Cilium eBPF networking architecture

Cilium Deep Dive: eBPF Networking for Kubernetes

Kubernetes networking is notoriously complex. CNI plugins, kube-proxy, iptables chains, service meshes — layers upon layers of abstraction that eventually break in ways nobody understands. Cilium changes this. It uses eBPF to move networking logic into the Linux kernel, bypassing iptables entirely. The result: better performance, more visibility, and network policies that actually make sense. This is what I run in my clusters. Let me show you why. What is eBPF? eBPF (extended Berkeley Packet Filter) lets you run sandboxed programs in the Linux kernel without changing kernel source code or loading kernel modules. ...

April 8, 2026 · 7 min read · Tom Meurs
Declarative infrastructure for compliance and certification

Declarative Infrastructure as Compliance Documentation: Talos, NixOS, and Audit-Ready Systems

Compliance audits are painful. Anyone who’s been through ISO 27001 certification knows the drill: weeks of documentation gathering, screenshots of configurations, evidence of change management processes, proof that what you say you do is what you actually do. But here’s something I’ve realized after running declarative infrastructure for years: systems like Talos and NixOS don’t just make infrastructure better — they make compliance dramatically easier. The same properties that make these systems reliable (immutability, reproducibility, auditability) are exactly what auditors want to see. ...

March 23, 2026 · 7 min read · Tom Meurs
Talos Linux immutable Kubernetes operating system

Talos Linux: The Immutable Kubernetes OS That Changed How I Think About Nodes

The first time I tried to SSH into a Talos node, I got nothing. No shell, no connection, no familiar Linux prompt. My immediate reaction was confusion, then mild panic. How am I supposed to debug this thing? That was three years ago. Today, I can’t imagine running Kubernetes on anything else. What is Talos Linux? Talos Linux is a Linux distribution designed specifically for Kubernetes. But calling it a “Linux distribution” undersells how different it is. Talos strips away everything that makes a traditional Linux system… traditional. ...

March 11, 2026 · 7 min read · Tom Meurs
CTF and forensics skills for DevOps engineers

CTF and Forensics Skills That Make You a Better DevOps Engineer

I spend my evenings doing Hack The Box challenges and CTF competitions. Not because I want to become a pentester — I’m happy in platform engineering. But because the skills I learn there make me significantly better at my day job. This isn’t obvious at first. What does pwning a vulnerable web app have to do with running Kubernetes clusters? More than you’d think. Forensics and offensive security train you to think about systems differently. You learn to investigate, to trace, to understand what’s actually happening rather than what should be happening. And that mindset — plus the tooling — is exactly what you need when debugging production issues at 3 AM. ...

February 27, 2026 · 9 min read · Tom Meurs
Zero trust security explained with hotel metaphor

Zero Trust Explained: The Hotel Key Card Metaphor

“So what exactly is this zero trust thing everyone keeps talking about?” I get this question a lot. Usually from managers, executives, or anyone who has to approve security budgets without a technical background. And honestly, most explanations I’ve seen are terrible. They’re either drowning in jargon or so oversimplified they’re useless. So here’s my attempt at a metaphor that actually works. One that I’ve used successfully to explain zero trust to my parents, to executives, and to that one colleague who still thinks the firewall is “the internet box.” ...

February 19, 2026 · 6 min read · Tom Meurs