Introduction In the blog post-https://fredrkl.com/blog/private-aks-access/, I mentioned the Azure Bastion service to safely and securely access a jump-host with only private IP. But what security…
Leave a Commentfredrkl Posts
Introduction There are many ways to create a secure internal developer platform, e.g., following the aspect-oriented programming model and giving the developers free guardrails and…
Leave a CommentIntroduction In the Private VS Public AKS security concerns – fredrkl blog post, we examined the difference between public and private AKS API servers. Let’s…
Leave a CommentIntroduction Continuous integration (CI) workflows enable us to streamline the process of integrating changes and catching errors. But what if we could bring some of…
Leave a CommentIntroduction In this blog post, we will explore the security considerations on whether or not to use a private or public K8s API server when…
Leave a CommentIntroduction Git provides a powerful command called ‘git add patch’ that allows you to choose which changes to include in your commit selectively and interactively.…
Leave a CommentTesting is an essential part of any infrastructure-as-code (IaC) project, and Terraform is no exception. In this blog post, we will explore various testing techniques…
Leave a CommentIntroduction While studying logic at University, I picked up a concept that changed my thoughts about software development. I don’t know how it translates to…
Leave a CommentIntroduction I am evaluating the use of Mozilla SOPS or Sealed Secret for a new K8s project that will be heavily based on GitOps. See…
Leave a CommentIntroduction A couple of years ago, I consulted for the power grid operator in Norway called Hafslund Nett, now called Elvia. I saw that here,…
Leave a Comment