-
**Title: "Revolutionize Your Cloud Defense – Unshackle the Power of Security, Unite with AWS and GCP!"**
In an era dominated by cloud computing, understanding and implementing basic network securit…
-
**How to categorize this issue?**
/area ops-productivity
/kind enhancement
**What would you like to be added**:
Now and then we hit occurrences of https://github.com/distribution/distribution/issues…
-
**How to categorize this issue?**
/area usability
/kind cleanup
**What would you like to do**:
In the extension webhooks, we introduced `ObjectSelectors` that target/filter objects having labels, e.…
-
**How to categorize this issue?**
/area disaster-recovery
/area robustness
/kind enhancement
/priority 3
**What would you like to be added**:
For clusters having a single active node (with v…
-
## Summary
Ensure that all aspects of the cluster are covered with a stable and reliable solution
## TODO
- Storage
- [x] Rook ceph
- Networking
- [x] Cilium
- [x] External D…
-
**What happened**:
This could be a possible dupe of #175 #100, we're seeing issues with long lived connections being dropped (return traffic not being allowed). Current example is the Grafana-O…
-
## Cilium Feature Proposal
**Is your proposed feature related to a problem?**
The current landscape of network security, especially in Kubernetes environments, necessitates a granular le…
-
Your plan to use a cloud-based VM with a proxy server to provide an intermediary IP address instead of your actual WAN IP is indeed a good approach for maintaining privacy and security. Here's a break…
-
### Terraform Version
```shell
Any terraform version
```
### Use Cases
As companies grow/environments grow, it is relevant to create generic modules to orchestrate end-to-end provisioning o…
-
Your plan to use a cloud-based VM with a proxy server to provide an intermediary IP address instead of your actual WAN IP is indeed a good approach for maintaining privacy and security. Here's a break…