TechOps Examples

Hey — It's Govardhana MK 👋

Welcome to another technical edition.

Every Tuesday – You’ll receive a free edition with a byte-size use case, remote job opportunities, top news, tools, and articles.

Every Thursday and Saturday – You’ll receive a special edition with a deep dive use case, remote job opportunities, and articles.

You're spending 40 hours a week writing code that AI could do in 10.

While you're grinding through pull requests, 200k+ engineers at OpenAI, Google & Meta are using AI to ship faster. How?

  • AI coding techniques used by top engineers at top companies

  • Tools and workflows that cut your coding time in half

  • Tech insights that keep you 6 months ahead

This guide shows you how to build production-ready AI agents.

🔴 Have a remote role you'd like to get in front of 55,000+ DevOps and Cloud Practitioners? Start Hiring Here →

🧠 DEEP DIVE USE CASE

How to Protect Kubernetes Workloads from Pod Escape

Pod escape is one of the most critical risks in Kubernetes. It happens when an attacker breaks out of a container and gains access to the underlying host. From there, the blast radius expands fast, moving from a single Pod to the entire node, and eventually the cluster.

In a real attack flow, it begins inside a single compromised Pod.

Typical attack vector:

  • Change identity

  • Change permissions (user impersonation)

  • Retrieve or issue a service account token

  • Execute code on PODs

  • Move PODs from one node to another

Logical Isolation with Namespaces

The first and most effective way to limit blast radius is namespace isolation. Namespaces are Kubernetes’ built-in logical partitions, they act like virtual clusters inside a single physical cluster.

In the Namespaces diagram above, you can see a clean separation:

  • Dev Namespace (green border) contains only pod:dev workloads.

  • Prod Namespace (yellow border) contains only pod:prod workloads.

Pods in the Dev namespace have no default visibility into Prod resources (and vice versa). This prevents a compromised dev workload from directly reaching production services, ConfigMaps, or Secrets, even if the attacker escapes the container.

Pro tip: Always label your Pods and use networkpolicies + namespace selectors to enforce this isolation at the network layer too.

Not All Namespaces Are Equal

Kubernetes ships with four immortal namespaces that cannot be deleted (they are core to cluster operation). Everything else is user created and fully under your control.

Immortal Namespaces (system owned):

  • default – Never run production workloads here.

  • kube-system – Core components (etcd, kube-proxy, CoreDNS). Highly privileged.

  • kube-public – Publicly readable.

  • kube-node-lease – Node heartbeats.

User Created Namespaces (your responsibility):

  • dev, prod, logging, ingress-nginx, etc.

Security rule of thumb:

Deploy application workloads only in user created namespaces. Keep kube-system and default strictly off limits for user Pods. This alone stops many privilege escalation paths that rely on the default namespace’s broader permissions.

🔴 Get my DevOps & Kubernetes ebooks! (free for Premium Club and Personal Tier newsletter subscribers)

Looking to promote your company, product, service, or event to 55,000+ Cloud Native Professionals? Let's work together. Advertise With Us

logo

Upgrade to Paid to read the rest.

Become a paying subscriber to get access to this post and other subscriber-only content.

Upgrade

Paid subscriptions get you:

  • Access to archive of 250+ use cases
  • Deep Dive use case editions (Thursdays and Saturdays)
  • Access to Private Discord Community
  • Invitations to monthly Zoom calls for use case discussions and industry leaders meetups
  • Quarterly 1:1 'Ask Me Anything' power session

Keep Reading