
Sign up to save your podcasts
Or


Send us a text
Former Navy Engineman Scott W Houghton transforms a real pirate attack on the USS Ashland into the most memorable Kubernetes lesson you'll ever hear. Drawing from his experience during the April 10, 2010 engagement in the Gulf of Aden, Scott parallels naval operations with container orchestration, making complex DevSecOps concepts crystal clear through military analogies.
Episode Highlights:
Timestamps
[00:00:00] Cold Open - USS Ashland under attack [00:01:00] Introduction - What is Kubernetes? [00:02:00] Naval Engineering 101 - Setting the stage [00:03:00] The Pirate Attack - April 10, 2010 [00:05:00] General Quarters - Rolling updates in action [00:07:00] Node Structure - Divisions and departments [00:08:00] EOSS - Your Infrastructure as Code [00:09:00] Observability - Watch logs and monitoring [00:10:00] Chaos Engineering - Drilling for failure [00:11:00] Service Mesh - Sound-powered phones analogy [00:12:00] Defense in Depth - Layered security [00:13:00] Faith Application - Romans 8:28 [00:14:00] Practical Implementation - Namespaces and labels [00:15:00] ConfigMaps, Secrets, and Helm [00:16:00] Incident Response - After-action reviews [00:17:00] Not heroics, but discipline [00:18:00] Ship longevity and cluster management [00:19:00] Five practical takeaways [00:20:00] Closing thoughts on discipline [00:21:00] Next episode preview
Key Takeaways
Technical Concepts Covered
Resources Mentioned
Military-to-Tech Parallels
Episode Notes
This episode contains descriptions of military combat. Weapon specifics reflect firsthand shipboard experience. Official Navy releases for April 10, 2010 confirmed the engagement but did not s
Connect: IG/TikTok/FB/TruthSocial: @FaithFreedomTech | X: @faithft_podcast | FaithFreedomTech.com | Email: [email protected]
By Scott W HoughtonSend us a text
Former Navy Engineman Scott W Houghton transforms a real pirate attack on the USS Ashland into the most memorable Kubernetes lesson you'll ever hear. Drawing from his experience during the April 10, 2010 engagement in the Gulf of Aden, Scott parallels naval operations with container orchestration, making complex DevSecOps concepts crystal clear through military analogies.
Episode Highlights:
Timestamps
[00:00:00] Cold Open - USS Ashland under attack [00:01:00] Introduction - What is Kubernetes? [00:02:00] Naval Engineering 101 - Setting the stage [00:03:00] The Pirate Attack - April 10, 2010 [00:05:00] General Quarters - Rolling updates in action [00:07:00] Node Structure - Divisions and departments [00:08:00] EOSS - Your Infrastructure as Code [00:09:00] Observability - Watch logs and monitoring [00:10:00] Chaos Engineering - Drilling for failure [00:11:00] Service Mesh - Sound-powered phones analogy [00:12:00] Defense in Depth - Layered security [00:13:00] Faith Application - Romans 8:28 [00:14:00] Practical Implementation - Namespaces and labels [00:15:00] ConfigMaps, Secrets, and Helm [00:16:00] Incident Response - After-action reviews [00:17:00] Not heroics, but discipline [00:18:00] Ship longevity and cluster management [00:19:00] Five practical takeaways [00:20:00] Closing thoughts on discipline [00:21:00] Next episode preview
Key Takeaways
Technical Concepts Covered
Resources Mentioned
Military-to-Tech Parallels
Episode Notes
This episode contains descriptions of military combat. Weapon specifics reflect firsthand shipboard experience. Official Navy releases for April 10, 2010 confirmed the engagement but did not s
Connect: IG/TikTok/FB/TruthSocial: @FaithFreedomTech | X: @faithft_podcast | FaithFreedomTech.com | Email: [email protected]