Skip to content

Commit 481e6e2

Browse files
authored
Move blogs - 2025.06 (gardener#673)
* Move blogs - 2025.06 * Moved additional blogs * Updated image name * Updated image name - 2
1 parent f909a9e commit 481e6e2

8 files changed

+1
-1
lines changed

website/blog/2025/06-18-enabling-seamless-ipv4-to-dual-stack-migration-for-kubernetes-clusters-on-gcp.md renamed to website/blog/2025/06/06-18-enabling-seamless-ipv4-to-dual-stack-migration-for-kubernetes-clusters-on-gcp.md

File renamed without changes.

website/blog/2025/06-18-enhanced-extension-management-introducing-autoenable-and-clustercompatibility.md renamed to website/blog/2025/06/06-18-enhanced-extension-management-introducing-autoenable-and-clustercompatibility.md

File renamed without changes.

website/blog/2025/06-18-enhanced-internal-traffic-management-l7-load-balancing-for-kube-apiservers-in-gardener.md renamed to website/blog/2025/06/06-18-enhanced-internal-traffic-management-l7-load-balancing-for-kube-apiservers-in-gardener.md

File renamed without changes.

website/blog/2025/06-18-gardener-enhances-observability-with-opentelemetry-integration-for-logging.md renamed to website/blog/2025/06/06-18-gardener-enhances-observability-with-opentelemetry-integration-for-logging.md

File renamed without changes.

website/blog/2025/06-25-enhancing-meltdown-protection-with-dependency-watchdog-annotations.md renamed to website/blog/2025/06/06-25-enhancing-meltdown-protection-with-dependency-watchdog-annotations.md

File renamed without changes.

website/blog/2025/06-25-improving-credential-management-for-seed-backups.md renamed to website/blog/2025/06/06-25-improving-credential-management-for-seed-backups.md

File renamed without changes.

website/blog/2025/06/06-30-getting-started-with-opentelemetry-on-gardener-shoot-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ To follow along with this guide, you will need:
3232

3333
Here we use a self managed mTLS architecture with an illustration purpose. In a production environment, you would typically use a managed certificate authority (CA) or a service mesh to handle mTLS certificates and encryption. However, there might be cases where you want to have flexibility in authentication and authorization mechanisms, for example, by leveraging Kubernetes RBAC to determine whether a service is authorized to connect to a backend or not. In our illustration, we will use a `kube-rbac-proxy` as a sidecar to the backends, to enforce the mTLS authentication and authorization. The `kube-rbac-proxy` is a reverse proxy that uses Kubernetes RBAC to control access to services, allowing us to define fine-grained access control policies.
3434

35-
![otel-mtls](./images/otel-mTLS-kube-rbac-proxy.png)
35+
![otel-mtls](./images/otel-mtls-kube-rbac-proxy.png)
3636

3737
The `kube-rbac-proxy` extracts the identity of the client (OpenTelemetry collector) from the CommonName (CN) field of the TLS certificate and uses it to perform authorization checks against the Kubernetes API server. This enables fine-grained access control policies based on client identity, ensuring that only authorized clients can connect to the backends.
3838

website/blog/2025/06/images/otel-mTLS-kube-rbac-proxy.png renamed to website/blog/2025/06/images/otel-mtls-kube-rbac-proxy.png

File renamed without changes.

0 commit comments

Comments
 (0)