<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://techblog.cisco.com/tags/ai/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ai/"/></url><url><loc>https://techblog.cisco.com/authors/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/"/></url><url><loc>https://techblog.cisco.com/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/"/></url><url><loc>https://techblog.cisco.com/blog/democratizing-federated-learning/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/democratizing-federated-learning/"/></url><url><loc>https://techblog.cisco.com/tags/edge/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/edge/"/></url><url><loc>https://techblog.cisco.com/tags/edgecomputing/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/edgecomputing/"/></url><url><loc>https://techblog.cisco.com/tags/federatedlearning/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/federatedlearning/"/></url><url><loc>https://techblog.cisco.com/authors/harshit-daga/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/harshit-daga/"/></url><url><loc>https://techblog.cisco.com/tags/ml/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ml/"/></url><url><loc>https://techblog.cisco.com/authors/myungjin-lee/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/myungjin-lee/"/></url><url><loc>https://techblog.cisco.com/authors/ramana-kompella/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/ramana-kompella/"/></url><url><loc>https://techblog.cisco.com/tags/</loc><lastmod>2021-09-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/"/></url><url><loc>https://techblog.cisco.com/tags/internet-for-the-future/</loc><lastmod>2021-08-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/internet-for-the-future/"/></url><url><loc>https://techblog.cisco.com/authors/jp-vasseur/</loc><lastmod>2021-08-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/jp-vasseur/"/></url><url><loc>https://techblog.cisco.com/blog/towards-a-predictive-internet/</loc><lastmod>2021-08-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/towards-a-predictive-internet/"/></url><url><loc>https://techblog.cisco.com/tags/101/</loc><lastmod>2021-08-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/101/"/></url><url><loc>https://techblog.cisco.com/blog/automated-policy-for-developers-using-cicd/</loc><lastmod>2021-08-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/automated-policy-for-developers-using-cicd/"/></url><url><loc>https://techblog.cisco.com/tags/automation/</loc><lastmod>2021-08-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/automation/"/></url><url><loc>https://techblog.cisco.com/tags/kubernetes/</loc><lastmod>2021-08-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubernetes/"/></url><url><loc>https://techblog.cisco.com/authors/tomer-dvir/</loc><lastmod>2021-08-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/tomer-dvir/"/></url><url><loc>https://techblog.cisco.com/authors/alexei-kravtsov/</loc><lastmod>2021-08-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/alexei-kravtsov/"/></url><url><loc>https://techblog.cisco.com/authors/erez-fishhimer/</loc><lastmod>2021-08-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/erez-fishhimer/"/></url><url><loc>https://techblog.cisco.com/blog/hardening-kubernetes-containers-security-with-seccomp/</loc><lastmod>2021-08-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/hardening-kubernetes-containers-security-with-seccomp/"/></url><url><loc>https://techblog.cisco.com/tags/security/</loc><lastmod>2021-08-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/security/"/></url><url><loc>https://techblog.cisco.com/blog/api-security/</loc><lastmod>2021-07-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/api-security/"/></url><url><loc>https://techblog.cisco.com/tags/api-security/</loc><lastmod>2021-07-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/api-security/"/></url><url><loc>https://techblog.cisco.com/tags/app-first-infrastructures/</loc><lastmod>2021-07-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/app-first-infrastructures/"/></url><url><loc>https://techblog.cisco.com/tags/ci-cd-security/</loc><lastmod>2021-07-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ci-cd-security/"/></url><url><loc>https://techblog.cisco.com/authors/naor-shmuel/</loc><lastmod>2021-07-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/naor-shmuel/"/></url><url><loc>https://techblog.cisco.com/authors/alexei-kravtsov-erez-fishhimer/</loc><lastmod>2021-07-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/alexei-kravtsov-erez-fishhimer/"/></url><url><loc>https://techblog.cisco.com/blog/whats-new-in-k8s-service-mesh-and-implications-to-devops/</loc><lastmod>2021-07-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/whats-new-in-k8s-service-mesh-and-implications-to-devops/"/></url><url><loc>https://techblog.cisco.com/tags/admission/</loc><lastmod>2021-07-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/admission/"/></url><url><loc>https://techblog.cisco.com/authors/m%C3%A1rk-s%C3%A1gi-kaz%C3%A1r/</loc><lastmod>2021-07-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/m%C3%A1rk-s%C3%A1gi-kaz%C3%A1r/"/></url><url><loc>https://techblog.cisco.com/blog/dark-side-of-kubernetes-admission-webhooks/</loc><lastmod>2021-07-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/dark-side-of-kubernetes-admission-webhooks/"/></url><url><loc>https://techblog.cisco.com/tags/webhook/</loc><lastmod>2021-07-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/webhook/"/></url><url><loc>https://techblog.cisco.com/blog/one-tool-to-rule-them-all/</loc><lastmod>2021-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/one-tool-to-rule-them-all/"/></url><url><loc>https://techblog.cisco.com/tags/logging/</loc><lastmod>2021-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/logging/"/></url><url><loc>https://techblog.cisco.com/tags/mcom/</loc><lastmod>2021-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mcom/"/></url><url><loc>https://techblog.cisco.com/tags/monitoring/</loc><lastmod>2021-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/monitoring/"/></url><url><loc>https://techblog.cisco.com/tags/observability/</loc><lastmod>2021-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/observability/"/></url><url><loc>https://techblog.cisco.com/tags/one-eye/</loc><lastmod>2021-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/one-eye/"/></url><url><loc>https://techblog.cisco.com/authors/sandor-guba/</loc><lastmod>2021-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/sandor-guba/"/></url><url><loc>https://techblog.cisco.com/blog/ai-2.0-episode-1/</loc><lastmod>2021-07-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/ai-2.0-episode-1/"/></url><url><loc>https://techblog.cisco.com/authors/dmitry-goloubew/</loc><lastmod>2021-07-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/dmitry-goloubew/"/></url><url><loc>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-3/</loc><lastmod>2021-07-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-3/"/></url><url><loc>https://techblog.cisco.com/authors/enzo-fenoglio/</loc><lastmod>2021-07-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/enzo-fenoglio/"/></url><url><loc>https://techblog.cisco.com/authors/frank-brockners/</loc><lastmod>2021-07-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/frank-brockners/"/></url><url><loc>https://techblog.cisco.com/authors/hugo-latapie/</loc><lastmod>2021-07-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/hugo-latapie/"/></url><url><loc>https://techblog.cisco.com/tags/iot/</loc><lastmod>2021-07-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/iot/"/></url><url><loc>https://techblog.cisco.com/tags/networking/</loc><lastmod>2021-07-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/networking/"/></url><url><loc>https://techblog.cisco.com/tags/aws/</loc><lastmod>2021-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/aws/"/></url><url><loc>https://techblog.cisco.com/blog/data-migration-from-mariadb-to-redshift-using-aws-data-migration-service-dms/</loc><lastmod>2021-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/data-migration-from-mariadb-to-redshift-using-aws-data-migration-service-dms/"/></url><url><loc>https://techblog.cisco.com/tags/data-migration-service/</loc><lastmod>2021-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/data-migration-service/"/></url><url><loc>https://techblog.cisco.com/tags/mariadb/</loc><lastmod>2021-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mariadb/"/></url><url><loc>https://techblog.cisco.com/tags/redshift/</loc><lastmod>2021-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/redshift/"/></url><url><loc>https://techblog.cisco.com/authors/shiv-deshmukh/</loc><lastmod>2021-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/shiv-deshmukh/"/></url><url><loc>https://techblog.cisco.com/authors/ali-payani/</loc><lastmod>2021-06-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/ali-payani/"/></url><url><loc>https://techblog.cisco.com/blog/explaining-explainable-ai-in-fintech-world/</loc><lastmod>2021-06-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/explaining-explainable-ai-in-fintech-world/"/></url><url><loc>https://techblog.cisco.com/tags/future-of-work/</loc><lastmod>2021-06-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/future-of-work/"/></url><url><loc>https://techblog.cisco.com/blog/access-s3-data-in-amazon-redshift-using-redshift-spectrum/</loc><lastmod>2021-06-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/access-s3-data-in-amazon-redshift-using-redshift-spectrum/"/></url><url><loc>https://techblog.cisco.com/tags/redshift-spectrum/</loc><lastmod>2021-06-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/redshift-spectrum/"/></url><url><loc>https://techblog.cisco.com/authors/sanjeev-mervana/</loc><lastmod>2021-06-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/sanjeev-mervana/"/></url><url><loc>https://techblog.cisco.com/blog/what-in-the-world-of-applications/</loc><lastmod>2021-06-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/what-in-the-world-of-applications/"/></url><url><loc>https://techblog.cisco.com/authors/jake-walden/</loc><lastmod>2021-06-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/jake-walden/"/></url><url><loc>https://techblog.cisco.com/blog/under-armour-at-scalex-spring-2021/</loc><lastmod>2021-06-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/under-armour-at-scalex-spring-2021/"/></url><url><loc>https://techblog.cisco.com/tags/amazon-web-services/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/amazon-web-services/"/></url><url><loc>https://techblog.cisco.com/tags/billing/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/billing/"/></url><url><loc>https://techblog.cisco.com/blog/collaboration-cisco-explores-frontier-data-technologies/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/collaboration-cisco-explores-frontier-data-technologies/"/></url><url><loc>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-2/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-2/"/></url><url><loc>https://techblog.cisco.com/authors/kevin-coss/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/kevin-coss/"/></url><url><loc>https://techblog.cisco.com/tags/nlp/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/nlp/"/></url><url><loc>https://techblog.cisco.com/tags/ocr/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ocr/"/></url><url><loc>https://techblog.cisco.com/blog/protecting-personal-identifiable-information-with-lexnlp/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/protecting-personal-identifiable-information-with-lexnlp/"/></url><url><loc>https://techblog.cisco.com/blog/simplifying-account-based-billing-through-aws-organizational-setup/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/simplifying-account-based-billing-through-aws-organizational-setup/"/></url><url><loc>https://techblog.cisco.com/authors/suryakanta-mohapatra/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/suryakanta-mohapatra/"/></url><url><loc>https://techblog.cisco.com/authors/sushama-shroff/</loc><lastmod>2021-05-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/sushama-shroff/"/></url><url><loc>https://techblog.cisco.com/authors/alireza-shabani/</loc><lastmod>2021-05-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/alireza-shabani/"/></url><url><loc>https://techblog.cisco.com/tags/cloud-computing/</loc><lastmod>2021-05-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cloud-computing/"/></url><url><loc>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-1/</loc><lastmod>2021-05-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-1/"/></url><url><loc>https://techblog.cisco.com/blog/photonics-will-shape-the-future-of-large-scale-quantum-computers/</loc><lastmod>2021-05-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/photonics-will-shape-the-future-of-large-scale-quantum-computers/"/></url><url><loc>https://techblog.cisco.com/tags/planet-scale/</loc><lastmod>2021-05-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/planet-scale/"/></url><url><loc>https://techblog.cisco.com/tags/quantum-computing/</loc><lastmod>2021-05-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/quantum-computing/"/></url><url><loc>https://techblog.cisco.com/authors/james-walker/</loc><lastmod>2021-05-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/james-walker/"/></url><url><loc>https://techblog.cisco.com/tags/low-code/</loc><lastmod>2021-05-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/low-code/"/></url><url><loc>https://techblog.cisco.com/tags/low-code-development/</loc><lastmod>2021-05-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/low-code-development/"/></url><url><loc>https://techblog.cisco.com/tags/low-code-platform/</loc><lastmod>2021-05-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/low-code-platform/"/></url><url><loc>https://techblog.cisco.com/tags/mobile-app-development/</loc><lastmod>2021-05-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mobile-app-development/"/></url><url><loc>https://techblog.cisco.com/tags/open-source/</loc><lastmod>2021-05-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/open-source/"/></url><url><loc>https://techblog.cisco.com/blog/the-options-and-opportunities-for-open-source-low-code-mobile-app-development/</loc><lastmod>2021-05-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/the-options-and-opportunities-for-open-source-low-code-mobile-app-development/"/></url><url><loc>https://techblog.cisco.com/blog/ai-ethics-listening-to-stakeholder/</loc><lastmod>2021-05-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/ai-ethics-listening-to-stakeholder/"/></url><url><loc>https://techblog.cisco.com/authors/kenneth-r-fleischmann/</loc><lastmod>2021-05-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/kenneth-r-fleischmann/"/></url><url><loc>https://techblog.cisco.com/tags/aws-datasync/</loc><lastmod>2021-05-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/aws-datasync/"/></url><url><loc>https://techblog.cisco.com/tags/data-sync/</loc><lastmod>2021-05-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/data-sync/"/></url><url><loc>https://techblog.cisco.com/blog/transferring-data-with-aws-data-sync/</loc><lastmod>2021-05-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/transferring-data-with-aws-data-sync/"/></url><url><loc>https://techblog.cisco.com/blog/mitre-security-framework-containers-kubernetes/</loc><lastmod>2021-05-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/mitre-security-framework-containers-kubernetes/"/></url><url><loc>https://techblog.cisco.com/authors/ariel-shuper/</loc><lastmod>2021-05-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/ariel-shuper/"/></url><url><loc>https://techblog.cisco.com/tags/attck-framework/</loc><lastmod>2021-05-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/attck-framework/"/></url><url><loc>https://techblog.cisco.com/tags/attck-matrix/</loc><lastmod>2021-05-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/attck-matrix/"/></url><url><loc>https://techblog.cisco.com/tags/cis-benchmark/</loc><lastmod>2021-05-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cis-benchmark/"/></url><url><loc>https://techblog.cisco.com/tags/mitre-attck/</loc><lastmod>2021-05-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mitre-attck/"/></url><url><loc>https://techblog.cisco.com/tags/cloud-native/</loc><lastmod>2021-05-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cloud-native/"/></url><url><loc>https://techblog.cisco.com/authors/giles-heron/</loc><lastmod>2021-05-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/giles-heron/"/></url><url><loc>https://techblog.cisco.com/blog/introducing-media-streaming-mesh/</loc><lastmod>2021-05-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/introducing-media-streaming-mesh/"/></url><url><loc>https://techblog.cisco.com/tags/media-streaming-mesh/</loc><lastmod>2021-05-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/media-streaming-mesh/"/></url><url><loc>https://techblog.cisco.com/tags/istio/</loc><lastmod>2021-04-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/istio/"/></url><url><loc>https://techblog.cisco.com/authors/laszlo-bence-nagy/</loc><lastmod>2021-04-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/laszlo-bence-nagy/"/></url><url><loc>https://techblog.cisco.com/tags/service-mesh/</loc><lastmod>2021-04-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/service-mesh/"/></url><url><loc>https://techblog.cisco.com/blog/istio-1.9/</loc><lastmod>2021-04-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-1.9/"/></url><url><loc>https://techblog.cisco.com/blog/maejong-internship/</loc><lastmod>2021-04-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/maejong-internship/"/></url><url><loc>https://techblog.cisco.com/authors/maegan-jong/</loc><lastmod>2021-04-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/maegan-jong/"/></url><url><loc>https://techblog.cisco.com/blog/exploring-reality-virtual-re-creation-and-monitoring-of-real-world-environments/</loc><lastmod>2021-04-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/exploring-reality-virtual-re-creation-and-monitoring-of-real-world-environments/"/></url><url><loc>https://techblog.cisco.com/tags/motion-capture/</loc><lastmod>2021-04-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/motion-capture/"/></url><url><loc>https://techblog.cisco.com/tags/point-cloud/</loc><lastmod>2021-04-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/point-cloud/"/></url><url><loc>https://techblog.cisco.com/tags/project-tango/</loc><lastmod>2021-04-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/project-tango/"/></url><url><loc>https://techblog.cisco.com/authors/tal-maoz/</loc><lastmod>2021-04-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/tal-maoz/"/></url><url><loc>https://techblog.cisco.com/tags/unity/</loc><lastmod>2021-04-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/unity/"/></url><url><loc>https://techblog.cisco.com/tags/vr/</loc><lastmod>2021-04-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/vr/"/></url><url><loc>https://techblog.cisco.com/authors/reinhardt-quelle/</loc><lastmod>2021-04-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/reinhardt-quelle/"/></url><url><loc>https://techblog.cisco.com/blog/inclusive-infrastructure/</loc><lastmod>2021-04-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/inclusive-infrastructure/"/></url><url><loc>https://techblog.cisco.com/tags/alerting/</loc><lastmod>2021-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/alerting/"/></url><url><loc>https://techblog.cisco.com/tags/backyards/</loc><lastmod>2021-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/backyards/"/></url><url><loc>https://techblog.cisco.com/tags/health/</loc><lastmod>2021-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/health/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-health-intro/</loc><lastmod>2021-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-health-intro/"/></url><url><loc>https://techblog.cisco.com/tags/augmented-reality/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/augmented-reality/"/></url><url><loc>https://techblog.cisco.com/tags/classification/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/classification/"/></url><url><loc>https://techblog.cisco.com/tags/deep-learning/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/deep-learning/"/></url><url><loc>https://techblog.cisco.com/tags/gpu/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/gpu/"/></url><url><loc>https://techblog.cisco.com/blog/how-we-built-a-domain-specific-natural-language-semantic-parser/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/how-we-built-a-domain-specific-natural-language-semantic-parser/"/></url><url><loc>https://techblog.cisco.com/tags/machine-learning/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/machine-learning/"/></url><url><loc>https://techblog.cisco.com/blog/pc-webcam-object-detection-with-tensorflow2-gpu-training/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pc-webcam-object-detection-with-tensorflow2-gpu-training/"/></url><url><loc>https://techblog.cisco.com/tags/semantic-parsing/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/semantic-parsing/"/></url><url><loc>https://techblog.cisco.com/authors/taiwei-yin/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/taiwei-yin/"/></url><url><loc>https://techblog.cisco.com/tags/tensorflow2/</loc><lastmod>2021-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/tensorflow2/"/></url><url><loc>https://techblog.cisco.com/tags/agile/</loc><lastmod>2021-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/agile/"/></url><url><loc>https://techblog.cisco.com/blog/building-quality-into-agile/</loc><lastmod>2021-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/building-quality-into-agile/"/></url><url><loc>https://techblog.cisco.com/tags/ci-cd-pipeline/</loc><lastmod>2021-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ci-cd-pipeline/"/></url><url><loc>https://techblog.cisco.com/tags/quality-assurance/</loc><lastmod>2021-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/quality-assurance/"/></url><url><loc>https://techblog.cisco.com/tags/sdlc/</loc><lastmod>2021-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/sdlc/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-api-security/</loc><lastmod>2021-02-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-api-security/"/></url><url><loc>https://techblog.cisco.com/blog/what-is-the-tara-report/</loc><lastmod>2021-02-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/what-is-the-tara-report/"/></url><url><loc>https://techblog.cisco.com/authors/dominik-tornow/</loc><lastmod>2021-02-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/dominik-tornow/"/></url><url><loc>https://techblog.cisco.com/blog/inside-k8s-networking-policies/</loc><lastmod>2021-02-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/inside-k8s-networking-policies/"/></url><url><loc>https://techblog.cisco.com/blog/future-of-work-predictions/</loc><lastmod>2021-02-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/future-of-work-predictions/"/></url><url><loc>https://techblog.cisco.com/authors/vijoy-pandey/</loc><lastmod>2021-02-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/vijoy-pandey/"/></url><url><loc>https://techblog.cisco.com/tags/kubernetes-security/</loc><lastmod>2021-01-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubernetes-security/"/></url><url><loc>https://techblog.cisco.com/tags/podsecuritypolicy/</loc><lastmod>2021-01-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/podsecuritypolicy/"/></url><url><loc>https://techblog.cisco.com/blog/understanding-and-applying-kubernetes-pod-security-policy/</loc><lastmod>2021-01-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/understanding-and-applying-kubernetes-pod-security-policy/"/></url><url><loc>https://techblog.cisco.com/blog/inside-k8s-networking/</loc><lastmod>2021-01-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/inside-k8s-networking/"/></url><url><loc>https://techblog.cisco.com/tags/devops/</loc><lastmod>2021-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/devops/"/></url><url><loc>https://techblog.cisco.com/tags/gitops/</loc><lastmod>2021-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/gitops/"/></url><url><loc>https://techblog.cisco.com/tags/integrated/</loc><lastmod>2021-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/integrated/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-next-gen-integrated-services/</loc><lastmod>2021-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-next-gen-integrated-services/"/></url><url><loc>https://techblog.cisco.com/authors/peter-wilcsinszky/</loc><lastmod>2021-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/peter-wilcsinszky/"/></url><url><loc>https://techblog.cisco.com/tags/pipeline/</loc><lastmod>2021-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/pipeline/"/></url><url><loc>https://techblog.cisco.com/blog/iaas/</loc><lastmod>2021-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/iaas/"/></url><url><loc>https://techblog.cisco.com/tags/container-security/</loc><lastmod>2021-01-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/container-security/"/></url><url><loc>https://techblog.cisco.com/blog/realtime-vulnerability-management-containers/</loc><lastmod>2021-01-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/realtime-vulnerability-management-containers/"/></url><url><loc>https://techblog.cisco.com/authors/peter-turi/</loc><lastmod>2021-01-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/peter-turi/"/></url><url><loc>https://techblog.cisco.com/blog/red-alert/</loc><lastmod>2021-01-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/red-alert/"/></url><url><loc>https://techblog.cisco.com/tags/slo/</loc><lastmod>2021-01-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/slo/"/></url><url><loc>https://techblog.cisco.com/blog/quantum-networking/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/quantum-networking/"/></url><url><loc>https://techblog.cisco.com/authors/sam-samuel/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/sam-samuel/"/></url><url><loc>https://techblog.cisco.com/blog/agi/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/agi/"/></url><url><loc>https://techblog.cisco.com/tags/containers-security/</loc><lastmod>2020-12-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/containers-security/"/></url><url><loc>https://techblog.cisco.com/authors/idan-frimark/</loc><lastmod>2020-12-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/idan-frimark/"/></url><url><loc>https://techblog.cisco.com/blog/understanding-and-applying-container-security/</loc><lastmod>2020-12-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/understanding-and-applying-container-security/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-security-for-exposed-workloads/</loc><lastmod>2020-12-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-security-for-exposed-workloads/"/></url><url><loc>https://techblog.cisco.com/tags/kubernetes-vulnerabilities/</loc><lastmod>2020-12-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubernetes-vulnerabilities/"/></url><url><loc>https://techblog.cisco.com/tags/kafka/</loc><lastmod>2020-12-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kafka/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-external-access/</loc><lastmod>2020-12-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-external-access/"/></url><url><loc>https://techblog.cisco.com/tags/koperator/</loc><lastmod>2020-12-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/koperator/"/></url><url><loc>https://techblog.cisco.com/tags/load-balancer/</loc><lastmod>2020-12-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/load-balancer/"/></url><url><loc>https://techblog.cisco.com/tags/nodeport/</loc><lastmod>2020-12-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/nodeport/"/></url><url><loc>https://techblog.cisco.com/tags/supertubes/</loc><lastmod>2020-12-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/supertubes/"/></url><url><loc>https://techblog.cisco.com/authors/toader-sebastian/</loc><lastmod>2020-12-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/toader-sebastian/"/></url><url><loc>https://techblog.cisco.com/blog/mitre-attck-framework-what-is-it-and-does-it-work-for-k8s-environment/</loc><lastmod>2020-12-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/mitre-attck-framework-what-is-it-and-does-it-work-for-k8s-environment/"/></url><url><loc>https://techblog.cisco.com/tags/logging-operator/</loc><lastmod>2020-11-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/logging-operator/"/></url><url><loc>https://techblog.cisco.com/blog/one-eye-release-0.4/</loc><lastmod>2020-11-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/one-eye-release-0.4/"/></url><url><loc>https://techblog.cisco.com/tags/prometheus/</loc><lastmod>2020-11-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/prometheus/"/></url><url><loc>https://techblog.cisco.com/tags/istio-operator/</loc><lastmod>2020-11-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/istio-operator/"/></url><url><loc>https://techblog.cisco.com/blog/istio-1.8/</loc><lastmod>2020-11-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-1.8/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-release-1-5/</loc><lastmod>2020-11-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-release-1-5/"/></url><url><loc>https://techblog.cisco.com/authors/marton-sereg/</loc><lastmod>2020-11-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/marton-sereg/"/></url><url><loc>https://techblog.cisco.com/tags/authorization-policy/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/authorization-policy/"/></url><url><loc>https://techblog.cisco.com/authors/balazs-berta/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/balazs-berta/"/></url><url><loc>https://techblog.cisco.com/authors/balint-molnar/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/balint-molnar/"/></url><url><loc>https://techblog.cisco.com/tags/ksqldb/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ksqldb/"/></url><url><loc>https://techblog.cisco.com/blog/supertubes-ksql/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/supertubes-ksql/"/></url><url><loc>https://techblog.cisco.com/blog/what-is-zero-trust-security/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/what-is-zero-trust-security/"/></url><url><loc>https://techblog.cisco.com/tags/zero-trust-framework/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zero-trust-framework/"/></url><url><loc>https://techblog.cisco.com/tags/zero-trust-model/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zero-trust-model/"/></url><url><loc>https://techblog.cisco.com/tags/zero-trust-network-security/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zero-trust-network-security/"/></url><url><loc>https://techblog.cisco.com/tags/zero-trust-policy/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zero-trust-policy/"/></url><url><loc>https://techblog.cisco.com/tags/zero-trust-security/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zero-trust-security/"/></url><url><loc>https://techblog.cisco.com/tags/zero-trust-security-model/</loc><lastmod>2020-11-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zero-trust-security-model/"/></url><url><loc>https://techblog.cisco.com/blog/rate-monitoring/</loc><lastmod>2020-11-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/rate-monitoring/"/></url><url><loc>https://techblog.cisco.com/tags/elasticsearch/</loc><lastmod>2020-11-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/elasticsearch/"/></url><url><loc>https://techblog.cisco.com/tags/log-restoration/</loc><lastmod>2020-11-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/log-restoration/"/></url><url><loc>https://techblog.cisco.com/tags/s3/</loc><lastmod>2020-11-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/s3/"/></url><url><loc>https://techblog.cisco.com/authors/sandor-lovasz/</loc><lastmod>2020-11-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/sandor-lovasz/"/></url><url><loc>https://techblog.cisco.com/blog/log-restoration/</loc><lastmod>2020-11-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/log-restoration/"/></url><url><loc>https://techblog.cisco.com/tags/arm/</loc><lastmod>2020-11-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/arm/"/></url><url><loc>https://techblog.cisco.com/tags/bank-vaults/</loc><lastmod>2020-11-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/bank-vaults/"/></url><url><loc>https://techblog.cisco.com/blog/bank-vaults-updates/</loc><lastmod>2020-11-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/bank-vaults-updates/"/></url><url><loc>https://techblog.cisco.com/authors/nandor-kracser/</loc><lastmod>2020-11-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/nandor-kracser/"/></url><url><loc>https://techblog.cisco.com/tags/secrets/</loc><lastmod>2020-11-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/secrets/"/></url><url><loc>https://techblog.cisco.com/tags/vault/</loc><lastmod>2020-11-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/vault/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-validation/</loc><lastmod>2020-10-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-validation/"/></url><url><loc>https://techblog.cisco.com/tags/validation/</loc><lastmod>2020-10-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/validation/"/></url><url><loc>https://techblog.cisco.com/authors/zsolt-varga/</loc><lastmod>2020-10-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/zsolt-varga/"/></url><url><loc>https://techblog.cisco.com/tags/fluentd/</loc><lastmod>2020-10-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/fluentd/"/></url><url><loc>https://techblog.cisco.com/blog/tap-into-your-kubernetes-logs-with-logging-operator/</loc><lastmod>2020-10-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/tap-into-your-kubernetes-logs-with-logging-operator/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-supertubes-multi/</loc><lastmod>2020-10-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-supertubes-multi/"/></url><url><loc>https://techblog.cisco.com/authors/sebastian-toader/</loc><lastmod>2020-10-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/sebastian-toader/"/></url><url><loc>https://techblog.cisco.com/tags/burnrate/</loc><lastmod>2020-10-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/burnrate/"/></url><url><loc>https://techblog.cisco.com/blog/defining-your-own-slos-backyards/</loc><lastmod>2020-10-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/defining-your-own-slos-backyards/"/></url><url><loc>https://techblog.cisco.com/tags/kind/</loc><lastmod>2020-10-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kind/"/></url><url><loc>https://techblog.cisco.com/tags/metallb/</loc><lastmod>2020-10-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/metallb/"/></url><url><loc>https://techblog.cisco.com/tags/multi-cluster/</loc><lastmod>2020-10-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/multi-cluster/"/></url><url><loc>https://techblog.cisco.com/blog/multi-cluster-testing/</loc><lastmod>2020-10-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/multi-cluster-testing/"/></url><url><loc>https://techblog.cisco.com/tags/testing/</loc><lastmod>2020-10-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/testing/"/></url><url><loc>https://techblog.cisco.com/blog/burn-rate-demystified/</loc><lastmod>2020-09-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/burn-rate-demystified/"/></url><url><loc>https://techblog.cisco.com/blog/istio-opa/</loc><lastmod>2020-09-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-opa/"/></url><url><loc>https://techblog.cisco.com/tags/opa/</loc><lastmod>2020-09-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/opa/"/></url><url><loc>https://techblog.cisco.com/blog/supertubes-1.0-connect-ui/</loc><lastmod>2020-09-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/supertubes-1.0-connect-ui/"/></url><url><loc>https://techblog.cisco.com/tags/dashboard/</loc><lastmod>2020-09-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dashboard/"/></url><url><loc>https://techblog.cisco.com/tags/kafka-connect/</loc><lastmod>2020-09-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kafka-connect/"/></url><url><loc>https://techblog.cisco.com/tags/ui/</loc><lastmod>2020-09-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ui/"/></url><url><loc>https://techblog.cisco.com/blog/supertubes-focal/</loc><lastmod>2020-09-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/supertubes-focal/"/></url><url><loc>https://techblog.cisco.com/tags/disaster/</loc><lastmod>2020-09-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/disaster/"/></url><url><loc>https://techblog.cisco.com/tags/mirrormaker/</loc><lastmod>2020-09-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mirrormaker/"/></url><url><loc>https://techblog.cisco.com/tags/microsoft/</loc><lastmod>2020-09-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/microsoft/"/></url><url><loc>https://techblog.cisco.com/blog/open-mesh-microsoft-service-mesh/</loc><lastmod>2020-09-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/open-mesh-microsoft-service-mesh/"/></url><url><loc>https://techblog.cisco.com/tags/open-mesh/</loc><lastmod>2020-09-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/open-mesh/"/></url><url><loc>https://techblog.cisco.com/tags/blame/</loc><lastmod>2020-09-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/blame/"/></url><url><loc>https://techblog.cisco.com/blog/what_have_the_kubernetes_ever_done_fo_us/</loc><lastmod>2020-09-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/what_have_the_kubernetes_ever_done_fo_us/"/></url><url><loc>https://techblog.cisco.com/blog/istio-canary-upgrade/</loc><lastmod>2020-09-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-canary-upgrade/"/></url><url><loc>https://techblog.cisco.com/tags/upgrade/</loc><lastmod>2020-09-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/upgrade/"/></url><url><loc>https://techblog.cisco.com/blog/gpu-accelerated-kubernetes/</loc><lastmod>2020-08-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/gpu-accelerated-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/pke/</loc><lastmod>2020-08-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/pke/"/></url><url><loc>https://techblog.cisco.com/blog/ai-beyond-deep-learning/</loc><lastmod>2020-08-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/ai-beyond-deep-learning/"/></url><url><loc>https://techblog.cisco.com/blog/http-proxy-in-the-cloud-native-world/</loc><lastmod>2020-08-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/http-proxy-in-the-cloud-native-world/"/></url><url><loc>https://techblog.cisco.com/tags/k8shield/</loc><lastmod>2020-08-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/k8shield/"/></url><url><loc>https://techblog.cisco.com/tags/kubernetes-native/</loc><lastmod>2020-08-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubernetes-native/"/></url><url><loc>https://techblog.cisco.com/authors/mate-ory/</loc><lastmod>2020-08-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/mate-ory/"/></url><url><loc>https://techblog.cisco.com/tags/on-prem/</loc><lastmod>2020-08-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/on-prem/"/></url><url><loc>https://techblog.cisco.com/blog/k8shield-mitre-attck-framework/</loc><lastmod>2020-08-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8shield-mitre-attck-framework/"/></url><url><loc>https://techblog.cisco.com/tags/proxy/</loc><lastmod>2020-08-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/proxy/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-release-1-4/</loc><lastmod>2020-08-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-release-1-4/"/></url><url><loc>https://techblog.cisco.com/blog/istio-1.7/</loc><lastmod>2020-08-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-1.7/"/></url><url><loc>https://techblog.cisco.com/blog/slo-intro/</loc><lastmod>2020-08-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/slo-intro/"/></url><url><loc>https://techblog.cisco.com/blog/service-mesh-map/</loc><lastmod>2020-08-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/service-mesh-map/"/></url><url><loc>https://techblog.cisco.com/blog/one-eye-3-updates/</loc><lastmod>2020-08-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/one-eye-3-updates/"/></url><url><loc>https://techblog.cisco.com/tags/fips/</loc><lastmod>2020-08-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/fips/"/></url><url><loc>https://techblog.cisco.com/tags/fips-140-2/</loc><lastmod>2020-08-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/fips-140-2/"/></url><url><loc>https://techblog.cisco.com/blog/istio-fips/</loc><lastmod>2020-08-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-fips/"/></url><url><loc>https://techblog.cisco.com/authors/janos-matyas/</loc><lastmod>2020-08-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/janos-matyas/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-try-enterprise/</loc><lastmod>2020-08-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-try-enterprise/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-schemareg/</loc><lastmod>2020-08-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-schemareg/"/></url><url><loc>https://techblog.cisco.com/tags/schema-registry/</loc><lastmod>2020-08-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/schema-registry/"/></url><url><loc>https://techblog.cisco.com/tags/spring-boot/</loc><lastmod>2020-08-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/spring-boot/"/></url><url><loc>https://techblog.cisco.com/tags/api-gateway/</loc><lastmod>2020-08-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/api-gateway/"/></url><url><loc>https://techblog.cisco.com/tags/ingress/</loc><lastmod>2020-08-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ingress/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-api-gateway/</loc><lastmod>2020-08-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-api-gateway/"/></url><url><loc>https://techblog.cisco.com/tags/govcloud/</loc><lastmod>2020-07-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/govcloud/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-aws-gov-cloud/</loc><lastmod>2020-07-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-aws-gov-cloud/"/></url><url><loc>https://techblog.cisco.com/tags/cert-manager/</loc><lastmod>2020-07-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cert-manager/"/></url><url><loc>https://techblog.cisco.com/blog/cert-management-on-istio/</loc><lastmod>2020-07-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/cert-management-on-istio/"/></url><url><loc>https://techblog.cisco.com/authors/szabolcs-berecz/</loc><lastmod>2020-07-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/szabolcs-berecz/"/></url><url><loc>https://techblog.cisco.com/blog/can-you-detect-kubernetes-runtime-vulnerabilities/</loc><lastmod>2020-07-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/can-you-detect-kubernetes-runtime-vulnerabilities/"/></url><url><loc>https://techblog.cisco.com/blog/cert-management-on-kubernetes/</loc><lastmod>2020-07-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/cert-management-on-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/k8s/</loc><lastmod>2020-07-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/k8s/"/></url><url><loc>https://techblog.cisco.com/tags/authorization/</loc><lastmod>2020-07-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/authorization/"/></url><url><loc>https://techblog.cisco.com/blog/istio-authorization-policies/</loc><lastmod>2020-07-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-authorization-policies/"/></url><url><loc>https://techblog.cisco.com/tags/loki/</loc><lastmod>2020-07-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/loki/"/></url><url><loc>https://techblog.cisco.com/blog/proxy-websocket-kubernetes-api-server/</loc><lastmod>2020-07-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/proxy-websocket-kubernetes-api-server/"/></url><url><loc>https://techblog.cisco.com/tags/query/</loc><lastmod>2020-07-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/query/"/></url><url><loc>https://techblog.cisco.com/tags/websocket/</loc><lastmod>2020-07-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/websocket/"/></url><url><loc>https://techblog.cisco.com/tags/authentication/</loc><lastmod>2020-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/authentication/"/></url><url><loc>https://techblog.cisco.com/tags/jwt/</loc><lastmod>2020-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/jwt/"/></url><url><loc>https://techblog.cisco.com/tags/oidc/</loc><lastmod>2020-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/oidc/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-oidc/</loc><lastmod>2020-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-oidc/"/></url><url><loc>https://techblog.cisco.com/blog/vmware-next-level/</loc><lastmod>2020-07-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vmware-next-level/"/></url><url><loc>https://techblog.cisco.com/tags/vmware/</loc><lastmod>2020-07-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/vmware/"/></url><url><loc>https://techblog.cisco.com/tags/vsphere/</loc><lastmod>2020-07-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/vsphere/"/></url><url><loc>https://techblog.cisco.com/tags/corporate-proxy/</loc><lastmod>2020-07-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/corporate-proxy/"/></url><url><loc>https://techblog.cisco.com/tags/external-proxy/</loc><lastmod>2020-07-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/external-proxy/"/></url><url><loc>https://techblog.cisco.com/blog/istio-external-proxy/</loc><lastmod>2020-07-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-external-proxy/"/></url><url><loc>https://techblog.cisco.com/tags/acl/</loc><lastmod>2020-06-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/acl/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-acl/</loc><lastmod>2020-06-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-acl/"/></url><url><loc>https://techblog.cisco.com/blog/one-eye-updates/</loc><lastmod>2020-06-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/one-eye-updates/"/></url><url><loc>https://techblog.cisco.com/tags/cni/</loc><lastmod>2020-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cni/"/></url><url><loc>https://techblog.cisco.com/blog/istio-operator-psp/</loc><lastmod>2020-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-operator-psp/"/></url><url><loc>https://techblog.cisco.com/tags/psp/</loc><lastmod>2020-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/psp/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-nodepool-upgrades/</loc><lastmod>2020-06-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-nodepool-upgrades/"/></url><url><loc>https://techblog.cisco.com/tags/nodepool/</loc><lastmod>2020-06-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/nodepool/"/></url><url><loc>https://techblog.cisco.com/tags/dast/</loc><lastmod>2020-06-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dast/"/></url><url><loc>https://techblog.cisco.com/tags/openapi/</loc><lastmod>2020-06-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/openapi/"/></url><url><loc>https://techblog.cisco.com/blog/auto-dast-openapi/</loc><lastmod>2020-06-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/auto-dast-openapi/"/></url><url><loc>https://techblog.cisco.com/authors/peter-balogh/</loc><lastmod>2020-06-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/peter-balogh/"/></url><url><loc>https://techblog.cisco.com/tags/zaproxy/</loc><lastmod>2020-06-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zaproxy/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-ingress/</loc><lastmod>2020-06-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-ingress/"/></url><url><loc>https://techblog.cisco.com/tags/integrated-services/</loc><lastmod>2020-06-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/integrated-services/"/></url><url><loc>https://techblog.cisco.com/authors/laszlo-puskas/</loc><lastmod>2020-06-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/laszlo-puskas/"/></url><url><loc>https://techblog.cisco.com/blog/security-scan-integrated-service/</loc><lastmod>2020-06-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/security-scan-integrated-service/"/></url><url><loc>https://techblog.cisco.com/tags/security-scan/</loc><lastmod>2020-06-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/security-scan/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-ingress/</loc><lastmod>2020-06-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-ingress/"/></url><url><loc>https://techblog.cisco.com/tags/service-apis/</loc><lastmod>2020-06-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/service-apis/"/></url><url><loc>https://techblog.cisco.com/blog/try-backyards-how-to/</loc><lastmod>2020-06-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/try-backyards-how-to/"/></url><url><loc>https://techblog.cisco.com/tags/bugs/</loc><lastmod>2020-05-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/bugs/"/></url><url><loc>https://techblog.cisco.com/tags/charts/</loc><lastmod>2020-05-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/charts/"/></url><url><loc>https://techblog.cisco.com/tags/helm/</loc><lastmod>2020-05-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/helm/"/></url><url><loc>https://techblog.cisco.com/blog/helm3-the-good-the-bad-and-the-ugly/</loc><lastmod>2020-05-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/helm3-the-good-the-bad-and-the-ugly/"/></url><url><loc>https://techblog.cisco.com/tags/helm3/</loc><lastmod>2020-05-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/helm3/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-release-1-3/</loc><lastmod>2020-05-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-release-1-3/"/></url><url><loc>https://techblog.cisco.com/blog/istio-1.6/</loc><lastmod>2020-05-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-1.6/"/></url><url><loc>https://techblog.cisco.com/tags/declarative/</loc><lastmod>2020-05-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/declarative/"/></url><url><loc>https://techblog.cisco.com/blog/supertubes-kafka-declarative-installer/</loc><lastmod>2020-05-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/supertubes-kafka-declarative-installer/"/></url><url><loc>https://techblog.cisco.com/tags/deployment/</loc><lastmod>2020-05-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/deployment/"/></url><url><loc>https://techblog.cisco.com/tags/installer/</loc><lastmod>2020-05-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/installer/"/></url><url><loc>https://techblog.cisco.com/blog/one-eye-for-observability/</loc><lastmod>2020-05-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/one-eye-for-observability/"/></url><url><loc>https://techblog.cisco.com/blog/declarative-installer/</loc><lastmod>2020-05-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/declarative-installer/"/></url><url><loc>https://techblog.cisco.com/tags/operator/</loc><lastmod>2020-05-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/operator/"/></url><url><loc>https://techblog.cisco.com/tags/terraform/</loc><lastmod>2020-05-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/terraform/"/></url><url><loc>https://techblog.cisco.com/blog/istio-external-demo/</loc><lastmod>2020-05-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-external-demo/"/></url><url><loc>https://techblog.cisco.com/tags/egress/</loc><lastmod>2020-05-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/egress/"/></url><url><loc>https://techblog.cisco.com/blog/simple-is-hard/</loc><lastmod>2020-04-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/simple-is-hard/"/></url><url><loc>https://techblog.cisco.com/blog/bank-vaults-templates/</loc><lastmod>2020-04-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/bank-vaults-templates/"/></url><url><loc>https://techblog.cisco.com/tags/filter/</loc><lastmod>2020-04-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/filter/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-acl-with-istio-mtls/</loc><lastmod>2020-04-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-acl-with-istio-mtls/"/></url><url><loc>https://techblog.cisco.com/tags/mtls/</loc><lastmod>2020-04-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mtls/"/></url><url><loc>https://techblog.cisco.com/tags/wasm/</loc><lastmod>2020-04-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/wasm/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-as-a-service/</loc><lastmod>2020-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-as-a-service/"/></url><url><loc>https://techblog.cisco.com/tags/control-plane/</loc><lastmod>2020-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/control-plane/"/></url><url><loc>https://techblog.cisco.com/authors/gabor-kozma/</loc><lastmod>2020-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/gabor-kozma/"/></url><url><loc>https://techblog.cisco.com/tags/kubernetes-as-a-service/</loc><lastmod>2020-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubernetes-as-a-service/"/></url><url><loc>https://techblog.cisco.com/tags/envoy/</loc><lastmod>2020-04-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/envoy/"/></url><url><loc>https://techblog.cisco.com/blog/envoy-wasm-filter/</loc><lastmod>2020-04-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/envoy-wasm-filter/"/></url><url><loc>https://techblog.cisco.com/blog/istio-mixerless-telemetry/</loc><lastmod>2020-04-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-mixerless-telemetry/"/></url><url><loc>https://techblog.cisco.com/tags/mixerless/</loc><lastmod>2020-04-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mixerless/"/></url><url><loc>https://techblog.cisco.com/tags/telemetry/</loc><lastmod>2020-04-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/telemetry/"/></url><url><loc>https://techblog.cisco.com/tags/container/</loc><lastmod>2020-04-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/container/"/></url><url><loc>https://techblog.cisco.com/tags/kubectl-cp/</loc><lastmod>2020-04-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubectl-cp/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-kubectl-cp-command-to-jeopardize-cloud-based-host-instances/</loc><lastmod>2020-04-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-kubectl-cp-command-to-jeopardize-cloud-based-host-instances/"/></url><url><loc>https://techblog.cisco.com/blog/load-balancing-on-prem/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/load-balancing-on-prem/"/></url><url><loc>https://techblog.cisco.com/tags/service/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/service/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-drill-down/</loc><lastmod>2020-04-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-drill-down/"/></url><url><loc>https://techblog.cisco.com/tags/code-generation/</loc><lastmod>2020-04-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/code-generation/"/></url><url><loc>https://techblog.cisco.com/blog/generating-go-code/</loc><lastmod>2020-04-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/generating-go-code/"/></url><url><loc>https://techblog.cisco.com/tags/go/</loc><lastmod>2020-04-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/go/"/></url><url><loc>https://techblog.cisco.com/tags/kubebuilder/</loc><lastmod>2020-04-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubebuilder/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-on-istio-benefits/</loc><lastmod>2020-03-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-on-istio-benefits/"/></url><url><loc>https://techblog.cisco.com/tags/cost-management/</loc><lastmod>2020-03-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cost-management/"/></url><url><loc>https://techblog.cisco.com/blog/expiration-integrated-service/</loc><lastmod>2020-03-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/expiration-integrated-service/"/></url><url><loc>https://techblog.cisco.com/tags/expiration/</loc><lastmod>2020-03-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/expiration/"/></url><url><loc>https://techblog.cisco.com/authors/%C3%A1d%C3%A1m-dud%C3%A1s/</loc><lastmod>2020-03-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/%C3%A1d%C3%A1m-dud%C3%A1s/"/></url><url><loc>https://techblog.cisco.com/tags/kubei/</loc><lastmod>2020-03-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubei/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-runtime-vulnerabilities-scanner-launch/</loc><lastmod>2020-03-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-runtime-vulnerabilities-scanner-launch/"/></url><url><loc>https://techblog.cisco.com/tags/runtime/</loc><lastmod>2020-03-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/runtime/"/></url><url><loc>https://techblog.cisco.com/tags/vulnerability-scanning/</loc><lastmod>2020-03-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/vulnerability-scanning/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-release-1-2/</loc><lastmod>2020-03-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-release-1-2/"/></url><url><loc>https://techblog.cisco.com/tags/dynamic-configuration/</loc><lastmod>2020-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dynamic-configuration/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-rolling-upgrade/</loc><lastmod>2020-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-rolling-upgrade/"/></url><url><loc>https://techblog.cisco.com/tags/rolling-upgrade/</loc><lastmod>2020-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/rolling-upgrade/"/></url><url><loc>https://techblog.cisco.com/tags/hsm/</loc><lastmod>2020-03-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/hsm/"/></url><url><loc>https://techblog.cisco.com/blog/vault-hsm/</loc><lastmod>2020-03-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-hsm/"/></url><url><loc>https://techblog.cisco.com/blog/istio-operator-1.5/</loc><lastmod>2020-03-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-operator-1.5/"/></url><url><loc>https://techblog.cisco.com/tags/istiod/</loc><lastmod>2020-03-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/istiod/"/></url><url><loc>https://techblog.cisco.com/tags/disaster-recovery/</loc><lastmod>2020-03-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/disaster-recovery/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-disaster-recovery-mm2/</loc><lastmod>2020-03-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-disaster-recovery-mm2/"/></url><url><loc>https://techblog.cisco.com/tags/mirrormaker2/</loc><lastmod>2020-03-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mirrormaker2/"/></url><url><loc>https://techblog.cisco.com/tags/fluentbit/</loc><lastmod>2020-03-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/fluentbit/"/></url><url><loc>https://techblog.cisco.com/blog/logging-operator-v3/</loc><lastmod>2020-03-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/logging-operator-v3/"/></url><url><loc>https://techblog.cisco.com/authors/andras-toth/</loc><lastmod>2020-03-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/andras-toth/"/></url><url><loc>https://techblog.cisco.com/tags/tap/</loc><lastmod>2020-03-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/tap/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-traffic-tap/</loc><lastmod>2020-03-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-traffic-tap/"/></url><url><loc>https://techblog.cisco.com/tags/cloud/</loc><lastmod>2020-02-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cloud/"/></url><url><loc>https://techblog.cisco.com/tags/federation/</loc><lastmod>2020-02-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/federation/"/></url><url><loc>https://techblog.cisco.com/blog/hybrid-cloud-kubernetes/</loc><lastmod>2020-02-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/hybrid-cloud-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/hybridcloud/</loc><lastmod>2020-02-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/hybridcloud/"/></url><url><loc>https://techblog.cisco.com/tags/multi-cloud/</loc><lastmod>2020-02-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/multi-cloud/"/></url><url><loc>https://techblog.cisco.com/blog/vault-webhook-istio/</loc><lastmod>2020-02-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-webhook-istio/"/></url><url><loc>https://techblog.cisco.com/tags/backup/</loc><lastmod>2020-02-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/backup/"/></url><url><loc>https://techblog.cisco.com/tags/csi/</loc><lastmod>2020-02-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/csi/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-disaster-recovery-csi/</loc><lastmod>2020-02-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-disaster-recovery-csi/"/></url><url><loc>https://techblog.cisco.com/tags/snapshot/</loc><lastmod>2020-02-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/snapshot/"/></url><url><loc>https://techblog.cisco.com/blog/kubeflow-deployment/</loc><lastmod>2020-02-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubeflow-deployment/"/></url><url><loc>https://techblog.cisco.com/tags/eks/</loc><lastmod>2020-02-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/eks/"/></url><url><loc>https://techblog.cisco.com/tags/jupyter/</loc><lastmod>2020-02-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/jupyter/"/></url><url><loc>https://techblog.cisco.com/tags/kubeflow/</loc><lastmod>2020-02-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubeflow/"/></url><url><loc>https://techblog.cisco.com/authors/sandor-magyari/</loc><lastmod>2020-02-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/sandor-magyari/"/></url><url><loc>https://techblog.cisco.com/tags/spark/</loc><lastmod>2020-02-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/spark/"/></url><url><loc>https://techblog.cisco.com/tags/tensorflow/</loc><lastmod>2020-02-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/tensorflow/"/></url><url><loc>https://techblog.cisco.com/blog/istio-external-services/</loc><lastmod>2020-02-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-external-services/"/></url><url><loc>https://techblog.cisco.com/authors/tamas-ecsedi/</loc><lastmod>2020-02-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/tamas-ecsedi/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-integrated-services/</loc><lastmod>2020-02-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-integrated-services/"/></url><url><loc>https://techblog.cisco.com/blog/istio-multiple-gateways/</loc><lastmod>2020-02-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-multiple-gateways/"/></url><url><loc>https://techblog.cisco.com/blog/thanos-operator/</loc><lastmod>2020-02-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/thanos-operator/"/></url><url><loc>https://techblog.cisco.com/tags/thanos/</loc><lastmod>2020-02-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/thanos/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-sidecars/</loc><lastmod>2020-02-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-sidecars/"/></url><url><loc>https://techblog.cisco.com/tags/sidecars/</loc><lastmod>2020-02-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/sidecars/"/></url><url><loc>https://techblog.cisco.com/blog/vault-backup-velero/</loc><lastmod>2020-02-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-backup-velero/"/></url><url><loc>https://techblog.cisco.com/tags/restore/</loc><lastmod>2020-02-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/restore/"/></url><url><loc>https://techblog.cisco.com/tags/velero/</loc><lastmod>2020-02-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/velero/"/></url><url><loc>https://techblog.cisco.com/blog/istio-mtls/</loc><lastmod>2020-01-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-mtls/"/></url><url><loc>https://techblog.cisco.com/blog/multi-cluster-monitoring/</loc><lastmod>2020-01-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/multi-cluster-monitoring/"/></url><url><loc>https://techblog.cisco.com/tags/benchmark/</loc><lastmod>2020-01-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/benchmark/"/></url><url><loc>https://techblog.cisco.com/tags/infrastructure/</loc><lastmod>2020-01-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/infrastructure/"/></url><url><loc>https://techblog.cisco.com/tags/optimization/</loc><lastmod>2020-01-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/optimization/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-infra-sizing/</loc><lastmod>2020-01-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-infra-sizing/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-release-1-1/</loc><lastmod>2020-01-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-release-1-1/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-cluster-logging/</loc><lastmod>2020-01-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-cluster-logging/"/></url><url><loc>https://techblog.cisco.com/blog/vault-multi-datacenter/</loc><lastmod>2020-01-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-multi-datacenter/"/></url><url><loc>https://techblog.cisco.com/tags/client-go/</loc><lastmod>2020-01-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/client-go/"/></url><url><loc>https://techblog.cisco.com/tags/crd/</loc><lastmod>2020-01-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/crd/"/></url><url><loc>https://techblog.cisco.com/blog/zero-touch-authentication-on-kubernetes/</loc><lastmod>2020-01-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/zero-touch-authentication-on-kubernetes/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-multicluster-istio/</loc><lastmod>2020-01-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-multicluster-istio/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-envoy-protocol-filter/</loc><lastmod>2019-12-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-envoy-protocol-filter/"/></url><url><loc>https://techblog.cisco.com/tags/protocol-filter/</loc><lastmod>2019-12-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/protocol-filter/"/></url><url><loc>https://techblog.cisco.com/blog/istio-sidecar/</loc><lastmod>2019-12-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-sidecar/"/></url><url><loc>https://techblog.cisco.com/tags/sidecar/</loc><lastmod>2019-12-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/sidecar/"/></url><url><loc>https://techblog.cisco.com/blog/logging-operator-monitoring/</loc><lastmod>2019-12-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/logging-operator-monitoring/"/></url><url><loc>https://techblog.cisco.com/blog/istio-traffic-mgmt/</loc><lastmod>2019-12-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-traffic-mgmt/"/></url><url><loc>https://techblog.cisco.com/tags/traffic-management/</loc><lastmod>2019-12-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/traffic-management/"/></url><url><loc>https://techblog.cisco.com/tags/traffic-routing/</loc><lastmod>2019-12-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/traffic-routing/"/></url><url><loc>https://techblog.cisco.com/blog/bring-your-own-kubernetes/</loc><lastmod>2019-11-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/bring-your-own-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/multicloud/</loc><lastmod>2019-11-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/multicloud/"/></url><url><loc>https://techblog.cisco.com/blog/istio-auto-mtls/</loc><lastmod>2019-11-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-auto-mtls/"/></url><url><loc>https://techblog.cisco.com/blog/kubecon-san-diego/</loc><lastmod>2019-11-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubecon-san-diego/"/></url><url><loc>https://techblog.cisco.com/tags/banzaicloud/</loc><lastmod>2019-11-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/banzaicloud/"/></url><url><loc>https://techblog.cisco.com/tags/cloudnativecon/</loc><lastmod>2019-11-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cloudnativecon/"/></url><url><loc>https://techblog.cisco.com/tags/kubecon/</loc><lastmod>2019-11-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubecon/"/></url><url><loc>https://techblog.cisco.com/blog/istio-operator-1.4/</loc><lastmod>2019-11-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-operator-1.4/"/></url><url><loc>https://techblog.cisco.com/tags/dns/</loc><lastmod>2019-11-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dns/"/></url><url><loc>https://techblog.cisco.com/blog/dns-integrated-service-intro/</loc><lastmod>2019-11-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/dns-integrated-service-intro/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-20-techpreview/</loc><lastmod>2019-11-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-20-techpreview/"/></url><url><loc>https://techblog.cisco.com/tags/java/</loc><lastmod>2019-11-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/java/"/></url><url><loc>https://techblog.cisco.com/tags/kafka-operator/</loc><lastmod>2019-11-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kafka-operator/"/></url><url><loc>https://techblog.cisco.com/tags/spotguide/</loc><lastmod>2019-11-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/spotguide/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-spring-boot/</loc><lastmod>2019-11-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-spring-boot/"/></url><url><loc>https://techblog.cisco.com/blog/backyards-release-1-0/</loc><lastmod>2019-11-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/backyards-release-1-0/"/></url><url><loc>https://techblog.cisco.com/blog/istio-fault-injection/</loc><lastmod>2019-10-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-fault-injection/"/></url><url><loc>https://techblog.cisco.com/tags/fault-injection/</loc><lastmod>2019-10-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/fault-injection/"/></url><url><loc>https://techblog.cisco.com/authors/avi-zimmerman/</loc><lastmod>2019-10-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/avi-zimmerman/"/></url><url><loc>https://techblog.cisco.com/tags/topic-management/</loc><lastmod>2019-10-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/topic-management/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-topic-user-management/</loc><lastmod>2019-10-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-topic-user-management/"/></url><url><loc>https://techblog.cisco.com/tags/user-management/</loc><lastmod>2019-10-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/user-management/"/></url><url><loc>https://techblog.cisco.com/tags/efk/</loc><lastmod>2019-10-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/efk/"/></url><url><loc>https://techblog.cisco.com/blog/logging-operator-efk/</loc><lastmod>2019-10-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/logging-operator-efk/"/></url><url><loc>https://techblog.cisco.com/tags/error/</loc><lastmod>2019-10-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/error/"/></url><url><loc>https://techblog.cisco.com/tags/golang/</loc><lastmod>2019-10-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/golang/"/></url><url><loc>https://techblog.cisco.com/blog/go-1-13-favorite-features/</loc><lastmod>2019-10-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/go-1-13-favorite-features/"/></url><url><loc>https://techblog.cisco.com/tags/release/</loc><lastmod>2019-10-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/release/"/></url><url><loc>https://techblog.cisco.com/tags/amazon/</loc><lastmod>2019-10-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/amazon/"/></url><url><loc>https://techblog.cisco.com/tags/multi-az/</loc><lastmod>2019-10-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/multi-az/"/></url><url><loc>https://techblog.cisco.com/tags/resiliency/</loc><lastmod>2019-10-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/resiliency/"/></url><url><loc>https://techblog.cisco.com/blog/eks-resiliency/</loc><lastmod>2019-10-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/eks-resiliency/"/></url><url><loc>https://techblog.cisco.com/blog/istio-tracing/</loc><lastmod>2019-09-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-tracing/"/></url><url><loc>https://techblog.cisco.com/tags/tracing/</loc><lastmod>2019-09-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/tracing/"/></url><url><loc>https://techblog.cisco.com/tags/azure/</loc><lastmod>2019-09-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/azure/"/></url><url><loc>https://techblog.cisco.com/blog/private-pke-azure/</loc><lastmod>2019-09-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/private-pke-azure/"/></url><url><loc>https://techblog.cisco.com/blog/logging-operator-v2/</loc><lastmod>2019-09-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/logging-operator-v2/"/></url><url><loc>https://techblog.cisco.com/blog/istio-operator-1.3/</loc><lastmod>2019-09-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-operator-1.3/"/></url><url><loc>https://techblog.cisco.com/blog/auto-dast/</loc><lastmod>2019-09-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/auto-dast/"/></url><url><loc>https://techblog.cisco.com/blog/istio-circuit-breaking/</loc><lastmod>2019-09-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-circuit-breaking/"/></url><url><loc>https://techblog.cisco.com/tags/admission-webhooks/</loc><lastmod>2019-09-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/admission-webhooks/"/></url><url><loc>https://techblog.cisco.com/blog/inject-secrets-into-pods-vault-revisited/</loc><lastmod>2019-09-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/inject-secrets-into-pods-vault-revisited/"/></url><url><loc>https://techblog.cisco.com/tags/mutating-webhooks/</loc><lastmod>2019-09-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mutating-webhooks/"/></url><url><loc>https://techblog.cisco.com/blog/istio-traffic-shifting/</loc><lastmod>2019-09-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-traffic-shifting/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-on-the-spot/</loc><lastmod>2019-09-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-on-the-spot/"/></url><url><loc>https://techblog.cisco.com/tags/scheduler/</loc><lastmod>2019-09-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/scheduler/"/></url><url><loc>https://techblog.cisco.com/tags/spot/</loc><lastmod>2019-09-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/spot/"/></url><url><loc>https://techblog.cisco.com/tags/distributed-tracing/</loc><lastmod>2019-08-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/distributed-tracing/"/></url><url><loc>https://techblog.cisco.com/blog/instrumenting-go-applications/</loc><lastmod>2019-08-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/instrumenting-go-applications/"/></url><url><loc>https://techblog.cisco.com/tags/metrics/</loc><lastmod>2019-08-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/metrics/"/></url><url><loc>https://techblog.cisco.com/tags/etcd/</loc><lastmod>2019-08-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/etcd/"/></url><url><loc>https://techblog.cisco.com/blog/etcd-multi/</loc><lastmod>2019-08-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/etcd-multi/"/></url><url><loc>https://techblog.cisco.com/tags/inlets/</loc><lastmod>2019-08-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/inlets/"/></url><url><loc>https://techblog.cisco.com/tags/network/</loc><lastmod>2019-08-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/network/"/></url><url><loc>https://techblog.cisco.com/blog/kurun-port-forward/</loc><lastmod>2019-08-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kurun-port-forward/"/></url><url><loc>https://techblog.cisco.com/tags/services/</loc><lastmod>2019-08-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/services/"/></url><url><loc>https://techblog.cisco.com/tags/hybrid-cloud/</loc><lastmod>2019-08-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/hybrid-cloud/"/></url><url><loc>https://techblog.cisco.com/tags/kubefed/</loc><lastmod>2019-08-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubefed/"/></url><url><loc>https://techblog.cisco.com/blog/federation-replica-scheduling/</loc><lastmod>2019-08-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/federation-replica-scheduling/"/></url><url><loc>https://techblog.cisco.com/tags/scheduling/</loc><lastmod>2019-08-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/scheduling/"/></url><url><loc>https://techblog.cisco.com/blog/decomposing-a-central-helm-chart-repository/</loc><lastmod>2019-08-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/decomposing-a-central-helm-chart-repository/"/></url><url><loc>https://techblog.cisco.com/tags/git/</loc><lastmod>2019-08-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/git/"/></url><url><loc>https://techblog.cisco.com/tags/kubeconfig/</loc><lastmod>2019-08-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubeconfig/"/></url><url><loc>https://techblog.cisco.com/tags/kubectl/</loc><lastmod>2019-08-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubectl/"/></url><url><loc>https://techblog.cisco.com/blog/kubeconfig-security/</loc><lastmod>2019-08-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubeconfig-security/"/></url><url><loc>https://techblog.cisco.com/blog/pomerium-authentication/</loc><lastmod>2019-08-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pomerium-authentication/"/></url><url><loc>https://techblog.cisco.com/authors/bobby-desimone/</loc><lastmod>2019-08-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/bobby-desimone/"/></url><url><loc>https://techblog.cisco.com/tags/oauth/</loc><lastmod>2019-08-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/oauth/"/></url><url><loc>https://techblog.cisco.com/tags/pomerium/</loc><lastmod>2019-08-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/pomerium/"/></url><url><loc>https://techblog.cisco.com/blog/vault-transit-unseal-k8s/</loc><lastmod>2019-08-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-transit-unseal-k8s/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-on-istio-performance/</loc><lastmod>2019-07-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-on-istio-performance/"/></url><url><loc>https://techblog.cisco.com/authors/andr%C3%A1s-t%C3%B3th/</loc><lastmod>2019-07-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/andr%C3%A1s-t%C3%B3th/"/></url><url><loc>https://techblog.cisco.com/blog/istio-canary/</loc><lastmod>2019-07-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-canary/"/></url><url><loc>https://techblog.cisco.com/tags/canary/</loc><lastmod>2019-07-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/canary/"/></url><url><loc>https://techblog.cisco.com/blog/multi-cloud-fedv2/</loc><lastmod>2019-07-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/multi-cloud-fedv2/"/></url><url><loc>https://techblog.cisco.com/blog/pke-multi-master-upgrade/</loc><lastmod>2019-07-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pke-multi-master-upgrade/"/></url><url><loc>https://techblog.cisco.com/tags/kubeadm/</loc><lastmod>2019-07-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubeadm/"/></url><url><loc>https://techblog.cisco.com/tags/multi-master/</loc><lastmod>2019-07-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/multi-master/"/></url><url><loc>https://techblog.cisco.com/blog/istio-operator-1.2/</loc><lastmod>2019-07-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-operator-1.2/"/></url><url><loc>https://techblog.cisco.com/tags/fluent/</loc><lastmod>2019-07-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/fluent/"/></url><url><loc>https://techblog.cisco.com/tags/fluent-bit/</loc><lastmod>2019-07-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/fluent-bit/"/></url><url><loc>https://techblog.cisco.com/tags/grafana/</loc><lastmod>2019-07-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/grafana/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-logging-loki/</loc><lastmod>2019-07-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-logging-loki/"/></url><url><loc>https://techblog.cisco.com/blog/istio-multicluster-the-easy-way/</loc><lastmod>2019-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-multicluster-the-easy-way/"/></url><url><loc>https://techblog.cisco.com/tags/hybrid/</loc><lastmod>2019-07-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/hybrid/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-rack-awareness/</loc><lastmod>2019-07-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-rack-awareness/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-objectmatcher/</loc><lastmod>2019-07-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-objectmatcher/"/></url><url><loc>https://techblog.cisco.com/tags/objectmatcher/</loc><lastmod>2019-07-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/objectmatcher/"/></url><url><loc>https://techblog.cisco.com/blog/network-policy/</loc><lastmod>2019-06-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/network-policy/"/></url><url><loc>https://techblog.cisco.com/tags/cli/</loc><lastmod>2019-06-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cli/"/></url><url><loc>https://techblog.cisco.com/tags/docker/</loc><lastmod>2019-06-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/docker/"/></url><url><loc>https://techblog.cisco.com/blog/kind-ingress/</loc><lastmod>2019-06-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kind-ingress/"/></url><url><loc>https://techblog.cisco.com/blog/istio-the-easy-way/</loc><lastmod>2019-06-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-the-easy-way/"/></url><url><loc>https://techblog.cisco.com/blog/creating-helm-charts-part-2/</loc><lastmod>2019-06-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/creating-helm-charts-part-2/"/></url><url><loc>https://techblog.cisco.com/tags/templating/</loc><lastmod>2019-06-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/templating/"/></url><url><loc>https://techblog.cisco.com/tags/alert-manager/</loc><lastmod>2019-06-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/alert-manager/"/></url><url><loc>https://techblog.cisco.com/tags/apache-kafka/</loc><lastmod>2019-06-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/apache-kafka/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-alert/</loc><lastmod>2019-06-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-alert/"/></url><url><loc>https://techblog.cisco.com/blog/multi-cloud-apps/</loc><lastmod>2019-06-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/multi-cloud-apps/"/></url><url><loc>https://techblog.cisco.com/tags/encryption/</loc><lastmod>2019-06-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/encryption/"/></url><url><loc>https://techblog.cisco.com/blog/spark-k8s-security/</loc><lastmod>2019-06-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-k8s-security/"/></url><url><loc>https://techblog.cisco.com/blog/istio-multi-mesh/</loc><lastmod>2019-05-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-multi-mesh/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-operator/</loc><lastmod>2019-05-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-operator/"/></url><url><loc>https://techblog.cisco.com/blog/hybrid-any-cloud-platform/</loc><lastmod>2019-05-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/hybrid-any-cloud-platform/"/></url><url><loc>https://techblog.cisco.com/blog/cloudinfo-graphql-search-api/</loc><lastmod>2019-05-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/cloudinfo-graphql-search-api/"/></url><url><loc>https://techblog.cisco.com/tags/api/</loc><lastmod>2019-05-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/api/"/></url><url><loc>https://techblog.cisco.com/tags/cloudinfo/</loc><lastmod>2019-05-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cloudinfo/"/></url><url><loc>https://techblog.cisco.com/tags/graphql/</loc><lastmod>2019-05-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/graphql/"/></url><url><loc>https://techblog.cisco.com/blog/istio-telemetry/</loc><lastmod>2019-05-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-telemetry/"/></url><url><loc>https://techblog.cisco.com/tags/consul-template/</loc><lastmod>2019-05-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/consul-template/"/></url><url><loc>https://techblog.cisco.com/authors/j%C3%BCrgen-weber/</loc><lastmod>2019-05-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/j%C3%BCrgen-weber/"/></url><url><loc>https://techblog.cisco.com/blog/vault-webhook-consul-template/</loc><lastmod>2019-05-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-webhook-consul-template/"/></url><url><loc>https://techblog.cisco.com/tags/cadence/</loc><lastmod>2019-05-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cadence/"/></url><url><loc>https://techblog.cisco.com/blog/pke-on-azure/</loc><lastmod>2019-05-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pke-on-azure/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-logging-elasticsearch/</loc><lastmod>2019-04-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-logging-elasticsearch/"/></url><url><loc>https://techblog.cisco.com/blog/chart-repository-service/</loc><lastmod>2019-04-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/chart-repository-service/"/></url><url><loc>https://techblog.cisco.com/blog/pke-on-cadence/</loc><lastmod>2019-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pke-on-cadence/"/></url><url><loc>https://techblog.cisco.com/tags/workflow/</loc><lastmod>2019-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/workflow/"/></url><url><loc>https://techblog.cisco.com/blog/istio-multicluster-federation-2/</loc><lastmod>2019-04-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-multicluster-federation-2/"/></url><url><loc>https://techblog.cisco.com/blog/pod-security-policy/</loc><lastmod>2019-04-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pod-security-policy/"/></url><url><loc>https://techblog.cisco.com/tags/rbac/</loc><lastmod>2019-04-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/rbac/"/></url><url><loc>https://techblog.cisco.com/blog/istio-control-plane-upgrade/</loc><lastmod>2019-04-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-control-plane-upgrade/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-security-k8s/</loc><lastmod>2019-04-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-security-k8s/"/></url><url><loc>https://techblog.cisco.com/blog/istio-cni-plugin/</loc><lastmod>2019-03-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-cni-plugin/"/></url><url><loc>https://techblog.cisco.com/blog/introduction-to-cadence/</loc><lastmod>2019-03-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/introduction-to-cadence/"/></url><url><loc>https://techblog.cisco.com/blog/pke-cis-k8s-benchmark/</loc><lastmod>2019-03-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pke-cis-k8s-benchmark/"/></url><url><loc>https://techblog.cisco.com/tags/certified/</loc><lastmod>2019-03-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/certified/"/></url><url><loc>https://techblog.cisco.com/tags/cis/</loc><lastmod>2019-03-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cis/"/></url><url><loc>https://techblog.cisco.com/authors/ferenc-hernadi/</loc><lastmod>2019-03-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/ferenc-hernadi/"/></url><url><loc>https://techblog.cisco.com/tags/autoscaling/</loc><lastmod>2019-03-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/autoscaling/"/></url><url><loc>https://techblog.cisco.com/tags/horizontal-pod-autoscaler/</loc><lastmod>2019-03-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/horizontal-pod-autoscaler/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-hpa-prom-istio/</loc><lastmod>2019-03-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-hpa-prom-istio/"/></url><url><loc>https://techblog.cisco.com/blog/pke-cncf-certified-k8s/</loc><lastmod>2019-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pke-cncf-certified-k8s/"/></url><url><loc>https://techblog.cisco.com/tags/cncf/</loc><lastmod>2019-03-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cncf/"/></url><url><loc>https://techblog.cisco.com/blog/istio-operator-1.1/</loc><lastmod>2019-03-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-operator-1.1/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-on-k8s-simplified/</loc><lastmod>2019-03-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-on-k8s-simplified/"/></url><url><loc>https://techblog.cisco.com/blog/istio-multicluster-federation-1/</loc><lastmod>2019-03-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-multicluster-federation-1/"/></url><url><loc>https://techblog.cisco.com/tags/dex/</loc><lastmod>2019-03-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dex/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-dex/</loc><lastmod>2019-03-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-dex/"/></url><url><loc>https://techblog.cisco.com/blog/istio-operator/</loc><lastmod>2019-02-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/istio-operator/"/></url><url><loc>https://techblog.cisco.com/tags/nodejs/</loc><lastmod>2019-02-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/nodejs/"/></url><url><loc>https://techblog.cisco.com/tags/npm/</loc><lastmod>2019-02-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/npm/"/></url><url><loc>https://techblog.cisco.com/blog/running-nodejs-on-kubernetes/</loc><lastmod>2019-02-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/running-nodejs-on-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/spotguides/</loc><lastmod>2019-02-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/spotguides/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-node-labelling/</loc><lastmod>2019-02-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-node-labelling/"/></url><url><loc>https://techblog.cisco.com/tags/label/</loc><lastmod>2019-02-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/label/"/></url><url><loc>https://techblog.cisco.com/tags/node/</loc><lastmod>2019-02-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/node/"/></url><url><loc>https://techblog.cisco.com/tags/authn/</loc><lastmod>2019-02-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/authn/"/></url><url><loc>https://techblog.cisco.com/tags/authz/</loc><lastmod>2019-02-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/authz/"/></url><url><loc>https://techblog.cisco.com/tags/ldap/</loc><lastmod>2019-02-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ldap/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-rbac/</loc><lastmod>2019-02-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-rbac/"/></url><url><loc>https://techblog.cisco.com/blog/bank-vaults-news/</loc><lastmod>2019-02-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/bank-vaults-news/"/></url><url><loc>https://techblog.cisco.com/tags/spring/</loc><lastmod>2019-02-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/spring/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-dx/</loc><lastmod>2019-02-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-dx/"/></url><url><loc>https://techblog.cisco.com/tags/contribution/</loc><lastmod>2019-02-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/contribution/"/></url><url><loc>https://techblog.cisco.com/tags/dx/</loc><lastmod>2019-02-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dx/"/></url><url><loc>https://techblog.cisco.com/authors/adam-dudas/</loc><lastmod>2019-01-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/adam-dudas/"/></url><url><loc>https://techblog.cisco.com/blog/ci-cd-secret-management/</loc><lastmod>2019-01-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/ci-cd-secret-management/"/></url><url><loc>https://techblog.cisco.com/blog/generate-cert-kubeadm-vault/</loc><lastmod>2019-01-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/generate-cert-kubeadm-vault/"/></url><url><loc>https://techblog.cisco.com/tags/aks/</loc><lastmod>2019-01-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/aks/"/></url><url><loc>https://techblog.cisco.com/blog/aks-loadbalancing/</loc><lastmod>2019-01-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/aks-loadbalancing/"/></url><url><loc>https://techblog.cisco.com/tags/loadbalancing/</loc><lastmod>2019-01-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/loadbalancing/"/></url><url><loc>https://techblog.cisco.com/blog/creating-a-custom-golang-spotguide/</loc><lastmod>2019-01-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/creating-a-custom-golang-spotguide/"/></url><url><loc>https://techblog.cisco.com/tags/paas/</loc><lastmod>2019-01-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/paas/"/></url><url><loc>https://techblog.cisco.com/tags/cicd/</loc><lastmod>2019-01-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cicd/"/></url><url><loc>https://techblog.cisco.com/tags/minikube/</loc><lastmod>2019-01-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/minikube/"/></url><url><loc>https://techblog.cisco.com/blog/minikube-ci/</loc><lastmod>2019-01-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/minikube-ci/"/></url><url><loc>https://techblog.cisco.com/blog/spotguides-spark/</loc><lastmod>2019-01-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spotguides-spark/"/></url><url><loc>https://techblog.cisco.com/tags/spark-streaming/</loc><lastmod>2019-01-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/spark-streaming/"/></url><url><loc>https://techblog.cisco.com/blog/vault-okd/</loc><lastmod>2019-01-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-okd/"/></url><url><loc>https://techblog.cisco.com/tags/okd/</loc><lastmod>2019-01-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/okd/"/></url><url><loc>https://techblog.cisco.com/tags/openshift/</loc><lastmod>2019-01-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/openshift/"/></url><url><loc>https://techblog.cisco.com/authors/robbie-blaine/</loc><lastmod>2019-01-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/robbie-blaine/"/></url><url><loc>https://techblog.cisco.com/tags/k8s-extensions/</loc><lastmod>2019-01-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/k8s-extensions/"/></url><url><loc>https://techblog.cisco.com/tags/k8s-internals/</loc><lastmod>2019-01-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/k8s-internals/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-custom-scheduler/</loc><lastmod>2019-01-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-custom-scheduler/"/></url><url><loc>https://techblog.cisco.com/tags/beta/</loc><lastmod>2019-01-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/beta/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-vision/</loc><lastmod>2019-01-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-vision/"/></url><url><loc>https://techblog.cisco.com/tags/vision/</loc><lastmod>2019-01-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/vision/"/></url><url><loc>https://techblog.cisco.com/blog/spot-termination-handler/</loc><lastmod>2018-12-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spot-termination-handler/"/></url><url><loc>https://techblog.cisco.com/tags/gcp/</loc><lastmod>2018-12-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/gcp/"/></url><url><loc>https://techblog.cisco.com/tags/hollowtrees/</loc><lastmod>2018-12-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/hollowtrees/"/></url><url><loc>https://techblog.cisco.com/blog/spotguides-revisited/</loc><lastmod>2018-12-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spotguides-revisited/"/></url><url><loc>https://techblog.cisco.com/blog/public-beta/</loc><lastmod>2018-12-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/public-beta/"/></url><url><loc>https://techblog.cisco.com/authors/kris-flautner/</loc><lastmod>2018-12-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/kris-flautner/"/></url><url><loc>https://techblog.cisco.com/blog/kubecon-seattle/</loc><lastmod>2018-12-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubecon-seattle/"/></url><url><loc>https://techblog.cisco.com/tags/admission-controllers/</loc><lastmod>2018-12-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/admission-controllers/"/></url><url><loc>https://techblog.cisco.com/blog/slok-webhook/</loc><lastmod>2018-12-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/slok-webhook/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-gke-rbac/</loc><lastmod>2018-12-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-gke-rbac/"/></url><url><loc>https://techblog.cisco.com/tags/gke/</loc><lastmod>2018-12-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/gke/"/></url><url><loc>https://techblog.cisco.com/tags/nodeaffinity/</loc><lastmod>2018-11-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/nodeaffinity/"/></url><url><loc>https://techblog.cisco.com/tags/podaffinity/</loc><lastmod>2018-11-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/podaffinity/"/></url><url><loc>https://techblog.cisco.com/tags/podantiaffinity/</loc><lastmod>2018-11-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/podantiaffinity/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-affinities/</loc><lastmod>2018-11-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-affinities/"/></url><url><loc>https://techblog.cisco.com/tags/kaniko/</loc><lastmod>2018-11-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kaniko/"/></url><url><loc>https://techblog.cisco.com/blog/unprivileged-builds/</loc><lastmod>2018-11-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/unprivileged-builds/"/></url><url><loc>https://techblog.cisco.com/blog/grafana-templating/</loc><lastmod>2018-11-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/grafana-templating/"/></url><url><loc>https://techblog.cisco.com/tags/banzai-cloud/</loc><lastmod>2018-11-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/banzai-cloud/"/></url><url><loc>https://techblog.cisco.com/blog/seed-investment/</loc><lastmod>2018-11-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/seed-investment/"/></url><url><loc>https://techblog.cisco.com/tags/seed-round/</loc><lastmod>2018-11-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/seed-round/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-spot-mutating-webhook/</loc><lastmod>2018-11-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-spot-mutating-webhook/"/></url><url><loc>https://techblog.cisco.com/blog/creating-helm-charts/</loc><lastmod>2018-11-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/creating-helm-charts/"/></url><url><loc>https://techblog.cisco.com/tags/dependency-injection/</loc><lastmod>2018-10-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dependency-injection/"/></url><url><loc>https://techblog.cisco.com/tags/dependency-injection-container/</loc><lastmod>2018-10-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dependency-injection-container/"/></url><url><loc>https://techblog.cisco.com/blog/dependency-injection-go/</loc><lastmod>2018-10-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/dependency-injection-go/"/></url><url><loc>https://techblog.cisco.com/tags/di/</loc><lastmod>2018-10-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/di/"/></url><url><loc>https://techblog.cisco.com/tags/dic/</loc><lastmod>2018-10-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dic/"/></url><url><loc>https://techblog.cisco.com/tags/dig/</loc><lastmod>2018-10-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/dig/"/></url><url><loc>https://techblog.cisco.com/tags/wire/</loc><lastmod>2018-10-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/wire/"/></url><url><loc>https://techblog.cisco.com/tags/alibaba-cloud-object-storage/</loc><lastmod>2018-10-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/alibaba-cloud-object-storage/"/></url><url><loc>https://techblog.cisco.com/tags/amazon-s3/</loc><lastmod>2018-10-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/amazon-s3/"/></url><url><loc>https://techblog.cisco.com/tags/azure-blob-storage/</loc><lastmod>2018-10-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/azure-blob-storage/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-storage-api/</loc><lastmod>2018-10-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-storage-api/"/></url><url><loc>https://techblog.cisco.com/tags/cloud-object-storage/</loc><lastmod>2018-10-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cloud-object-storage/"/></url><url><loc>https://techblog.cisco.com/tags/google-cloud-storage/</loc><lastmod>2018-10-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/google-cloud-storage/"/></url><url><loc>https://techblog.cisco.com/tags/oracle-cloud-object-storage/</loc><lastmod>2018-10-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/oracle-cloud-object-storage/"/></url><url><loc>https://techblog.cisco.com/tags/gin/</loc><lastmod>2018-10-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/gin/"/></url><url><loc>https://techblog.cisco.com/tags/gorm/</loc><lastmod>2018-10-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/gorm/"/></url><url><loc>https://techblog.cisco.com/tags/instrumentation/</loc><lastmod>2018-10-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/instrumentation/"/></url><url><loc>https://techblog.cisco.com/blog/opencensus-instrumenting-gin-gorm/</loc><lastmod>2018-10-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/opencensus-instrumenting-gin-gorm/"/></url><url><loc>https://techblog.cisco.com/tags/opencensus/</loc><lastmod>2018-10-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/opencensus/"/></url><url><loc>https://techblog.cisco.com/tags/stats/</loc><lastmod>2018-10-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/stats/"/></url><url><loc>https://techblog.cisco.com/blog/vault-java-spotguide/</loc><lastmod>2018-10-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-java-spotguide/"/></url><url><loc>https://techblog.cisco.com/blog/cli-ux/</loc><lastmod>2018-10-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/cli-ux/"/></url><url><loc>https://techblog.cisco.com/tags/ux/</loc><lastmod>2018-10-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ux/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-disaster-recovery/</loc><lastmod>2018-10-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-disaster-recovery/"/></url><url><loc>https://techblog.cisco.com/tags/anchore/</loc><lastmod>2018-09-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/anchore/"/></url><url><loc>https://techblog.cisco.com/blog/anchore-image-validation/</loc><lastmod>2018-09-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/anchore-image-validation/"/></url><url><loc>https://techblog.cisco.com/tags/validating-webhooks/</loc><lastmod>2018-09-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/validating-webhooks/"/></url><url><loc>https://techblog.cisco.com/tags/vulnerability/</loc><lastmod>2018-09-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/vulnerability/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-admission-webhooks/</loc><lastmod>2018-09-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-admission-webhooks/"/></url><url><loc>https://techblog.cisco.com/tags/agnostic/</loc><lastmod>2018-09-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/agnostic/"/></url><url><loc>https://techblog.cisco.com/tags/provider/</loc><lastmod>2018-09-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/provider/"/></url><url><loc>https://techblog.cisco.com/blog/satellite-identify-cloud-provider/</loc><lastmod>2018-09-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/satellite-identify-cloud-provider/"/></url><url><loc>https://techblog.cisco.com/blog/spark-prometheus-sink-labels/</loc><lastmod>2018-09-17T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-prometheus-sink-labels/"/></url><url><loc>https://techblog.cisco.com/blog/productinfo-services/</loc><lastmod>2018-09-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/productinfo-services/"/></url><url><loc>https://techblog.cisco.com/tags/preemptible/</loc><lastmod>2018-09-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/preemptible/"/></url><url><loc>https://techblog.cisco.com/authors/attila-prekopcsak/</loc><lastmod>2018-09-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/attila-prekopcsak/"/></url><url><loc>https://techblog.cisco.com/blog/monitoring-gin-with-prometheus/</loc><lastmod>2018-09-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/monitoring-gin-with-prometheus/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-hpa-operator-reloaded/</loc><lastmod>2018-09-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-hpa-operator-reloaded/"/></url><url><loc>https://techblog.cisco.com/blog/monitoring-vault-grafana/</loc><lastmod>2018-09-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/monitoring-vault-grafana/"/></url><url><loc>https://techblog.cisco.com/tags/taints/</loc><lastmod>2018-09-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/taints/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-taints-tolerations-affinities/</loc><lastmod>2018-09-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-taints-tolerations-affinities/"/></url><url><loc>https://techblog.cisco.com/tags/tolerations/</loc><lastmod>2018-09-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/tolerations/"/></url><url><loc>https://techblog.cisco.com/blog/banzaicloud-oracle-partnership/</loc><lastmod>2018-08-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/banzaicloud-oracle-partnership/"/></url><url><loc>https://techblog.cisco.com/tags/oke/</loc><lastmod>2018-08-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/oke/"/></url><url><loc>https://techblog.cisco.com/tags/oracle/</loc><lastmod>2018-08-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/oracle/"/></url><url><loc>https://techblog.cisco.com/tags/partnership/</loc><lastmod>2018-08-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/partnership/"/></url><url><loc>https://techblog.cisco.com/blog/error-handling-go/</loc><lastmod>2018-08-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/error-handling-go/"/></url><url><loc>https://techblog.cisco.com/tags/alibaba/</loc><lastmod>2018-08-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/alibaba/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-alibaba-support/</loc><lastmod>2018-08-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-alibaba-support/"/></url><url><loc>https://techblog.cisco.com/blog/nodejs-in-production/</loc><lastmod>2018-08-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/nodejs-in-production/"/></url><url><loc>https://techblog.cisco.com/tags/chart/</loc><lastmod>2018-08-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/chart/"/></url><url><loc>https://techblog.cisco.com/blog/zeppelin-spark-k8-helm-chart/</loc><lastmod>2018-08-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/zeppelin-spark-k8-helm-chart/"/></url><url><loc>https://techblog.cisco.com/tags/zeppelin/</loc><lastmod>2018-08-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zeppelin/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-eks-support/</loc><lastmod>2018-08-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-eks-support/"/></url><url><loc>https://techblog.cisco.com/blog/multi-cloud-k8s/</loc><lastmod>2018-08-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/multi-cloud-k8s/"/></url><url><loc>https://techblog.cisco.com/tags/centralized/</loc><lastmod>2018-08-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/centralized/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-logging-operator/</loc><lastmod>2018-08-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-logging-operator/"/></url><url><loc>https://techblog.cisco.com/tags/operator-sdk/</loc><lastmod>2018-08-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/operator-sdk/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-oke-support/</loc><lastmod>2018-07-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-oke-support/"/></url><url><loc>https://techblog.cisco.com/tags/auth/</loc><lastmod>2018-07-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/auth/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-kube-proxy/</loc><lastmod>2018-07-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-kube-proxy/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-hpa-operator/</loc><lastmod>2018-07-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-hpa-operator/"/></url><url><loc>https://techblog.cisco.com/blog/spark-resiliency/</loc><lastmod>2018-07-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-resiliency/"/></url><url><loc>https://techblog.cisco.com/tags/job/</loc><lastmod>2018-07-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/job/"/></url><url><loc>https://techblog.cisco.com/tags/pod/</loc><lastmod>2018-07-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/pod/"/></url><url><loc>https://techblog.cisco.com/tags/statefulset/</loc><lastmod>2018-07-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/statefulset/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-cluster-recommender/</loc><lastmod>2018-07-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-cluster-recommender/"/></url><url><loc>https://techblog.cisco.com/tags/mysql/</loc><lastmod>2018-07-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/mysql/"/></url><url><loc>https://techblog.cisco.com/tags/operators/</loc><lastmod>2018-07-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/operators/"/></url><url><loc>https://techblog.cisco.com/blog/mysql-on-kubernetes/</loc><lastmod>2018-07-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/mysql-on-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/clair/</loc><lastmod>2018-07-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/clair/"/></url><url><loc>https://techblog.cisco.com/tags/sonar/</loc><lastmod>2018-07-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/sonar/"/></url><url><loc>https://techblog.cisco.com/blog/container-vulnerability-scans/</loc><lastmod>2018-07-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/container-vulnerability-scans/"/></url><url><loc>https://techblog.cisco.com/blog/joining-cncf/</loc><lastmod>2018-07-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/joining-cncf/"/></url><url><loc>https://techblog.cisco.com/tags/kscp/</loc><lastmod>2018-07-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kscp/"/></url><url><loc>https://techblog.cisco.com/tags/external-dns-service/</loc><lastmod>2018-07-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/external-dns-service/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-external-dns-route53/</loc><lastmod>2018-07-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-external-dns-route53/"/></url><url><loc>https://techblog.cisco.com/tags/route53/</loc><lastmod>2018-07-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/route53/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-secrets/</loc><lastmod>2018-07-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-secrets/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-horizontal-pod-autoscaler/</loc><lastmod>2018-06-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-horizontal-pod-autoscaler/"/></url><url><loc>https://techblog.cisco.com/tags/wildfly/</loc><lastmod>2018-06-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/wildfly/"/></url><url><loc>https://techblog.cisco.com/blog/hands-on-thanos/</loc><lastmod>2018-06-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/hands-on-thanos/"/></url><url><loc>https://techblog.cisco.com/blog/cloud-provider-cloudinfo/</loc><lastmod>2018-06-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/cloud-provider-cloudinfo/"/></url><url><loc>https://techblog.cisco.com/tags/googlecloud/</loc><lastmod>2018-06-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/googlecloud/"/></url><url><loc>https://techblog.cisco.com/tags/telescopes/</loc><lastmod>2018-06-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/telescopes/"/></url><url><loc>https://techblog.cisco.com/tags/unsealing/</loc><lastmod>2018-06-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/unsealing/"/></url><url><loc>https://techblog.cisco.com/blog/vault-unsealing/</loc><lastmod>2018-06-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-unsealing/"/></url><url><loc>https://techblog.cisco.com/blog/azure-msi-role/</loc><lastmod>2018-06-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/azure-msi-role/"/></url><url><loc>https://techblog.cisco.com/authors/flora-piszker/</loc><lastmod>2018-06-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/flora-piszker/"/></url><url><loc>https://techblog.cisco.com/tags/msi/</loc><lastmod>2018-06-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/msi/"/></url><url><loc>https://techblog.cisco.com/tags/role-assign/</loc><lastmod>2018-06-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/role-assign/"/></url><url><loc>https://techblog.cisco.com/tags/java10/</loc><lastmod>2018-06-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/java10/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-vertical-pod-autoscaler/</loc><lastmod>2018-06-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-vertical-pod-autoscaler/"/></url><url><loc>https://techblog.cisco.com/tags/vertical-pod-autoscaler/</loc><lastmod>2018-06-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/vertical-pod-autoscaler/"/></url><url><loc>https://techblog.cisco.com/tags/cache/</loc><lastmod>2018-06-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cache/"/></url><url><loc>https://techblog.cisco.com/tags/infinispan/</loc><lastmod>2018-06-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/infinispan/"/></url><url><loc>https://techblog.cisco.com/blog/infinispan-kubernetes/</loc><lastmod>2018-06-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/infinispan-kubernetes/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-cluster-autoscaler/</loc><lastmod>2018-06-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-cluster-autoscaler/"/></url><url><loc>https://techblog.cisco.com/tags/cluster-autoscaler/</loc><lastmod>2018-06-06T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/cluster-autoscaler/"/></url><url><loc>https://techblog.cisco.com/blog/runtime-logging/</loc><lastmod>2018-06-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/runtime-logging/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-on-kubernetes/</loc><lastmod>2018-05-31T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-on-kubernetes/"/></url><url><loc>https://techblog.cisco.com/blog/unit-testing-refactoring/</loc><lastmod>2018-05-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/unit-testing-refactoring/"/></url><url><loc>https://techblog.cisco.com/blog/prometheus-jmx-exporter-operator/</loc><lastmod>2018-05-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/prometheus-jmx-exporter-operator/"/></url><url><loc>https://techblog.cisco.com/tags/java-agent-injection/</loc><lastmod>2018-05-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/java-agent-injection/"/></url><url><loc>https://techblog.cisco.com/tags/kubernetes-api/</loc><lastmod>2018-05-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubernetes-api/"/></url><url><loc>https://techblog.cisco.com/tags/prometheus-jmx-exporter/</loc><lastmod>2018-05-28T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/prometheus-jmx-exporter/"/></url><url><loc>https://techblog.cisco.com/blog/kurun/</loc><lastmod>2018-05-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kurun/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-clusters-cloud/</loc><lastmod>2018-05-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-clusters-cloud/"/></url><url><loc>https://techblog.cisco.com/tags/google/</loc><lastmod>2018-05-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/google/"/></url><url><loc>https://techblog.cisco.com/tags/persistent-volume-claim/</loc><lastmod>2018-05-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/persistent-volume-claim/"/></url><url><loc>https://techblog.cisco.com/blog/pvc-operator/</loc><lastmod>2018-05-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pvc-operator/"/></url><url><loc>https://techblog.cisco.com/tags/storageclass/</loc><lastmod>2018-05-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/storageclass/"/></url><url><loc>https://techblog.cisco.com/blog/vault-operator/</loc><lastmod>2018-05-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-operator/"/></url><url><loc>https://techblog.cisco.com/blog/java10-container-sizing/</loc><lastmod>2018-05-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/java10-container-sizing/"/></url><url><loc>https://techblog.cisco.com/tags/javaassist/</loc><lastmod>2018-05-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/javaassist/"/></url><url><loc>https://techblog.cisco.com/blog/jee-kubernetes/</loc><lastmod>2018-05-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/jee-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/j2ee/</loc><lastmod>2018-05-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/j2ee/"/></url><url><loc>https://techblog.cisco.com/tags/jee/</loc><lastmod>2018-05-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/jee/"/></url><url><loc>https://techblog.cisco.com/tags/microservices/</loc><lastmod>2018-05-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/microservices/"/></url><url><loc>https://techblog.cisco.com/blog/banzaicloud-redhat-partnership/</loc><lastmod>2018-05-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/banzaicloud-redhat-partnership/"/></url><url><loc>https://techblog.cisco.com/tags/redhat/</loc><lastmod>2018-05-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/redhat/"/></url><url><loc>https://techblog.cisco.com/blog/ci-cd-k8s-nodejs/</loc><lastmod>2018-05-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/ci-cd-k8s-nodejs/"/></url><url><loc>https://techblog.cisco.com/blog/cluster-recommender/</loc><lastmod>2018-05-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/cluster-recommender/"/></url><url><loc>https://techblog.cisco.com/blog/operator-sdk/</loc><lastmod>2018-05-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/operator-sdk/"/></url><url><loc>https://techblog.cisco.com/blog/kubecon-copenhagen/</loc><lastmod>2018-04-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubecon-copenhagen/"/></url><url><loc>https://techblog.cisco.com/blog/kubernetes-certified-provider/</loc><lastmod>2018-04-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubernetes-certified-provider/"/></url><url><loc>https://techblog.cisco.com/blog/announcing-bank-vaults/</loc><lastmod>2018-04-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/announcing-bank-vaults/"/></url><url><loc>https://techblog.cisco.com/tags/azurefile/</loc><lastmod>2018-04-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/azurefile/"/></url><url><loc>https://techblog.cisco.com/blog/persistent-volumes-k8s/</loc><lastmod>2018-04-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/persistent-volumes-k8s/"/></url><url><loc>https://techblog.cisco.com/tags/pvc/</loc><lastmod>2018-04-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/pvc/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-logging-advanced/</loc><lastmod>2018-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-logging-advanced/"/></url><url><loc>https://techblog.cisco.com/tags/secure/</loc><lastmod>2018-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/secure/"/></url><url><loc>https://techblog.cisco.com/tags/tls/</loc><lastmod>2018-04-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/tls/"/></url><url><loc>https://techblog.cisco.com/blog/slackbot/</loc><lastmod>2018-04-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/slackbot/"/></url><url><loc>https://techblog.cisco.com/authors/lajos-papp/</loc><lastmod>2018-04-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/lajos-papp/"/></url><url><loc>https://techblog.cisco.com/tags/lambda/</loc><lastmod>2018-04-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/lambda/"/></url><url><loc>https://techblog.cisco.com/tags/policy/</loc><lastmod>2018-04-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/policy/"/></url><url><loc>https://techblog.cisco.com/blog/policy-enforcement-k8s/</loc><lastmod>2018-04-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/policy-enforcement-k8s/"/></url><url><loc>https://techblog.cisco.com/blog/spark-history-server-cloud/</loc><lastmod>2018-04-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-history-server-cloud/"/></url><url><loc>https://techblog.cisco.com/tags/historyserver/</loc><lastmod>2018-04-16T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/historyserver/"/></url><url><loc>https://techblog.cisco.com/blog/spark-job-resilience/</loc><lastmod>2018-04-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-job-resilience/"/></url><url><loc>https://techblog.cisco.com/tags/spark-resource-staging-server/</loc><lastmod>2018-04-13T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/spark-resource-staging-server/"/></url><url><loc>https://techblog.cisco.com/tags/openssl/</loc><lastmod>2018-04-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/openssl/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-logging-tls/</loc><lastmod>2018-04-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-logging-tls/"/></url><url><loc>https://techblog.cisco.com/blog/helm-rest-api/</loc><lastmod>2018-04-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/helm-rest-api/"/></url><url><loc>https://techblog.cisco.com/tags/rest/</loc><lastmod>2018-04-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/rest/"/></url><url><loc>https://techblog.cisco.com/tags/drain/</loc><lastmod>2018-04-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/drain/"/></url><url><loc>https://techblog.cisco.com/blog/drain/</loc><lastmod>2018-04-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/drain/"/></url><url><loc>https://techblog.cisco.com/blog/vault-dynamic-ssh/</loc><lastmod>2018-04-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-dynamic-ssh/"/></url><url><loc>https://techblog.cisco.com/tags/ssh/</loc><lastmod>2018-04-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ssh/"/></url><url><loc>https://techblog.cisco.com/blog/ci-cd-k8s-spring-boot/</loc><lastmod>2018-04-03T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/ci-cd-k8s-spring-boot/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-logging/</loc><lastmod>2018-03-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-logging/"/></url><url><loc>https://techblog.cisco.com/tags/bigdata/</loc><lastmod>2018-03-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/bigdata/"/></url><url><loc>https://techblog.cisco.com/blog/future-of-big-data-is-kubernetes/</loc><lastmod>2018-03-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/future-of-big-data-is-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/fn/</loc><lastmod>2018-03-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/fn/"/></url><url><loc>https://techblog.cisco.com/blog/fn-ht/</loc><lastmod>2018-03-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/fn-ht/"/></url><url><loc>https://techblog.cisco.com/tags/functions/</loc><lastmod>2018-03-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/functions/"/></url><url><loc>https://techblog.cisco.com/tags/serverless/</loc><lastmod>2018-03-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/serverless/"/></url><url><loc>https://techblog.cisco.com/tags/hashicorp/</loc><lastmod>2018-03-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/hashicorp/"/></url><url><loc>https://techblog.cisco.com/blog/hashicorp-guest-post/</loc><lastmod>2018-03-25T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/hashicorp-guest-post/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-third-release/</loc><lastmod>2018-03-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-third-release/"/></url><url><loc>https://techblog.cisco.com/blog/k8s-port-hunt/</loc><lastmod>2018-03-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/k8s-port-hunt/"/></url><url><loc>https://techblog.cisco.com/tags/viper/</loc><lastmod>2018-03-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/viper/"/></url><url><loc>https://techblog.cisco.com/tags/kubeless/</loc><lastmod>2018-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/kubeless/"/></url><url><loc>https://techblog.cisco.com/blog/kubeless/</loc><lastmod>2018-03-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubeless/"/></url><url><loc>https://techblog.cisco.com/blog/spark-prometheus-sink/</loc><lastmod>2018-03-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-prometheus-sink/"/></url><url><loc>https://techblog.cisco.com/blog/vault-dynamic-secrets/</loc><lastmod>2018-03-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/vault-dynamic-secrets/"/></url><url><loc>https://techblog.cisco.com/blog/monitoring-kafka-prometheus/</loc><lastmod>2018-03-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/monitoring-kafka-prometheus/"/></url><url><loc>https://techblog.cisco.com/blog/fn/</loc><lastmod>2018-03-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/fn/"/></url><url><loc>https://techblog.cisco.com/blog/tensorflow-on-gpu-azure/</loc><lastmod>2018-03-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/tensorflow-on-gpu-azure/"/></url><url><loc>https://techblog.cisco.com/blog/ingress-auth/</loc><lastmod>2018-02-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/ingress-auth/"/></url><url><loc>https://techblog.cisco.com/blog/prometheus-application-monitoring/</loc><lastmod>2018-02-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/prometheus-application-monitoring/"/></url><url><loc>https://techblog.cisco.com/blog/spark-checkpointing/</loc><lastmod>2018-02-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-checkpointing/"/></url><url><loc>https://techblog.cisco.com/tags/streaming/</loc><lastmod>2018-02-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/streaming/"/></url><url><loc>https://techblog.cisco.com/tags/faas/</loc><lastmod>2018-02-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/faas/"/></url><url><loc>https://techblog.cisco.com/blog/openfaas/</loc><lastmod>2018-02-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/openfaas/"/></url><url><loc>https://techblog.cisco.com/tags/function-as-service/</loc><lastmod>2018-02-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/function-as-service/"/></url><url><loc>https://techblog.cisco.com/tags/openfaas/</loc><lastmod>2018-02-19T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/openfaas/"/></url><url><loc>https://techblog.cisco.com/blog/zeppelin-ci-cd-flow/</loc><lastmod>2018-02-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/zeppelin-ci-cd-flow/"/></url><url><loc>https://techblog.cisco.com/blog/aws-asg-spot/</loc><lastmod>2018-02-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/aws-asg-spot/"/></url><url><loc>https://techblog.cisco.com/tags/grpc/</loc><lastmod>2018-02-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/grpc/"/></url><url><loc>https://techblog.cisco.com/blog/kafka-on-etcd/</loc><lastmod>2018-02-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kafka-on-etcd/"/></url><url><loc>https://techblog.cisco.com/tags/zookeeper/</loc><lastmod>2018-02-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/zookeeper/"/></url><url><loc>https://techblog.cisco.com/blog/prometheus-federation/</loc><lastmod>2018-02-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/prometheus-federation/"/></url><url><loc>https://techblog.cisco.com/blog/prometheus-spot-exporter/</loc><lastmod>2018-02-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/prometheus-spot-exporter/"/></url><url><loc>https://techblog.cisco.com/blog/spark-k8s-scheduler/</loc><lastmod>2018-02-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-k8s-scheduler/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-second-release/</loc><lastmod>2018-01-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-second-release/"/></url><url><loc>https://techblog.cisco.com/tags/ec2/</loc><lastmod>2018-01-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ec2/"/></url><url><loc>https://techblog.cisco.com/blog/hollowtrees/</loc><lastmod>2018-01-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/hollowtrees/"/></url><url><loc>https://techblog.cisco.com/blog/oauth2-vault/</loc><lastmod>2018-01-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/oauth2-vault/"/></url><url><loc>https://techblog.cisco.com/tags/oauth2/</loc><lastmod>2018-01-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/oauth2/"/></url><url><loc>https://techblog.cisco.com/tags/tokens/</loc><lastmod>2018-01-26T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/tokens/"/></url><url><loc>https://techblog.cisco.com/blog/spark-history-server/</loc><lastmod>2018-01-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-history-server/"/></url><url><loc>https://techblog.cisco.com/blog/aks-challanges/</loc><lastmod>2018-01-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/aks-challanges/"/></url><url><loc>https://techblog.cisco.com/tags/efs/</loc><lastmod>2018-01-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/efs/"/></url><url><loc>https://techblog.cisco.com/blog/tensorflow-on-k8s/</loc><lastmod>2018-01-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/tensorflow-on-k8s/"/></url><url><loc>https://techblog.cisco.com/blog/aws_provision_efs/</loc><lastmod>2018-01-15T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/aws_provision_efs/"/></url><url><loc>https://techblog.cisco.com/blog/tidb-kubernetes/</loc><lastmod>2018-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/tidb-kubernetes/"/></url><url><loc>https://techblog.cisco.com/tags/tidb/</loc><lastmod>2018-01-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/tidb/"/></url><url><loc>https://techblog.cisco.com/blog/java-resource-limits/</loc><lastmod>2018-01-09T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/java-resource-limits/"/></url><url><loc>https://techblog.cisco.com/blog/zeppelin-spark-k8s-2/</loc><lastmod>2018-01-08T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/zeppelin-spark-k8s-2/"/></url><url><loc>https://techblog.cisco.com/tags/postman/</loc><lastmod>2018-01-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/postman/"/></url><url><loc>https://techblog.cisco.com/blog/postman/</loc><lastmod>2018-01-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/postman/"/></url><url><loc>https://techblog.cisco.com/blog/spark-k8s-internals/</loc><lastmod>2018-01-02T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-k8s-internals/"/></url><url><loc>https://techblog.cisco.com/blog/top-3-blogs-2017-and-next/</loc><lastmod>2017-12-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/top-3-blogs-2017-and-next/"/></url><url><loc>https://techblog.cisco.com/tags/debug101/</loc><lastmod>2017-12-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/debug101/"/></url><url><loc>https://techblog.cisco.com/blog/jetcd_bug/</loc><lastmod>2017-12-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/jetcd_bug/"/></url><url><loc>https://techblog.cisco.com/tags/jetcd/</loc><lastmod>2017-12-21T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/jetcd/"/></url><url><loc>https://techblog.cisco.com/blog/spotguides/</loc><lastmod>2017-12-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spotguides/"/></url><url><loc>https://techblog.cisco.com/authors/miklos-csendes/</loc><lastmod>2017-12-20T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/authors/miklos-csendes/"/></url><url><loc>https://techblog.cisco.com/blog/spark-monitoring/</loc><lastmod>2017-12-18T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-monitoring/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-howto/</loc><lastmod>2017-12-14T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-howto/"/></url><url><loc>https://techblog.cisco.com/blog/pipeline-first-release/</loc><lastmod>2017-12-12T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/pipeline-first-release/"/></url><url><loc>https://techblog.cisco.com/blog/hollowtrees-intro/</loc><lastmod>2017-12-07T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/hollowtrees-intro/"/></url><url><loc>https://techblog.cisco.com/blog/zeppelin-spark-k8/</loc><lastmod>2017-12-05T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/zeppelin-spark-k8/"/></url><url><loc>https://techblog.cisco.com/blog/kubecon/</loc><lastmod>2017-12-04T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/kubecon/"/></url><url><loc>https://techblog.cisco.com/tags/scaling/</loc><lastmod>2017-12-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/scaling/"/></url><url><loc>https://techblog.cisco.com/blog/scaling-spark-k8s/</loc><lastmod>2017-12-01T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/scaling-spark-k8s/"/></url><url><loc>https://techblog.cisco.com/blog/node-join-ec2-issue/</loc><lastmod>2017-11-29T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/node-join-ec2-issue/"/></url><url><loc>https://techblog.cisco.com/blog/spark-k8s/</loc><lastmod>2017-11-27T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/spark-k8s/"/></url><url><loc>https://techblog.cisco.com/blog/azure-aks/</loc><lastmod>2017-11-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/azure-aks/"/></url><url><loc>https://techblog.cisco.com/tags/core-values/</loc><lastmod>2017-11-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/core-values/"/></url><url><loc>https://techblog.cisco.com/tags/startup/</loc><lastmod>2017-11-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/startup/"/></url><url><loc>https://techblog.cisco.com/blog/key-values/</loc><lastmod>2017-11-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/key-values/"/></url><url><loc>https://techblog.cisco.com/tags/transparency/</loc><lastmod>2017-11-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/transparency/"/></url><url><loc>https://techblog.cisco.com/team/</loc><lastmod>2017-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/team/"/></url><url><loc>https://techblog.cisco.com/benefits/</loc><lastmod>2017-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/benefits/"/></url><url><loc>https://techblog.cisco.com/contact/</loc><lastmod>2017-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/contact/"/></url><url><loc>https://techblog.cisco.com/contact/content/</loc><lastmod>2017-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/contact/content/"/></url><url><loc>https://techblog.cisco.com/team/marton-sereg/</loc><lastmod>2017-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/team/marton-sereg/"/></url><url><loc>https://techblog.cisco.com/support/</loc><lastmod>2017-03-24T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/support/"/></url><url><loc>https://techblog.cisco.com/blog/</loc><lastmod>2017-03-23T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/blog/"/></url><url><loc>https://techblog.cisco.com/docs/bank-vaults/cloud-permissions/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/docs/bank-vaults/cloud-permissions/"/></url><url><loc>https://techblog.cisco.com/docs/bank-vaults/mutating-webhook/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/docs/bank-vaults/mutating-webhook/"/></url><url><loc>https://techblog.cisco.com/docs/one-eye/logging-operator/configuration/crds/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/docs/one-eye/logging-operator/configuration/crds/"/></url><url><loc>https://techblog.cisco.com/docs/one-eye/logging-operator/configuration/plugins/filters/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/docs/one-eye/logging-operator/configuration/plugins/filters/"/></url><url><loc>https://techblog.cisco.com/docs/one-eye/logging-operator/configuration/plugins/outputs/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/docs/one-eye/logging-operator/configuration/plugins/outputs/"/></url><url><loc>https://techblog.cisco.com/topic/techblog-learn/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/topic/techblog-learn/"/></url><url><loc>https://techblog.cisco.com/topic/techblog-app-first/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/topic/techblog-app-first/"/></url><url><loc>https://techblog.cisco.com/tags/ci/cd/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/ci/cd/"/></url><url><loc>https://techblog.cisco.com/docs/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/docs/"/></url><url><loc>https://techblog.cisco.com/topic/techblog-future/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/topic/techblog-future/"/></url><url><loc>https://techblog.cisco.com/tags/highlight/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/tags/highlight/"/></url><url><loc>https://techblog.cisco.com/topic/techblog-planet/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/topic/techblog-planet/"/></url><url><loc>https://techblog.cisco.com/true/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/true/"/></url><url><loc>https://techblog.cisco.com/topic/</loc><changefreq>daily</changefreq><priority>1</priority><xhtml:link rel="alternate" hreflang="x-default" href="https://techblog.cisco.com/topic/"/></url></urlset>