Bion Blog

A technical blog about Kubernetes, Kubernetes Security, DevSecOps, AWS, AWS Security and DevOps.

Simplified Apache Spark Deployment on AWS EKS with Pod Identity

Apache Spark is pivotal in the big data ecosystem, processing vast amounts of data efficiently and...

Deployment with Octopus Deploy

Deploying applications can be complex and challenging, significantly as your projects grow in size...

Open Source Container Security: Anchore - Syft & Grype

Containerisation has revolutionised the software industry by enabling developers to build, test,...

Grant AWS Resource Access to AWS EKS: Pod Identity

In Kubernetes, Role-Based Access Control is essential for securing your cluster. In 2019, AWS...

Low-Latency Access for End Users: AWS Local Zones

High latency issues in application/service delivery have adverse effects on both financial outcomes...

Enhancing Cloud Security for Fintech Startups on AWS

As fintech startups continue to disrupt the financial industry, the adoption of cloud computing has...

Database Source Control: The Key to Collaborative Database Development

In today's digital age, databases are at the heart of most business operations. They store critical...

New Relic - Change Tracking

Does change have to be scary? “Change is the only constant in life.” Heraclitus said about change....

Analyse Kubernetes Security Findings with New Relic Vulnerability Management

At Bion Consulting, we care about security and always build using best security practices. I give...

Database DevOps - Why you should do it

In today's fast-paced business environment, organizations are under constant pressure to deliver...