When Metrics Leak Secrets: Kubernetes CTF Lessons

In this blog, I’ll walk you through how I uncovered three hidden flags in a Kubernetes cluster by investigating Grafana, VictoriaMetrics, and VictoriaLogs. Each step highlights a different misconfiguration from weak secret management to metrics leaking sensitive data, to logs revealing too much detail. I’ll also highlight the security lessons learned so you know what to avoid in your own cloud native architecture.

Read More When Metrics Leak Secrets: Kubernetes CTF Lessons

Simplifying Microservices with Istio and Service Mesh Architecture

In this guide, we take a developer-first journey through Istio’s capabilities—sidecar proxies, WASM plugin customization, secure ingress and egress gateways, multi-cluster setups, zero-trust security with mTLS, and real-world traffic management patterns. Using a coffee shop microservices app as our example, we break down abstract concepts into digestible sections and hands-on examples.

Read More Simplifying Microservices with Istio and Service Mesh Architecture