Tag: ollama
How to Run DeepSeek Locally
Run DeepSeek Locally Using Ollama Introduction Running DeepSeek locally using Ollama allows you to leverage powerful language models on your machine without relying on cloud-based APIs. This guide will walk you through the installation, setup, and usage of DeepSeek R1 with Ollama for local inference. 1. Install Ollama Ollama is a tool designed to run…
Using Role-Based Access Control (RBAC) in Kubernetes: A Practical Example
Role-Based Access Control (RBAC) in Kubernetes is a robust method for managing permissions and access to resources within your cluster. By defining roles and associating them with users or groups, RBAC helps maintain a secure and organized environment. In this blog, we’ll dive into a practical example of using RBAC in Kubernetes. What is RBAC?…
Isolating resources and manage permissions in a Kubernetes cluster
In the world of Kubernetes, managing resources and ensuring secure access is paramount. As clusters grow in complexity, the need for a structured and secure environment becomes essential. Two powerful tools in Kubernetes help achieve this: Namespaces and Role-Based Access Control (RBAC). In this blog, we’ll explore how to use namespaces to isolate resources and…
Why I love C# over other programming languages ?
Hello You!I have always been a fan of loosely typed languages. But as I scale up, it was starting to become a bit of a problem. Though I was able to ship things faster, the stability was not that great. Eventually all the validations, error handlings, and anything other than the actual code started to…
Attach configmap or secrets as files in kubernetes
Hello you! Today, I thought I can share a solution to a problem I was facing. I specifically wanted the configmaps/secrets as files and my code will just use those files. After almost two days, I got this working, so thought I can share it with you on how to attach ConfigMaps and Secrets as…
Removing the last migration – EF
I was working on a .net project yesterday. I did some migrations and that included deletion of a column in the database ( Code-first approach right? ). After a while, I thought that was unnecessary and I needed the column to be present. So what I did was, I deleted the migration file and ran…
Deploying argocd apps to other clusters
This is easier in the cli, where argocd add cluster will just do everything in the background with the kubeconfig context. Anyways what actually happens there is that, it creates a service account, assigns a cluster role, and creates a secret associated with the service account. Not just that, all the above happens in the…
Mounting a kubernetes secret or config as a volume
This approach makes secrets accessible as files. This file based access can be helpful in some specific situations like “I don’t know honestly”, Let me know in the comments if you know 😅. The pod takes a secret named “my-secret” and mounts it to the /etc/mysecrets location. As a secret – It might have one…
Updating Angular : A Comprehensive Guide to Seamless Transitions
In the ever-evolving world of web development, staying abreast of the latest technologies and frameworks is crucial for maintaining a project’s relevance and longevity. Angular, a popular front-end framework, regularly releases updates that introduce new features, performance enhancements, and bug fixes. Updating Angular within your project may seem like a daunting task, but with careful…