Kubernetes Network Policies made easy on GKE At Vamp our trial clusters present a harsh security challenge. To secure them, we make extensive use of Kubernetes network policies, which are powerful, but difficult to configure and debug. Til now!
Kubernetes Securing Ingress Services in Istio with Let’s Encrypt on Kubernetes This is the third post in our series describing our experiences in adopting Istio for traffic routing on Kubernetes. For more details on what we are trying to achieve with Vamp Lamia and