Skip to content
View zawyelwin's full-sized avatar
Block or Report

Block or report zawyelwin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
zawyelwin/README.md

Hi there, I am Zaw 👋

  • 🔭 I’m a DevOps Engineer and mostly working on Kubernetes/Containers & Serverless.

  • 🌱 I’m currently learning

  • 💬 We can get in touch and discuss anything related to DevOps, AWS, Kubernetes and Laravel.

  • 📫 How to reach me: @Zawye_lwin on

  • ⚡ Fun fact: I love coffee and I like to break things...

I work with...

AWS Terraform GitLab Kubernetes GitHub Actions Laravel Vue.js Go

Top Langs

Pinned Loading

  1. laravel-installer-docker laravel-installer-docker Public

    Streamline Laravel development with Docker

    Makefile

  2. Some handy kubectl commands to make ... Some handy kubectl commands to make your life easier.Collected from some great resources I found out and some tweaks from their implementations. All credits goes to the original authors.
    1
    $ cd /etc/kubernetes/pki/
    2
    $ mv {apiserver.crt,apiserver-etcd-client.key,apiserver-kubelet-client.crt,front-proxy-ca.crt,front-proxy-client.crt,front-proxy-client.key,front-proxy-ca.key,apiserver-kubelet-client.key,apiserver.key,apiserver-etcd-client.crt} ~/certs-bak
    3
    $ kubeadm init phase certs all
    4
    $ cd /etc/kubernetes/
    5
    $ mv {admin.conf,controller-manager.conf,kubelet.conf,scheduler.conf} ~/certs-bak
  3. kaniko-alpine kaniko-alpine Public

    Kaniko based on Alpine with bash,git,jq and coreutils included.

    Dockerfile

  4. Deploy a Laravel app properly. Deploy a Laravel app properly.
    1
    Add a user to the server and append the user to the sudo group. You can verify the user is in the sudo  group using ```id <username>``` command.
    2
    
                  
    3
    ```bash
    4
    adduser <username>
    5
    usrmod -aG sudo <username>
  5. az-aad-rbac.tf az-aad-rbac.tf
    1
    ######################################################################### SERVER
    2
    
                  
    3
    resource "azuread_application" "server" {
    4
      name       = "k8s_server"
    5
      reply_urls = ["http://k8s_server"]
  6. 0opsops/terraform-aws-synthetics-canary 0opsops/terraform-aws-synthetics-canary Public

    Terraform module for Amazon CloudWatch Synthetics

    HCL