<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Infrastructure as Code |</title><link>https://example.com/tags/infrastructure-as-code/</link><atom:link href="https://example.com/tags/infrastructure-as-code/index.xml" rel="self" type="application/rss+xml"/><description>Infrastructure as Code</description><generator>HugoBlox Kit (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Wed, 28 Jan 2026 00:00:00 +0000</lastBuildDate><image><url>https://example.com/media/icon_hu_da05098ef60dc2e7.png</url><title>Infrastructure as Code</title><link>https://example.com/tags/infrastructure-as-code/</link></image><item><title>Cloud Native Architecture: Zero-Trust Bare Metal Kubernetes</title><link>https://example.com/projects/whatsapp-chatbot/</link><pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate><guid>https://example.com/projects/whatsapp-chatbot/</guid><description>&lt;p&gt;An ongoing, 10-phase infrastructure build demonstrating modern DevSecOps principles. This active laboratory project is transforming bare-metal hardware into a highly available, self-healing, and secure Kubernetes environment using GitOps methodologies.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;p&gt;I wanted to move beyond simple cloud provider tutorials and understand how the underlying compute layers actually work. I engineered this cluster to enforce zero-trust security and eliminate manual configuration drift, proving that enterprise-grade automation can be built from bare metal using virtualization, secure tunneling, and GitOps.&lt;/p&gt;
&lt;h2 id="infrastructure-capabilities"&gt;Infrastructure Capabilities&lt;/h2&gt;
&lt;h3 id="1-virtualized-compute--zero-trust-access"&gt;1. Virtualized Compute &amp;amp; Zero-Trust Access&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;KVM Hypervisor&lt;/strong&gt; - Ubuntu guest virtual machine running efficiently on a bare-metal Kali Linux host.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Tailscale Mesh VPN&lt;/strong&gt; - Hardened, zero-trust SSH access tunnel completely isolating the host from the public internet.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Declarative Provisioning&lt;/strong&gt; - Utilizing OpenTofu to dynamically provision and manage the infrastructure state.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="2-container-orchestration--networking"&gt;2. Container Orchestration &amp;amp; Networking&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;K3s Orchestration&lt;/strong&gt; - Lightweight, highly available Kubernetes deployment.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dynamic Ingress&lt;/strong&gt; - Traefik configured as the primary ingress controller to manage robust routing and load balancing.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="3-cicd--gitops"&gt;3. CI/CD &amp;amp; GitOps&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Continuous Integration&lt;/strong&gt; - GitHub Actions automates the building and pushing of Docker images for immutable rollbacks.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ArgoCD Synchronization&lt;/strong&gt; - Cluster state is bound directly to the Git repository using Helm and Kustomize.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Manual Drift&lt;/strong&gt; - ArgoCD automatically detects and overwrites any manual changes, enforcing strict GitOps compliance.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="4-secret-management"&gt;4. Secret Management&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;HashiCorp Vault&lt;/strong&gt; - Centralized, encrypted storage for all sensitive credentials and API keys.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;External Secrets Operator (ESO)&lt;/strong&gt; - Dynamically injects Vault secrets directly into Kubernetes pods.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="system-architecture"&gt;System Architecture&lt;/h2&gt;
&lt;pre&gt;&lt;code&gt;┌─────────────────┐ (Builds Docker Image) ┌───────────────────────┐
│ GitHub Actions │────────────────────────────▶│ Container Registry │
│ (CI Pipeline) │ │ (GHCR / Hub) │
└─────────────────┘ └───────────────────────┘
│ │
│ (Updates Manifests) │ (Pulls Image)
▼ ▼
┌──────────────┐ ┌───────────────┐ ┌───────────────────────┐
│ │ │ │ │ Kubernetes (K3s) │
│ Git Repo │────▶│ ArgoCD │────▶│ ┌───────────────────┐ │
│ (Manifests) │ │ (Controller) │ │ │ Traefik Ingress │ │
│ │ │ │ │ └───────────────────┘ │
└──────────────┘ └───────────────┘ │ ┌───────────────────┐ │
│ │ k3s-whatsapp-bot │ │
┌──────────────┐ ┌───────────────┐ │ │ (n8n + Postgres) │ │
│ │ │ External │ │ └───────────────────┘ │
│ HashiCorp │◀────│ Secrets │◀────│ ┌───────────────────┐ │
│ Vault │ │ Operator │ │ │ ESO Injector │ │
│ │ │ │ │ └───────────────────┘ │
└──────────────┘ └───────────────┘ └───────────────────────┘
[ Infrastructure: KVM Ubuntu Guest on Kali Metal | Secured via Tailscale ]
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="engineering-outcomes"&gt;Engineering Outcomes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;🚀 &lt;strong&gt;Full CI/CD&lt;/strong&gt;: 100% automated pipeline from code push (GitHub Actions) to cluster synchronization (ArgoCD).&lt;/li&gt;
&lt;li&gt;🔒 &lt;strong&gt;Security&lt;/strong&gt;: Host isolated via Tailscale; zero hardcoded secrets via Vault and ESO.&lt;/li&gt;
&lt;li&gt;📉 &lt;strong&gt;Configuration Drift&lt;/strong&gt;: Reduced to 0% through strict ArgoCD reconciliation loops.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="technical-deep-dives-architecture-series"&gt;Technical Deep Dives (Architecture Series)&lt;/h2&gt;
&lt;p&gt;To explore the raw code, YAML manifests, and how I solved specific architectural challenges across the lifecycle, read my detailed engineering write-ups:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;📝 &lt;strong&gt;
&lt;/strong&gt; - &lt;em&gt;Deep dive into Phases 1-4: Virtualizing Ubuntu on Kali via KVM, Tailscale SSH tunnels, and OpenTofu provisioning.&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;📝 &lt;strong&gt;
&lt;/strong&gt; - &lt;em&gt;Deep dive into Phases 5-6: Docker builds via GitHub Actions, Helm/ArgoCD drift elimination, and Vault/ESO injection.&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;📝 &lt;strong&gt;
&lt;/strong&gt; (Coming Soon) - &lt;em&gt;Deep dive into Phases 7-8: Cloudflare Tunnels and Prometheus/Grafana telemetry.&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;📝 &lt;strong&gt;
&lt;/strong&gt; (Coming Soon) - &lt;em&gt;Deep dive into Phases 9-10: Executing automated attack paths against the cluster and Building a SIEM alerting pipeline.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="the-10-phase-engineering-roadmap"&gt;The 10-Phase Engineering Roadmap&lt;/h2&gt;
&lt;p&gt;This cluster is designed as a living DevSecOps laboratory. I am currently executing Phase 7 of a comprehensive, capability-driven lifecycle.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Stage I: The Compute Foundation (✅ Completed)&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;✅ &lt;strong&gt;Phase 1: Base Hypervisor&lt;/strong&gt; - Bare-metal Kali Linux hosting KVM.&lt;/li&gt;
&lt;li&gt;✅ &lt;strong&gt;Phase 2: Virtualization &amp;amp; Access&lt;/strong&gt; - OpenTofu provisioning of the Ubuntu guest and zero-trust Tailscale SSH tunneling.&lt;/li&gt;
&lt;li&gt;✅ &lt;strong&gt;Phase 3: Container Orchestration&lt;/strong&gt; - High-availability K3s cluster bootstrapping.&lt;/li&gt;
&lt;li&gt;✅ &lt;strong&gt;Phase 4: Edge Routing&lt;/strong&gt; - Dynamic ingress and load balancing via Traefik.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Stage II: Automation &amp;amp; Zero-Trust (✅ Completed)&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;✅ &lt;strong&gt;Phase 5: CI/CD Pipeline&lt;/strong&gt; - GitHub Actions building Docker images and ArgoCD/Helm synchronizing the GitOps state.&lt;/li&gt;
&lt;li&gt;✅ &lt;strong&gt;Phase 6: Ephemeral Secrets&lt;/strong&gt; - Zero-trust credential injection via HashiCorp Vault and ESO.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Stage III: Perimeter Defense &amp;amp; Observability (⏳ In Progress)&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;⏳ &lt;strong&gt;Phase 7: Zero-Trust Perimeter&lt;/strong&gt; - Integrating Cloudflare Tunnels for unexposed, secure ingress.&lt;/li&gt;
&lt;li&gt;⏳ &lt;strong&gt;Phase 8: Full-Stack Telemetry&lt;/strong&gt; - Deploying Prometheus &amp;amp; Grafana for cluster observability.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Stage IV: Purple Teaming Laboratory (📅 Planned)&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;📅 &lt;strong&gt;Phase 9: Offensive Simulation (Red)&lt;/strong&gt; - Executing automated attack paths against the cluster to validate resilience.&lt;/li&gt;
&lt;li&gt;📅 &lt;strong&gt;Phase 10: Threat Detection (Blue)&lt;/strong&gt; - Building a SIEM alerting pipeline to capture the offensive testing telemetry.&lt;/li&gt;
&lt;/ul&gt;</description></item></channel></rss>