Explaining Kubernetes to a Five Year Old

A friend of mine pointed me to a twitter thread on how to explain Kubernetes to a five year old. Since I have a two year old, this immediately popped into my head. I’ve seen the Lonely Goatherd scene from The Sound of Music many a time – my daughter absolutely loves it. And itContinue reading “Explaining Kubernetes to a Five Year Old”

Microservice Security Design Patterns for Kubernetes (Part 2)

In this post we will set the groundwork to deep dive into the Security Service Layer Pattern with a live insecure deployment on Google Kubernetes Engine (GKE). By the end of this post you will be able to bring up an insecure deployment and demonstrate layer 7 attacks and unrestricted access between internal services.

Microservice Security Design Patterns for Kubernetes (Part 1)

In this multi-part blog series, I will describe some microservice security design patterns to implement micro-segmentation and deep inspection in the interior of your Kubernetes cluster to further secure your microservice applications, not just the cluster. I will also demonstrate the design patterns with working Proof of Concept deployments that you can use as a starting point.