<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>k8s on Georg Pauer</title>
    <link>/series/k8s/</link>
    <description>Recent content in k8s on Georg Pauer</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 14 Nov 2024 00:00:00 +0000</lastBuildDate><atom:link href="/series/k8s/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>on Traefik ingress stuck in progressing in ArgoCD</title>
      <link>/posts/argocd-ingress-processing/</link>
      <pubDate>Thu, 14 Nov 2024 00:00:00 +0000</pubDate>
      
      <guid>/posts/argocd-ingress-processing/</guid>
      <description>I usually enjoy ArgoCD and deployments via Helm charts. Just sometimes an unexpected behaviour pops up. In my case the ingress deployed via a helm run by ArgoCD were stuck in status progressing. Meanwhile the ingress where there, from k8s perspective (kubectl get ing was all fine).
Ingress in progressing causes the ArgoCD application to stay in status progressing. This tends to mask other errors. Let&amp;rsquo;s deep dive into the issue…</description>
    </item>
    
    <item>
      <title>Kubernetes stalk</title>
      <link>/posts/k8s-stalk/</link>
      <pubDate>Wed, 14 Aug 2024 00:00:00 +0000</pubDate>
      
      <guid>/posts/k8s-stalk/</guid>
      <description>Today I learned about stalk, a CLI tool to watch a set of Kubernetes resources. Was quite handy to figure out a race condition where two operators overwrote the same resource. (This should never have happened, but this is another story.)
stalk GitHub link</description>
    </item>
    
    <item>
      <title>Kubernetes Security - CtF style learning &amp; pentesting</title>
      <link>/posts/k8s-security-learning2/</link>
      <pubDate>Fri, 26 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>/posts/k8s-security-learning2/</guid>
      <description>More resources to have fun with kubernetes from a security point of view and for learning:
challenges If you had fun with the Damn Vulnerable Web Application (DVWA), there is something equivalent for Kubernetes from Madhu Akula: Kubernetes Goat. You can also deploy your own playground.
K8S lan party seems also quite promising. (from Wiz)
tooling offensive Peirates is a bit alike a (still lightweight) Metasploit (payload) for k8s. One &amp;ldquo;batteries included&amp;rdquo; binary.</description>
    </item>
    
    <item>
      <title>deleting stuck namespace in kubernetes</title>
      <link>/posts/k8s-deleting-stuck-namespaces/</link>
      <pubDate>Tue, 25 Jun 2024 00:00:00 +0000</pubDate>
      
      <guid>/posts/k8s-deleting-stuck-namespaces/</guid>
      <description>When you create and delete resources and according objects in a namespace in your kubernetes cluster, you might just want to delete your namespace after your tests: kubectl delete ns test
stuck namespace When namespace deletion seems stuck in a Terminating status, check if there are any object left over in your namespace:
kubectl get all -n test for CRD you need to check for each type: kubectl api-resources --verbs=list --namespaced -o name | xargs -n 1 kubectl get --show-kind --ignore-not-found -n &amp;lt;terminating-namespace&amp;gt; (I found this snipped and also hints for the API calls here) If all is clean, but the namespace is stuck in Terminating, check (kubectl get ns test -o yaml) for Finalizers.</description>
    </item>
    
    <item>
      <title>Kubernetes Network Policies</title>
      <link>/posts/k8s-network-policies/</link>
      <pubDate>Sat, 27 Apr 2024 00:00:00 +0000</pubDate>
      
      <guid>/posts/k8s-network-policies/</guid>
      <description>What a shame that I was writing my Kubernetes Network Policies mostly by hand until now. There is this handy graphic interactive editor available. To bad it doesn&amp;rsquo;t support reading a netpol as input. Sometimes a visualization helps debugging.
Network policies won&amp;rsquo;t provide the visibility you can achieve with a mesh network (e.g. Istio/linkerd/Consul ) regarding attempted policy violations. But sometimes all you want is the separation. This provides it the easy way.</description>
    </item>
    
    <item>
      <title>Cloudland 2023</title>
      <link>/posts/observability-cloudland-2023/</link>
      <pubDate>Wed, 09 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/observability-cloudland-2023/</guid>
      <description>Cloudland this year was quite some time ago, but better late then never:
Michael Friedrich spoke about Observability for Efficient DevSecOps Pipelines. While there is (obviously) some GitLab promotion, some issues to me seem common with other pipelines:
slow pipelines unnecessary blocking/sequentiality missing cache for common transferred static data container registry, blobs, external artefacts observability principles need to be applied to CI/CD pipelines, too. telemetry! Don&amp;rsquo;t try to do everything in one step.</description>
    </item>
    
    <item>
      <title>IGER - Intergalaktische Erfahrungsreise 2023</title>
      <link>/posts/iger2023/</link>
      <pubDate>Fri, 21 Jul 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/iger2023/</guid>
      <description>The IGER is running 🎉
quite some art 😊 inspiring &amp;ldquo;how to data fusion&amp;rdquo; discussion at the hackcenter presented Schlanke OCI Container (GER) (recording) and a lightning-talk about Marp WOC 💛 forging!! also: visiting this heritage site update: the Hands-Free Coding in 2023 talk was very good. </description>
    </item>
    
    <item>
      <title>GPN21</title>
      <link>/posts/gpn21/</link>
      <pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/gpn21/</guid>
      <description>recordings from GPN21 are online. (Already enjoyed From 0 to Kubernetes, Modern Observability .. LGTM Stack, buffer overflow, Seitenkanalanalyse der SHAKE-Funktion in CRYSTALS-Dilithium, mit Mathematik API übernehmen - more to follow 😀 ) O-Auth intro</description>
    </item>
    
    <item>
      <title>Kubernetes Security - book and learning environment</title>
      <link>/posts/k8s-security-learning/</link>
      <pubDate>Fri, 04 Nov 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/k8s-security-learning/</guid>
      <description>on hackingkubernetes you can get the first half of the ORlly book &amp;ldquo;Hacking Kubernetes&amp;rdquo;, so the pod &amp;amp; runtime specific part, as well as supply chain related: controlplaneio/simulator - simulator setup for creating environments, where you can try attacking and debugging k8s (a bit AWS specific)</description>
    </item>
    
    <item>
      <title>rC3 nowhere suggestions</title>
      <link>/posts/rc3-nowhere-suggestions/</link>
      <pubDate>Sun, 09 Jan 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/rc3-nowhere-suggestions/</guid>
      <description>from rC3 nowhere: Kubernetes security (more recordings at media.ccc.de: algebra in &amp;ldquo;Math for Hackers&amp;rdquo;, some more security relevant stuff, social, infrastructure and so much more)</description>
    </item>
    
    <item>
      <title>PackagingCon</title>
      <link>/posts/packagingcon/</link>
      <pubDate>Thu, 25 Nov 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/packagingcon/</guid>
      <description>PackagingCon videos are released 🎉 - my suggestions are How Helm, The Package Manager For Kubernetes, Works and An Invitation to Order-Theoretic Models of Package Dependencies</description>
    </item>
    
    <item>
      <title>kubeinvaders for k8s chaos engineering</title>
      <link>/posts/kubeinvaders/</link>
      <pubDate>Mon, 07 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/kubeinvaders/</guid>
      <description>for everyone who want´s to play around with k8s, chaos engineering in a gamified way</description>
    </item>
    
  </channel>
</rss>
