<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://faultdomain.io/</loc></url><url><loc>https://faultdomain.io/blog/bilateral-mesh-agreements/</loc></url><url><loc>https://faultdomain.io/blog/codifying-compliance/</loc></url><url><loc>https://faultdomain.io/blog/defense-in-depth-k8s-networking/</loc></url><url><loc>https://faultdomain.io/blog/gang-scheduling-k8s/</loc></url><url><loc>https://faultdomain.io/blog/outbound-only-cluster-architecture/</loc></url><url><loc>https://faultdomain.io/blog/self-managing-k8s-clusters/</loc></url><url><loc>https://faultdomain.io/blog/service-mesh-vs-network-policy/</loc></url><url><loc>https://faultdomain.io/book/00-introduction/</loc></url><url><loc>https://faultdomain.io/book/01-the-platform-problem/</loc></url><url><loc>https://faultdomain.io/book/02-intent-over-infrastructure/</loc></url><url><loc>https://faultdomain.io/book/03-code-over-configuration/</loc></url><url><loc>https://faultdomain.io/book/04-designing-your-api-surface/</loc></url><url><loc>https://faultdomain.io/book/05-provisioning-clusters-declaratively/</loc></url><url><loc>https://faultdomain.io/book/06-the-self-managing-cluster/</loc></url><url><loc>https://faultdomain.io/book/07-multi-cluster-communication/</loc></url><url><loc>https://faultdomain.io/book/08-the-derivation-pipeline/</loc></url><url><loc>https://faultdomain.io/book/09-secrets/</loc></url><url><loc>https://faultdomain.io/book/10-autoscaling-quotas-cost/</loc></url><url><loc>https://faultdomain.io/book/11-packages-and-escape-hatches/</loc></url><url><loc>https://faultdomain.io/book/12-security-architecture/</loc></url><url><loc>https://faultdomain.io/book/13-authorization-and-network-policy/</loc></url><url><loc>https://faultdomain.io/book/14-supply-chain-and-compliance/</loc></url><url><loc>https://faultdomain.io/book/15-service-mesh-and-identity/</loc></url><url><loc>https://faultdomain.io/book/16-batch-and-gang-scheduling/</loc></url><url><loc>https://faultdomain.io/book/17-gpu-workloads/</loc></url><url><loc>https://faultdomain.io/book/18-model-serving/</loc></url><url><loc>https://faultdomain.io/book/19-observability/</loc></url><url><loc>https://faultdomain.io/book/20-backup-and-disaster-recovery/</loc></url><url><loc>https://faultdomain.io/book/21-testing-the-platform/</loc></url><url><loc>https://faultdomain.io/book/22-cryptographic-discipline/</loc></url><url><loc>https://faultdomain.io/book/23-the-platform-as-product/</loc></url><url><loc>https://faultdomain.io/book/appendix-crd-reference/</loc></url><url><loc>https://faultdomain.io/book/appendix-roadmap/</loc></url><url><loc>https://faultdomain.io/book/capstone-exercises/</loc></url><url><loc>https://faultdomain.io/book/glossary/</loc></url></urlset>