DEV Community

Rajesh Deshpande profile picture

Rajesh Deshpande

404 bio not found

Joined Joined on  github website

Work

Cloud Native Architect

Five Year Club
Writing Debut
Four Year Club
Three Year Club
Two Year Club
One Year Club
Hacktoberfest 2019
Kubernetes Myth #11: CPU Requests Guarantee Reserved CPU

Kubernetes Myth #11: CPU Requests Guarantee Reserved CPU

Comments
1 min read
Kubernetes Myth #10: Kube-Proxy Assigns IP Addresses to Pods

Kubernetes Myth #10: Kube-Proxy Assigns IP Addresses to Pods

Comments
1 min read
Kubernetes Myth #09: ClusterIP Services Always Use Round-Robin Load Balancing

Kubernetes Myth #09: ClusterIP Services Always Use Round-Robin Load Balancing

Comments
1 min read
Kubernetes Myth #08: Kubelet runs only on worker nodes!

Kubernetes Myth #08: Kubelet runs only on worker nodes!

Comments
1 min read
Kubernetes Myth #07: K8s Uses Limits and Requests for Scheduling

Kubernetes Myth #07: K8s Uses Limits and Requests for Scheduling

Comments
1 min read
Kubernetes Myth #06: Kubernetes Pods Always Need a Service Account

Kubernetes Myth #06: Kubernetes Pods Always Need a Service Account

Comments
1 min read
Kubernetes Myth #05: ClusterIP is Only for Internal Communication

Kubernetes Myth #05: ClusterIP is Only for Internal Communication

Comments
1 min read
Kubernetes Myth #04: K8s Can Work Without a CNI Plugin

Kubernetes Myth #04: K8s Can Work Without a CNI Plugin

Comments
1 min read
Kubernetes Myth #03: Kube-Proxy is a Must-Have

Kubernetes Myth #03: Kube-Proxy is a Must-Have

Comments
1 min read
Kubernetes Myth #02: All Pods Are Created Using the API Server and Scheduler

Kubernetes Myth #02: All Pods Are Created Using the API Server and Scheduler

Comments
1 min read
Kubernetes Myth #01: You Need 3 Control Plane Nodes!

Kubernetes Myth #01: You Need 3 Control Plane Nodes!

Comments
1 min read
How Kubernetes Principles Can Shape a Better Internal Developer Platform

How Kubernetes Principles Can Shape a Better Internal Developer Platform

Comments
5 min read
Securing third-party artifacts

Securing third-party artifacts

Comments
3 min read
loading...