Tech

Solving couldn’t get current server API group list

In Kubernetes, administrators and developers may encounter various errors during cluster management and application deployment. One common error is “Couldn’t Get Current Server API Group List,” which can occur when interacting with the Kubernetes API server. This error can disrupt operations and hinder troubleshooting efforts, but understanding its causes and solutions is crucial for maintaining…

Tech

Zero Trust in Cyber Security

Cyber Security Invloves securing multiple aspect of business which includes application, data, network and physical devices. Today we will explore the Network part of Cyber security and will discuss Zero Trust Principle in great detail. What is Cyber Security? Cybersecurity involves protecting computer systems, networks, and data from unauthorised access and cyber attacks.In today’s digital…

Tech

Resetting Kafka Consumer Offset in Kafka Connectors

Kafka Connectors are a crucial component in building scalable and fault-tolerant data pipelines. However, there are situations where you may need to reset the consumer offset, whether due to unexpected issues, changes in data schema, or other operational requirements. In this blog post, we will delve into the various aspects of resetting Kafka consumer offsets…

Tech

Understanding MySQL Binary Logs

In the vast landscape of database management, MySQL’s binary log emerges as a silent guardian, recording the ebbs and flows of data modifications within the server. This indispensable component plays a pivotal role in tasks ranging from data replication to point-in-time recovery. In this exploration, we embark on a journey into the intricacies of MySQL…

Leetcode

1657. Determine if Two Strings Are Close

String closeness, in the context of this problem, involves evaluating whether two words can be considered “close” by meeting certain criteria. The criteria include having the same set of characters and the same frequency distribution of those characters. The closeStrings method endeavors to address this challenge. Unpacking the Solution Basic Check: The basicCheck method ensures…

Leetcode

237. Delete Node in a Linked List

The Singly-Linked List Conundrum Before delving into the intricacies of the Java solution, let’s understand the problem at hand. In a singly-linked list, each node contains a value and a reference to the next node in the sequence. The task is to delete a given node without access to the head of the linked list….

Java

How to initialise HashSet while declaring in Java

Before delving into initialization, let’s understand the allure of a HashSet. This data structure, based on the principles of a set in mathematics, provides rapid access to elements and ensures uniqueness—no duplicates allowed. Perfect for scenarios where order doesn’t matter, and you need swift membership checks. Techniques for Initializing HashSet During Declaration Method 1: Traditional…

Leetcode

1704. Determine if String Halves Are Alike

Problem: https://leetcode.com/problems/determine-if-string-halves-are-alike/description/ Breaking Down the Solution Converting String to Char Array: The input string s is converted into a character array a. This facilitates easy traversal and access to individual characters. Initialization and Set of Vowels: A HashSet vowels is created to store the vowels that need to be checked. The size of the array…