A highly trained monkey’s blog

18 Apr 2021

Kubernetes remote user authentication using self signed certificates.

Article describing how to certificate based authentication stragety for accessing k8s cluster.
26 Feb 2021

Are you are just hoarding useless data like garbage? A short descriptive intro on selective monitoring.

This article describes how you can implement selective monitoring using Prometheus to make sure only useful data are gathered and visualized.
25 Feb 2021

Why is the total memory use of my Kubernetes worker node always above 90%?

This article describes the difference between free and available memory and why you should not be worried when you K8s cluster node memory usage is always high.
24 Feb 2021

Preserving source IP address in L4 loadbalancer (AWS, DO) using Istio's Envoy Filter and Proxy protocol.

This article shows you how you can preserve source IP address in kubernetes using Proxy protocol and istio's envoy proxy filters.
22 Feb 2021

Envoy proxy running but not ready - AWS EKS Istio

Envoy proxy is NOT ready: config not received from Pilot