Matthieu Lanvert

Matthieu Lanvert

Matthieu is a Site Reliability Engineer (SRE) at Theodo Cloud. He specializes in DevOps technologies such as AWS, Kubernetes, Docker, Gitlab, and CloudWatch.

Kubectl list-clusters, all the commands to know

Kubectl list-clusters, all the commands to know

To save time with Kubernetes, discover the mastering commands for cluster management (Kubectl) to create, delete & monitor resources.

How to monitor your EBS volumes (AWS) using CloudWatch Metrics?

How to monitor your EBS volumes (AWS) using CloudWatch Metrics?

To monitor your EBS volumes, use CloudWatch Metrics. Enable some available metrics on your EC2 instances and monitor them via CloudWatch or Grafana.

Monitor your RDS instances with Cloudwatch metrics

Monitor your RDS instances with Cloudwatch metrics

Enable some of the available metrics by using CloudWatch metrics to monitor your RDS instances. Learn which metrics are key for your monitoring.

Amazon EC2 instances: scale up and down your Autoscaling group

Amazon EC2 instances: scale up and down your Autoscaling group

You want to save energy and money? Learn to Scale up and down EC2 instances in an Autoscaling group using AWS lambda and AWS CloudWatch rules.

Test and validate your Helm Charts in Kubernetes

Test and validate your Helm Charts in Kubernetes

Writing templates to render Kubernetes manifests can be a painful experience, even more when you are refactoring your Helm Chart.

How to monitor your Amazon EC2 instances using CloudWatch Metrics?

How to monitor your Amazon EC2 instances using CloudWatch Metrics?

Use CloudWatch Metrics to monitor your Amazon EC2 instances, enable some available metrics on it, and learn which metrics are key for your monitoring.

Using Docker on IntelliJ to debug your Spring Boot application

Using Docker on IntelliJ to debug your Spring Boot application

Run Spring Boot Java application with Docker through IntelliJ plugin. Debug it through a remote debug configuration and a breakpoint inside your code.

Protect your data at-rest from data tampering using encryption

Protect your data at-rest from data tampering using encryption

How to protect data at-rest from data tampering, what is home and full disk encryption and how to proceed. Here are the pros and cons of each method.