article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Thanks for reading!

Linux 112
article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO Business Intelligence

Hence, it’s important to protect the cloud and its various connections across various cloud environments, not just those that directly tie back to the on-premise network. In many cases, organizations adopt legacy network security solutions and architectures to secure these cloud workloads that often fail to provide complete security coverage.

Cloud 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Kubernetes on OpenStack: The Technical Details

Scott Lowe

Lees spends some time reviewing the basics of Kubernetes networking, reviewing the core constructs leveraged by Kubernetes. In the process of reviewing Kubernetes networking, Lees points out that there are lots of solutions for pod-to-pod (east-west) traffic flows. Load balancing is the next connection point that Lees reviews.

article thumbnail

Technology Short Take 141

Scott Lowe

Networking. The first is a post on Cilium and F5 load balancer integration , while the second discusses implementing Kubernetes network policies with Cilium and Linkerd. Second, the content reflects—in my opinion—the changing nature of what it means to be a “networking professional.”

Vmware 60
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available. Some of them not only can provide strong authentication, but also have the ability to be used as a secret repository.

article thumbnail

Technology Short Take 102

Scott Lowe

Networking. Ajay Chenampara has a post on using the Ansible network-engine command parser to parse the output of commands on network devices. Ajay Chenampara has a post on using the Ansible network-engine command parser to parse the output of commands on network devices. Here’s his latest piece.

article thumbnail

Adding a Name to the Kubernetes API Server Certificate

Scott Lowe

A couple of situations come to mind, such as adding a load balancer in front of the control plane, or using a new or different URL/hostname used to access the API server (both situations taking place after the cluster was bootstrapped). networking: dnsDomain: cluster.local podSubnet: "" serviceSubnet: 10.96.0.0/12