Company
Date Published
Author
Ben Holmes
Word count
3803
Language
English
Hacker News points
None

Summary

Boundary` is a cloud-hosted identity-aware proxy that simplifies and secures least-privileged access to cloud infrastructure. It's an alternative to traditional Kubernetes Ingress Controllers, enabling secure external access to application content and components without compromising the security of either the platform or the application. By using `Boundary`, developers can create a Zero Trust architecture for their applications, ensuring that only authorized users have access to sensitive resources. The approach uses a self-managed deployment of Red Hat's OpenShift Container Platform as the Kubernetes platform, and HashiCorp Boundary to enable secure, controlled ingress to workloads hosted on Kubernetes. The `Boundary` worker is configured using a container image and a configuration file in the HashiCorp Configuration Language (HCL), which is presented to the running container in its Pod as a Kubernetes ConfigMap. This allows for easy deployment and management of `Boundary` workers within a Kubernetes cluster, improving the security posture of application content and components hosted within Kubernetes.