Open in app

Sign In

Write

Sign In

Rafael Natali
Rafael Natali

179 Followers

Home

About

Published in DevOps.dev

·Oct 9, 2022

How to configure audit policy for Secrets on Kubernetes

Learn about Kubernetes Auditing and how to use it with Kubernetes Secrets. As stated in K8s documentation, “auditing provides a chronological set of records documenting the sequence of actions in a cluster.” It intends to answer questions like: What happened? When did it happen? Who initiated it? Kubernetes Secrets contains…

Kubernetes

2 min read

How to configure audit policy for Secrets on Kubernetes
How to configure audit policy for Secrets on Kubernetes
Kubernetes

2 min read


Published in FAUN Publication

·Sep 20, 2022

Istio STRICT mTLS failing with ClusterIP

After configuring Istio with STRICT mTLS and using a ClusterIP service, pod-to-pod communication breaks. Problem Pods configured to use ClusterIP as Service stop communicating with each other after configuring Istio PeerAuthentication to use STRICT mTLS. In the following sections, let’s simulate the error and how to reestablish inter-pod communication. Test Environment The test…

Kubernetes

6 min read

Istio STRICT mTLS failing with ClusterIP
Istio STRICT mTLS failing with ClusterIP
Kubernetes

6 min read


Published in Nerd For Tech

·Sep 6, 2022

Kubernetes Pod network connectivity issue with Istio enabled

A K8s Pod can return an Error when trying to reach the network before the Istio Sidecar is Running. Many applications execute commands or checks during startup, which require network connectivity. This can cause application containers to hang or restart if the istio-proxy sidecar container is not ready. This article…

Kubernetes

2 min read

Kubernetes

2 min read


Published in Marionete

·Aug 9, 2022

How to expose Kubernetes services to external traffic using Istio Gateway

Use a Gateway to manage inbound and outbound traffic for your mesh, letting you specify which traffic you want to enter or leave the Istio mesh. In a previous article, I explained the concept of a Service Mesh. This article demonstrates how to expose Kubernetes services deployed in the Service…

Istio

14 min read

How to expose Kubernetes services to external traffic using Istio Gateway
How to expose Kubernetes services to external traffic using Istio Gateway
Istio

14 min read


Published in FAUN Publication

·Jul 10, 2022

Vulnerability scanning for containers, Kubernetes, and IaC

How Trivy helps us scan Docker images, Kubernetes, and Terraform code to detect potential configuration issues and minimise the risk of attack. Vulnerabilities are everywhere! I’d like to describe how I’m using Trivy to scan Docker images, Kubernetes configuration files, and Terraform code to find vulnerabilities before deploying them in…

Kubernetes

5 min read

Vulnerability scanning for containers, Kubernetes, and IaC
Vulnerability scanning for containers, Kubernetes, and IaC
Kubernetes

5 min read


Published in Nerd For Tech

·Jul 6, 2022

Docker image best practices — Minimal images

It is a Dockerfile best practice to keep the images minimal. Create a distroless image and avoid including unnecessary packages or exposing ports to reduce the attack surface. Distroless image This article contains the instructions on how to build a minimal Docker image with only the tmp folder making, it a "Distroless…

Docker

2 min read

Docker

2 min read


Published in Marionete

·Mar 22, 2022

How to test your Terraform code

Learn about the HashiCorp Terraform Module Testing Experiment configuration and how to use it to run tests against infrastructure. Testing is vital to understand if the infrastructure code we created is doing what they are supposed to. Running a terraform plan helps, but it’s not a guarantee. …

Terraform

3 min read

How to test your Terraform code
How to test your Terraform code
Terraform

3 min read


Published in Marionete

·Mar 13, 2022

Using Terraform to manage multiple GCP resources

The goal of this article is to present a terraform code that creates multiple buckets, in multiple locations, and with multiple IAM permissions. This piece of code was used to solve the problem described in the Problem Statement section. The implementation strategy may vary from one case to the other…

Terraform

7 min read

Using Terraform to manage multiple GCP resources
Using Terraform to manage multiple GCP resources
Terraform

7 min read


Published in Marionete

·Jul 30, 2021

Pass secure information for building Docker images

Use Docker Buildkit to securely configure your Docker image to access private resources Challenges in accessing protected information Accessing private resources like a Nexus or a GitHub repository from within a Docker image and not leaking any security-related information it’s greatly appreciated. Firstly, we will never include credentials or any other secure information directly in…

Docker

4 min read

Pass secure information for building Docker images
Pass secure information for building Docker images
Docker

4 min read


Published in FAUN Publication

·May 24, 2021

Control traffic flow to and from Kubernetes pods with Network Policies

Network Policies are an application-centric construct that allows you to specify how a pod is allowed to communicate with various network “entities” Prerequisite This tutorial is a continuation of my previous articles: How to automate the setup of a Kubernetes cluster on GCP. Automation: Deploying an app in GKE using Ansible …

Kubernetes

4 min read

Control traffic flow to and from Kubernetes pods with Network Policies
Control traffic flow to and from Kubernetes pods with Network Policies
Kubernetes

4 min read

Rafael Natali

Rafael Natali

179 Followers

AWS | GCP | Terraform | Kubernetes — linkedin.com/in/rafaelnatali

Following
  • Netflix Technology Blog

    Netflix Technology Blog

  • Periklis Papanikolaou

    Periklis Papanikolaou

  • Diego Rodrigues

    Diego Rodrigues

  • Camila Sabatine

    Camila Sabatine

  • Amanda Lopes Pacca

    Amanda Lopes Pacca

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech