tfvars files effectively in Terraform.&lt;br&gt;
The solution provided above is focussing on using native terraform techniques. There are wrappers like Teragrunt is also available for handling such scenarios.&lt;/p&gt;

&lt;p&gt;Hope this helps streamline your Terraform configurations!&lt;/p&gt;

&lt;p&gt;For more techbytes on Cloud and Devops please stay connected to NandiTechBytes on Youtube. Also I am sharing the playlist here for you , please check it out.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/playlist?list=PLeSL-6QYMaspWR8LgCVaHTvlWk83kjAa-" rel="noopener noreferrer"&gt;Playlist Cloud &amp;amp; Devops Projects and Tasks&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cheers&lt;br&gt;
Keep Learning!&lt;br&gt;
@&lt;a href="https://www.youtube.com/channel/UCXXGW_6Dkidx4X3pbwvDk4Q" rel="noopener noreferrer"&gt;NandiTechBytes&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>terraform</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Your DevOps Tip#1 - On AWS Networking and EKS</title>
      <dc:creator>Raju Nandi</dc:creator>
      <pubDate>Fri, 25 Oct 2024 01:30:00 +0000</pubDate>
      <link>https://dev.to/nanditechbytes/your-devops-tip-on-aws-networking-and-eks-2id2</link>
      <guid>https://dev.to/nanditechbytes/your-devops-tip-on-aws-networking-and-eks-2id2</guid>
      <description>&lt;p&gt;Hi and welcome to &lt;strong&gt;Your Devops Tip&lt;/strong&gt; blog series. In this series I am going to share some interesting scenarios, challenge and solutions on topics related to realtime use cases on Cloud and Devops.&lt;/p&gt;

&lt;h1&gt;
  
  
  Scenario
&lt;/h1&gt;

&lt;p&gt;Imagine you have two EKS clusters in separate VPCs with no direct network connectivity (like Transit Gateway or VPC peering) between the two services and you are not allowed to make a connection using TGW or VPC peering between the two VPC’s. &lt;/p&gt;

&lt;h1&gt;
  
  
  Challenge
&lt;/h1&gt;

&lt;p&gt;There is requirement that an application from VPC-A EKS cluster wants to connect a service on VPC-B EKS cluster. How can you make that happen?&lt;/p&gt;

&lt;h1&gt;
  
  
  Solution
&lt;/h1&gt;

&lt;p&gt;By Using hashtag &lt;strong&gt;AWS PrivateLink , NLB, VPC Endpoints&lt;/strong&gt;. Here is a brief explanation of the steps.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Create a Network Load Balancer (NLB) for the microservice in VPC B.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a VPC Endpoint Service in VPC B and Register the NLB as a VPC Endpoint Service. Modify the microservice in VPC B to be accessible via the NLB.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create an Interface VPC Endpoint in VPC A that connects to the VPC Endpoint Service in VPC B. This will create an endpoint network interface in VPC A, providing a private IP address to access the service in VPC B.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Update Security Groups:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ensure the security groups in VPC B (associated with the NLB and the microservice) allow inbound traffic from the VPC Endpoint in VPC A.&lt;/li&gt;
&lt;li&gt;Similarly, configure the security groups in VPC A to allow outbound traffic to the VPC Endpoint.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Modify the Microservice in VPC A to Use the VPC Endpoint&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By following these steps, you can enable secure, private communication between microservices in different EKS clusters without exposing them to the internet or requiring direct network connectivity between the VPCs.&lt;/p&gt;

&lt;p&gt;For more techbytes on Cloud and Devops please stay connected to NandiTechBytes on Youtube. Also I am sharing the playlist here for you , please check it out.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/playlist?list=PLeSL-6QYMaspWR8LgCVaHTvlWk83kjAa-" rel="noopener noreferrer"&gt;Playlist Cloud &amp;amp; Devops Projects and Tasks&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cheers&lt;br&gt;
Keep Learning!&lt;br&gt;
@&lt;a href="https://www.youtube.com/channel/UCXXGW_6Dkidx4X3pbwvDk4Q" rel="noopener noreferrer"&gt;NandiTechBytes&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>kubernetes</category>
      <category>networking</category>
      <category>devops</category>
    </item>
    <item>
      <title>How AWS SSM agent communicates with 𝐒𝐲𝐬𝐭𝐞𝐦 𝐌𝐚𝐧𝐚𝐠𝐞𝐫 𝐒𝐞𝐫𝐯𝐢𝐜𝐞 using 𝐕𝐏𝐂 𝐈𝐧𝐭𝐞𝐫𝐟𝐚𝐜𝐞 𝐞𝐧𝐝𝐩𝐨𝐢𝐧𝐭𝐬.</title>
      <dc:creator>Raju Nandi</dc:creator>
      <pubDate>Wed, 23 Oct 2024 01:04:00 +0000</pubDate>
      <link>https://dev.to/nanditechbytes/how-aws-ssm-agent-communicates-with-using--1a0g</link>
      <guid>https://dev.to/nanditechbytes/how-aws-ssm-agent-communicates-with-using--1a0g</guid>
      <description>&lt;p&gt;If you are reading this blog then you are interested to know how the SSM agent running on the EC2 instance is communicating with the AWS System Manager Service.&lt;/p&gt;

&lt;p&gt;Basically the &lt;strong&gt;SSM agent&lt;/strong&gt; needs internet access to reach to the &lt;strong&gt;System Manager Service&lt;/strong&gt; but what if your instances are in a restricted environment where they are not allowed to access the internet then how can you use AWS System Manager for managing your instances.&lt;/p&gt;

&lt;p&gt;Curious to know how you can use all the features of AWS System Manager inspite of running your instances on a restricted environment. Watch this video &lt;br&gt;
&lt;a href="https://youtu.be/FuKHPKxTi-E" rel="noopener noreferrer"&gt;SSM on EC2 with No Internet? Here's How!&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Below is how the communication happens from SSM agent running on EC2 to AWS System Manager.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F76yaawtvmhux1gva8tkw.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F76yaawtvmhux1gva8tkw.gif" alt="Image description" width="1024" height="768"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1️⃣ 𝐂𝐚𝐥𝐥𝐬 𝐈𝐧𝐬𝐭𝐚𝐧𝐜𝐞 𝐌𝐞𝐭𝐚𝐝𝐚𝐭𝐚 𝐒𝐞𝐫𝐯𝐢𝐜𝐞: The SSM agent gets the instance metadata for example AWS region.&lt;br&gt;
2️⃣ 𝐃𝐍𝐒 𝐋𝐨𝐨𝐤𝐮𝐩 𝐟𝐨𝐫 𝐀𝐏𝐈 𝐄𝐧𝐝𝐩𝐨𝐢𝐧𝐭: The SSM agent attempts to resolve the API endpoint (e.g., ssm..amazonaws.com) via the private DNS.&lt;br&gt;
3️⃣ 𝐏𝐫𝐢𝐯𝐚𝐭𝐞 𝐃𝐍𝐒 𝐑𝐞𝐬𝐨𝐥𝐯𝐞𝐬 𝐭𝐨 𝐕𝐏𝐂 𝐄𝐧𝐝𝐩𝐨𝐢𝐧𝐭: The private DNS resolves the SSM API domain to the private IP address of the VPC interface endpoint’s ENI.&lt;br&gt;
4️⃣ 𝐓𝐫𝐚𝐟𝐟𝐢𝐜 𝐑𝐨𝐮𝐭𝐞𝐝 𝐭𝐨 𝐄𝐧𝐝𝐩𝐨𝐢𝐧𝐭 𝐄𝐍𝐈: The EC2 instance sends the API request to the private IP address of the VPC interface endpoint's ENI.&lt;br&gt;
5️⃣ 𝐏𝐫𝐢𝐯𝐚𝐭𝐞𝐋𝐢𝐧𝐤 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧: The VPC interface endpoint forwards the request over AWS PrivateLink to the AWS SSM service.&lt;br&gt;
6️⃣ 𝐒𝐒𝐌 𝐒𝐞𝐫𝐯𝐢𝐜𝐞 𝐏𝐫𝐨𝐜𝐞𝐬𝐬𝐞𝐬 𝐑𝐞𝐪𝐮𝐞𝐬𝐭: AWS Systems Manager processes the API request and Response Sent via PrivateLink to the VPC interface endpoint&lt;br&gt;
7️⃣ 𝐑𝐞𝐬𝐩𝐨𝐧𝐬𝐞 𝐃𝐞𝐥𝐢𝐯𝐞𝐫𝐞𝐝 𝐭𝐨 𝐒𝐒𝐌 𝐀𝐠𝐞𝐧𝐭: The VPC interface endpoint forwards the response to the EC2 instance, where the SSM agent receives and processes it.&lt;/p&gt;

&lt;p&gt;For more Tech Bytes on Cloud and Devops you can view the below playlist or follow my channel NandiTechBytes.&lt;br&gt;
📽 &lt;a href="https://www.youtube.com/playlist?list=PLeSL-6QYMaspWR8LgCVaHTvlWk83kjAa-" rel="noopener noreferrer"&gt;Devops Projects &amp;amp; Tasks&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cheers&lt;br&gt;
Keep Learning!&lt;/p&gt;

</description>
      <category>devops</category>
      <category>aws</category>
      <category>networking</category>
      <category>cloud</category>
    </item>
    <item>
      <title>In 𝐊𝐮𝐛𝐞𝐫𝐧𝐞𝐭𝐞𝐬 , Do you know the difference between 𝐕𝐨𝐥𝐮𝐦𝐞 𝐁𝐢𝐧𝐝𝐢𝐧𝐠 and 𝐕𝐨𝐥𝐮𝐦𝐞 𝐌𝐨𝐮𝐧𝐭𝐢𝐧𝐠 ?</title>
      <dc:creator>Raju Nandi</dc:creator>
      <pubDate>Sun, 20 Oct 2024 13:00:00 +0000</pubDate>
      <link>https://dev.to/nanditechbytes/in-do-you-know-the-difference-between-and--bjk</link>
      <guid>https://dev.to/nanditechbytes/in-do-you-know-the-difference-between-and--bjk</guid>
      <description>&lt;p&gt;In this blog , I am going to discuss the two familiar terms in kubernetes world.&lt;/p&gt;

&lt;h1&gt;
  
  
  𝐕𝐨𝐥𝐮𝐦𝐞 𝐁𝐢𝐧𝐝𝐢𝐧𝐠
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;The PersistentVolume (PV)represents a storage resource in the cluster.&lt;/li&gt;
&lt;li&gt;The PersistentVolumeClaim (PVC)is a request for storage.&lt;/li&gt;
&lt;li&gt;The binding process occurs when a PVC is associated with a PV that meets the requested storage size and other specifications.&lt;/li&gt;
&lt;li&gt;This step is about reserving storage for the pod, but the actual storage is not yet attached to the pod.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  𝐕𝐨𝐥𝐮𝐦𝐞 𝐌𝐨𝐮𝐧𝐭𝐢𝐧𝐠
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;After the binding is complete, the pod will mount the storage. &lt;/li&gt;
&lt;li&gt;The mounted PV (from the PVC) is attached to a specific directory in the pod’s filesystem, allowing the pod to read from or write to the PV.
The below image illustrates both the process.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fga6gfqp6oy8k8q4a8ocl.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fga6gfqp6oy8k8q4a8ocl.gif" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For more Tech Bytes on Cloud and Devops you can view the below playlist or follow my channel NandiTechBytes on Youtube.&lt;br&gt;
📽 &lt;a href="https://www.youtube.com/playlist?list=PLeSL-6QYMaspWR8LgCVaHTvlWk83kjAa-" rel="noopener noreferrer"&gt;Devops Projects and Tasks&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cheers&lt;br&gt;
Keep Learning!&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>devops</category>
      <category>cloudnative</category>
    </item>
    <item>
      <title>Complete CICD with Gitlab Kubernetes Runner, Gitlab KAS Agent, Kaniko and other Devops tools.</title>
      <dc:creator>Raju Nandi</dc:creator>
      <pubDate>Sat, 19 Oct 2024 06:17:16 +0000</pubDate>
      <link>https://dev.to/nanditechbytes/complete-cicd-with-gitlab-kubernetes-runner-gitlab-kas-agent-kaniko-and-other-devops-tools-a8e</link>
      <guid>https://dev.to/nanditechbytes/complete-cicd-with-gitlab-kubernetes-runner-gitlab-kas-agent-kaniko-and-other-devops-tools-a8e</guid>
      <description>&lt;p&gt;The format of the blog is like it starts with the scenario, then challenges and finally the solution.&lt;/p&gt;

&lt;h1&gt;
  
  
  Scenario
&lt;/h1&gt;

&lt;p&gt;A development team is already using a Kubernetes cluster for their applications and now wants to run their CI/CD jobs on the same cluster for better scalability and resource efficiency. However, they face key Challenges&lt;/p&gt;

&lt;h1&gt;
  
  
  Challenges
&lt;/h1&gt;

&lt;ol&gt;
&lt;li&gt;𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐑𝐢𝐬𝐤𝐬 𝐰𝐢𝐭𝐡 𝐊𝐮𝐛𝐞𝐂𝐨𝐧𝐟𝐢𝐠: They want to connect GitLab pipelines to Kubernetes without storing KubeConfig files, as it poses a security risk.&lt;/li&gt;
&lt;li&gt;𝐁𝐮𝐢𝐥𝐝𝐢𝐧𝐠 𝐃𝐨𝐜𝐤𝐞𝐫 𝐈𝐦𝐚𝐠𝐞𝐬: With Kubernetes moving away from Docker, they need an alternative to Docker-in-Docker (DinD) to build images within the CI/CD pipeline.&lt;/li&gt;
&lt;li&gt;𝐌𝐮𝐥𝐭𝐢-𝐄𝐧𝐯𝐢𝐫𝐨𝐧𝐦𝐞𝐧𝐭 𝐃𝐞𝐩𝐥𝐨𝐲𝐦𝐞𝐧𝐭𝐬: They need a simplified way to deploy across dev, test, and prod using a single Helm chart, avoiding complex configurations.&lt;/li&gt;
&lt;li&gt;𝐂𝐨𝐝𝐞 𝐐𝐮𝐚𝐥𝐢𝐭𝐲 𝐚𝐧𝐝 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: Automated tools for code linting and vulnerability scanning are required to maintain high standards across environments.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As a &lt;strong&gt;Devops&lt;/strong&gt; engineer you are tasked to find an integrated solution to overcome these challenges and streamline their CI/CD process.&lt;/p&gt;

&lt;h1&gt;
  
  
  Solution
&lt;/h1&gt;

&lt;p&gt;In my latest video, I showcase how to implement a complete  𝐂𝐈/𝐂𝐃 pipeline with 𝐆𝐢𝐭𝐋𝐚𝐛 𝐊𝐮𝐛𝐞𝐫𝐧𝐞𝐭𝐞𝐬 𝐑𝐮𝐧𝐧𝐞𝐫𝐬, integrating top DevOps tools like MegaLinter, Kaniko, Trivy, Helm, and the powerful 𝐆𝐢𝐭𝐋𝐚𝐛 𝐊𝐀𝐒 𝐀𝐠𝐞𝐧𝐭. &lt;br&gt;
𝐖𝐡𝐚𝐭’𝐬 𝐢𝐧𝐬𝐢𝐝𝐞?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;𝐃𝐨𝐧’𝐭 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐬𝐭𝐨𝐫𝐞 𝐊𝐮𝐛𝐞𝐂𝐨𝐧𝐟𝐢𝐠? 𝐍𝐨 𝐩𝐫𝐨𝐛𝐥𝐞𝐦! See how the 𝐆𝐢𝐭𝐋𝐚𝐛 𝐊𝐀𝐒 𝐀𝐠𝐞𝐧𝐭 connects to Kubernetes clusters.&lt;/li&gt;
&lt;li&gt;𝐄𝐟𝐟𝐨𝐫𝐭𝐥𝐞𝐬𝐬 𝐃𝐞𝐩𝐥𝐨𝐲𝐦𝐞𝐧𝐭𝐬 across dev, test, and prod using a single Helm chart.&lt;/li&gt;
&lt;li&gt;𝐊𝐮𝐛𝐞𝐫𝐧𝐞𝐭𝐞𝐬 𝐑𝐮𝐧𝐧𝐞𝐫𝐬 running isolated CI/CD jobs in scalable Kubernetes pods.&lt;/li&gt;
&lt;li&gt;𝐂𝐨𝐝𝐞 𝐐𝐮𝐚𝐥𝐢𝐭𝐲 𝐀𝐬𝐬𝐮𝐫𝐚𝐧𝐜𝐞 with MegaLinter to keep your codebase clean and compliant.&lt;/li&gt;
&lt;li&gt;𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐫𝐬𝐭 with Automated vulnerability scanning using Trivy.&lt;/li&gt;
&lt;li&gt;𝐁𝐮𝐢𝐥𝐝 𝐚𝐧𝐝 𝐏𝐫𝐨𝐦𝐨𝐭𝐞 with 𝐊𝐚𝐧𝐢𝐤𝐨&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I tried to cover everything you need to implement this CI/CD pipeline, making it an absolute must-watch for DevOps engineers and developers alike! 😎&lt;br&gt;
𝐂𝐮𝐫𝐢𝐨𝐮𝐬 𝐡𝐨𝐰 𝐢𝐭 𝐚𝐥𝐥 𝐰𝐨𝐫𝐤𝐬? &lt;br&gt;
Watch the video&lt;br&gt;
🎥 &lt;a href="https://youtu.be/wWvkxge_88w" rel="noopener noreferrer"&gt;Complete CICD with Gitlab Kubernetes Runner, Gitlab KAS Agent, Kaniko and other Devops tools.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cheers&lt;br&gt;
Keep Learning&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>devops</category>
      <category>gitlab</category>
      <category>cicd</category>
    </item>
  </channel>
</rss>
