Bion DevOps Team

Confidential Nodes and Computing in GKE

Do you feel like a spy? No worries, you’re in a good place to explore Confidential Computing and...

Running Production-Ready Databases on EKS - Part 1

Introduction

Briefly, a Stateless Application implies that a process never stores a state/data that...

GCP IAP Tunnelling on Ansible with Dynamic Inventory

One of our main motivations at Bion is to automate everything eventually. With this motivation in...

Detecting Threats and Securing the Kubernetes Environment with Falco

We are always looking for best practices while working with the Kubernetes cluster to secure our...

Karpenter - Native Kubernetes Workload Scheduler

In Kubernetes, the ability to scale the infrastructure dynamically based on demand is a major...

Monitoring and Gathering Metrics from Kubernetes Audit Logs

Log files, streams and messages provide lots of information about what's going on at runtime. Since...

Tag Enforcement in AWS - Part 2

In this blog post, we will continue to explain how to go beyond good intentions with your tagging...

Using KEDA to trigger HPA with Prometheus Metrics

This blog post will explain the external metric providers for Kubernetes, which allows us to...

Tag Enforcement in AWS - Part 1

The motivation of the Blog Post; In AWS, tagging is an essential part of cost visibility and...

Securing Kubernetes Workloads Using Anchore Engine

Everyone wants to implement a secure system, but it’s a never-ending job. Day after day, new...