Bion Blog: AWS

Simplified Apache Spark Deployment on AWS EKS with Pod Identity

Apache Spark is pivotal in the big data ecosystem, processing vast amounts of data efficiently and...

Grant AWS Resource Access to AWS EKS: Pod Identity

In Kubernetes, Role-Based Access Control is essential for securing your cluster. In 2019, AWS...

Enhancing Cloud Security for Fintech Startups on AWS

As fintech startups continue to disrupt the financial industry, the adoption of cloud computing has...

Having More Secure AWS Environments with AWS Security Hub - Part 1

How secure do you think your cloud environment is? According to the 2021 Cloud Security Report by ...

Running Production-Ready Databases on EKS-Part 2

This is the 2nd blog post of a series. Please check out the previous one to understand Kubernetes...

Running Production-Ready Databases on EKS - Part 1

Introduction

Briefly, a Stateless Application implies that a process never stores a state/data that...

Karpenter - Native Kubernetes Workload Scheduler

In Kubernetes, the ability to scale the infrastructure dynamically based on demand is a major...

Tag Enforcement in AWS - Part 2

In this blog post, we will continue to explain how to go beyond good intentions with your tagging...

Tag Enforcement in AWS - Part 1

The motivation of the Blog Post; In AWS, tagging is an essential part of cost visibility and...

Amazon EKS: IAM Roles for Service Accounts (IRSA)

In Kubernetes, Role-Based Access Control is a key method for making your cluster secure. If you are...