<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title>Kubernetes - Tag - IT Guy Journals</title>
        <link>https://www.itguyjournals.com/tags/kubernetes/</link>
        <description>Kubernetes - Tag - IT Guy Journals</description>
        <generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>luka.krapic@gmail.com (Luka Krapić)</managingEditor>
            <webMaster>luka.krapic@gmail.com (Luka Krapić)</webMaster><lastBuildDate>Tue, 05 Aug 2025 15:25:19 &#43;0100</lastBuildDate><atom:link href="https://www.itguyjournals.com/tags/kubernetes/" rel="self" type="application/rss+xml" /><item>
    <title>Installing Cilium and Multus on Talos OS for Advanced Kubernetes Networking</title>
    <link>https://www.itguyjournals.com/installing-cilium-and-multus-on-talos-os-for-advanced-kubernetes-networking/</link>
    <pubDate>Tue, 05 Aug 2025 15:25:19 &#43;0100</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/installing-cilium-and-multus-on-talos-os-for-advanced-kubernetes-networking/</guid>
    <description><![CDATA[<p>In a <a href="../deploying-ha-kubernetes-cluster-with-proxmox-terraform-and-talos-os/" rel="">previous article</a>, we explored deploying a highly available Kubernetes cluster using Talos OS, running on Proxmox and automated with Terraform. That setup provided a clean, immutable base for Kubernetes. However, its default networking stack—based on Flannel and kube-proxy—offers limited capabilities when it comes to modern network observability, performance tuning, or multi-interface pods.</p>
<p>In this guide, we’ll walk through installing <strong>Cilium</strong> as the primary CNI and <strong>Multus</strong> as a secondary CNI meta-plugin on Talos OS. This combination introduces support for advanced features such as <strong>eBPF-powered</strong> networking, per-pod visibility, and attaching pods to multiple physical or logical networks.</p>]]></description>
</item>
<item>
    <title>Deploying a Highly Available Kubernetes Cluster on Proxmox with Terraform and Talos OS</title>
    <link>https://www.itguyjournals.com/deploying-ha-kubernetes-cluster-with-proxmox-terraform-and-talos-os/</link>
    <pubDate>Sat, 02 Aug 2025 12:05:21 &#43;0100</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/deploying-ha-kubernetes-cluster-with-proxmox-terraform-and-talos-os/</guid>
    <description><![CDATA[<p>A highly available Kubernetes cluster in a homelab setup creates opportunities to test distributed systems, automation, and failure recovery under real-world conditions. This guide walks through one approach to building such a cluster using <strong>Proxmox</strong> for virtualization, <strong>Terraform</strong> for provisioning, and <strong>Talos OS</strong> for running the Kubernetes nodes.</p>
<p>This setup provides declarative infrastructure and immutable operating systems, eliminating the need for traditional Linux administration—no SSH, no shell, and no drifting configuration. The result is a consistent, secure, and maintainable cluster architecture suitable for long-term experimentation or light production use.</p>]]></description>
</item>
<item>
    <title>Kubernetes Secrets Management Using Kubernetes Sealed Secrets</title>
    <link>https://www.itguyjournals.com/kubernetes-secrets-management-with-sealed-secrets/</link>
    <pubDate>Thu, 23 May 2024 16:56:47 &#43;0100</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/kubernetes-secrets-management-with-sealed-secrets/</guid>
    <description><![CDATA[<p>Security is a major concern in continuous integration (CI), especially when managing sensitive information like API keys, passwords, and other secrets. For Kubernetes resources, Sealed Secrets offer an effective solution for securely managing sensitive information within your repository. In this blog we will explore what are Sealed Secrets, how to use them and some common management tasks around Sealed Secrets.</p>
<h2 id="what-are-sealed-secrets">What are Sealed Secrets?</h2>
<p>Sealed Secrets is a set of Kubernetes resources, controller and custom resource definition, that enables secure storage of secrets in your version control system (VCS). Unlike standard Kubernetes Secrets, which are base64-encoded and easily decoded, Sealed Secrets use asymmetric encryption to ensure your secrets remain encrypted until deployed to your Kubernetes cluster. Once deployed, the Sealed Secrets controller decrypts them into regular Kubernetes secrets, making them accessible to your applications.</p>]]></description>
</item>
<item>
    <title>Securing Kubernetes Cluster With Cert-Manager And Self-Signed Certificates</title>
    <link>https://www.itguyjournals.com/securing-kubernetes-cluster-with-cert-manager-and-self-signed-certificates/</link>
    <pubDate>Mon, 06 May 2024 16:56:47 &#43;0100</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/securing-kubernetes-cluster-with-cert-manager-and-self-signed-certificates/</guid>
    <description><![CDATA[<p>Kubernetes is an incredible tool for deploying, scaling, and managing containerized applications. One crucial aspect of kubernetes security is ensuring that communication between different entities is secure. By default, kubernetes management network is secure and pod network is handled by 3rd party plugin which mostly support encryption.</p>
<p>Today we will focus on properly securing outside-in web communication to our cluster with Cert-Manager and self-signed certificates. We assume that you have access to working kubernetes cluster with ingress controller.</p>]]></description>
</item>
</channel>
</rss>
