Private Kubernetes cluster in AKS with Azure Private Link

Today, we’ll take a look at a new feature in AKS called Azure Private Link, which allows you to connect to AKS securely and privately over the Microsoft Azure backbone network. In the past, connecting to AKS from an on-premises network or other virtual network required using a public IP address, which posed potential security […]

Read more →

AKS pod managed identity

Kubernetes has become one of the most popular container orchestration tools, and Azure Kubernetes Service (AKS) is a managed Kubernetes service provided by Microsoft Azure. With the increasing use of Kubernetes and AKS, there is a growing need to improve the security and management of access to cloud resources. AKS pod managed identity is a […]

Read more →

AKS Workload Identity

AKS workload identity is a feature of Azure Kubernetes Service (AKS) that enables you to use Azure Active Directory (AAD) to manage access to Azure resources from within a Kubernetes cluster. In this blog post, we’ll explore how AKS workload identity works and how to use it with an example code. How does AKS workload […]

Read more →

LLM Evaluation Metrics: Automated Testing, LLM-as-Judge, and Human Assessment for Production AI

Introduction: Evaluating LLM outputs is fundamentally different from traditional ML evaluation. There’s no single ground truth for creative tasks, quality is subjective, and outputs vary with each generation. Yet rigorous evaluation is essential for production systems—you need to know if your prompts are working, if model changes improve quality, and if your system meets user […]

Read more →

DevSecOps: Integrating Security into DevOps – Part 5

Continuing from my previous blog, let’s explore some more advanced topics related to DevSecOps implementation. Identity and Access Management Identity and Access Management (IAM) is a critical aspect of DevSecOps. It involves managing user identities and controlling their access to resources based on their roles and responsibilities. IAM includes the following activities: Infrastructure as Code […]

Read more →