Today, we’ll take a look at a new feature in AKS called Azure Private Link, which allows you to connect to AKS securely and privately over the Microsoft Azure backbone network. In the past, connecting to AKS from an on-premises network or other virtual network required using a public IP address, which posed potential security […]
Read more →Search Results for: name
How is AKS workload identity different from AKS pod managed identity?
AKS workload identity and AKS pod managed identity both provide a way to manage access to Azure resources from within a Kubernetes cluster. However, there are some key differences between the two features. Scope AKS pod managed identity provides a managed identity for each individual pod within a Kubernetes cluster. This allows you to grant […]
Read more →AKS pod managed identity
Kubernetes has become one of the most popular container orchestration tools, and Azure Kubernetes Service (AKS) is a managed Kubernetes service provided by Microsoft Azure. With the increasing use of Kubernetes and AKS, there is a growing need to improve the security and management of access to cloud resources. AKS pod managed identity is a […]
Read more →AKS Workload Identity
AKS workload identity is a feature of Azure Kubernetes Service (AKS) that enables you to use Azure Active Directory (AAD) to manage access to Azure resources from within a Kubernetes cluster. In this blog post, we’ll explore how AKS workload identity works and how to use it with an example code. How does AKS workload […]
Read more →LLM Evaluation Metrics: Automated Testing, LLM-as-Judge, and Human Assessment for Production AI
Introduction: Evaluating LLM outputs is fundamentally different from traditional ML evaluation. There’s no single ground truth for creative tasks, quality is subjective, and outputs vary with each generation. Yet rigorous evaluation is essential for production systems—you need to know if your prompts are working, if model changes improve quality, and if your system meets user […]
Read more →DevSecOps: Integrating Security into DevOps – Part 5
Continuing from my previous blog, let’s explore some more advanced topics related to DevSecOps implementation. Identity and Access Management Identity and Access Management (IAM) is a critical aspect of DevSecOps. It involves managing user identities and controlling their access to resources based on their roles and responsibilities. IAM includes the following activities: Infrastructure as Code […]
Read more →