<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Private Endpoint on Rouke Broersma</title>
    <link>https://67ea45403ad50a0008fd0d16--broersmadev.netlify.app/tags/private-endpoint/</link>
    <description>Recent content in Private Endpoint on Rouke Broersma</description>
    <generator>Hugo -- gohugo.io</generator>
    <managingEditor>rouke@broersma.dev (Rouke Broersma)</managingEditor>
    <webMaster>rouke@broersma.dev (Rouke Broersma)</webMaster>
    <lastBuildDate>Thu, 23 Feb 2023 00:00:00 +0000</lastBuildDate><atom:link href="https://67ea45403ad50a0008fd0d16--broersmadev.netlify.app/tags/private-endpoint/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Approve Private Endpoint Connections</title>
      <link>https://67ea45403ad50a0008fd0d16--broersmadev.netlify.app/approve-private-endpoint-connections/</link>
      <pubDate>Thu, 23 Feb 2023 00:00:00 +0000</pubDate>
      <author>rouke@broersma.dev (Rouke Broersma)</author>
      <guid>https://67ea45403ad50a0008fd0d16--broersmadev.netlify.app/approve-private-endpoint-connections/</guid>
      <description>Managing private endpoint connections - especially across Azure AD tenants - can be a chore. In many cases you will have to do this manually and often you will need elevated permissions. Though usually your deployment pipeline already has sufficient permissions on the resource to approve the endpoint connection, so it would be much more convenient if we could make the approval a part of our desired state config.</description>
    </item>
    
    <item>
      <title>Azure Aks Private Clusters</title>
      <link>https://67ea45403ad50a0008fd0d16--broersmadev.netlify.app/azure-aks-private-clusters/</link>
      <pubDate>Mon, 20 Feb 2023 20:39:47 +0000</pubDate>
      <author>rouke@broersma.dev (Rouke Broersma)</author>
      <guid>https://67ea45403ad50a0008fd0d16--broersmadev.netlify.app/azure-aks-private-clusters/</guid>
      <description>When using Kubernetes it is considered good practice to limit API server access as much as possible. However the default configuration on cloud providers  exposes the API server on the public internet. This is fine when you&amp;rsquo;re giving it a try but once you start using Kubernetes more seriously you will probably want to start locking down access.</description>
    </item>
    
  </channel>
</rss>
