<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Mialdo | Cloud, AI and Infrastructure Consultancy</title><link>https://mialdo.com/</link><description>Recent content on Mialdo | Cloud, AI and Infrastructure Consultancy</description><generator>Hugo</generator><language>en-AU</language><atom:link href="https://mialdo.com/index.xml" rel="self" type="application/rss+xml"/><item><title>What Are Containers and Why Are They Important? (Updated for 2025)</title><link>https://mialdo.com/blog/containers-importance-2025/</link><pubDate>Thu, 08 May 2025 00:00:00 +0000</pubDate><guid>https://mialdo.com/blog/containers-importance-2025/</guid><description>&lt;p&gt;&lt;strong&gt;Originally written in 2019 and updated for 2025 by the author.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With over a decade of hands-on experience in containerisation, from the early Docker betas to managing production workloads on Kubernetes at scale, I have seen firsthand how containers have evolved from a developer novelty into a foundational enterprise technology.&lt;/p&gt;
&lt;p&gt;In 2025, containers are no longer a nice-to-have. They are essential. They enable the agility, portability, and scalability modern applications require. And as businesses migrate to the cloud, containers are often the bridge between legacy systems and modern cloud-native architectures.&lt;/p&gt;</description></item><item><title>Cloud Fundamentals: Getting the Basics Right Before You Scale</title><link>https://mialdo.com/blog/fundamentals/</link><pubDate>Wed, 20 Nov 2024 00:00:00 +0000</pubDate><guid>https://mialdo.com/blog/fundamentals/</guid><description>&lt;p&gt;Every cloud environment we audit has the same gaps. Not in the fancy services, but in the basics. Identity is too permissive. Networking is flat. Resources have no tags. Cost management is an afterthought.&lt;/p&gt;
&lt;h2 id="identity-comes-first"&gt;Identity comes first&lt;/h2&gt;
&lt;p&gt;Before you deploy anything, get your identity right. Microsoft Entra ID (formerly Azure AD) with conditional access, privileged identity management, and RBAC scoped to the narrowest possible level. Not &amp;ldquo;Owner on the subscription.&amp;rdquo;&lt;/p&gt;</description></item><item><title>Securing Private Azure Container Apps with Application Gateway and Bicep Automation</title><link>https://mialdo.com/blog/aks-to-aca-migration-app-gateway-bicep/</link><pubDate>Sat, 15 Jun 2024 00:00:00 +0000</pubDate><guid>https://mialdo.com/blog/aks-to-aca-migration-app-gateway-bicep/</guid><description>&lt;p&gt;This post covers the technical patterns behind our &lt;a href="https://mialdo.com/case-studies/from-aks-overheads-to-cloud-native-freedom/"&gt;Scalene Solutions case study&lt;/a&gt;, focusing on the Bicep automation and Application Gateway configuration.&lt;/p&gt;
&lt;h2 id="the-architecture"&gt;The architecture&lt;/h2&gt;
&lt;p&gt;Azure Container Apps run inside a private VNet with no public endpoints. All inbound traffic routes through Azure Application Gateway, which provides WAF protection, SSL termination, and host-based routing.&lt;/p&gt;
&lt;p&gt;This gives you the simplicity of Container Apps with the security posture of a properly segmented network.&lt;/p&gt;
&lt;h2 id="bicep-loop-patterns"&gt;Bicep loop patterns&lt;/h2&gt;
&lt;p&gt;The key insight is that Application Gateway configuration is highly repetitive. Every microservice needs a backend pool, an HTTP listener, a health probe, and a routing rule. Instead of writing these individually, we use Bicep&amp;rsquo;s &lt;code&gt;for&lt;/code&gt; loops against a parameter array.&lt;/p&gt;</description></item><item><title>From AKS overheads to cloud-native freedom with Azure Container Apps</title><link>https://mialdo.com/case-studies/from-aks-overheads-to-cloud-native-freedom/</link><pubDate>Mon, 20 May 2024 00:00:00 +0000</pubDate><guid>https://mialdo.com/case-studies/from-aks-overheads-to-cloud-native-freedom/</guid><description>Scalene Solutions needed to reduce the operational burden of running Kubernetes while maintaining enterprise-grade security for their retail intelligence platform. We audited their Azure environment, redesigned the architecture using the Well-Architected Framework, and migrated workloads from AKS to Azure Container Apps with full Bicep automation.</description></item></channel></rss>