Bion Blog: AWS

Having More Secure AWS Environments with AWS Security Hub - Part 1

How secure do you think your cloud environment is? According to the 2021 Cloud Security Report by ...

Running Production-Ready Databases on EKS-Part 2

This is the 2nd blog post of a series. Please check out the previous one to understand Kubernetes...

Running Production-Ready Databases on EKS - Part 1

Introduction

Briefly, a Stateless Application implies that a process never stores a state/data that...

Karpenter - Native Kubernetes Workload Scheduler

In Kubernetes, the ability to scale the infrastructure dynamically based on demand is a major...

Tag Enforcement in AWS - Part 2

In this blog post, we will continue to explain how to go beyond good intentions with your tagging...

Tag Enforcement in AWS - Part 1

The motivation of the Blog Post; In AWS, tagging is an essential part of cost visibility and...

Amazon EKS: IAM Roles for Service Accounts (IRSA)

In Kubernetes, Role-Based Access Control is a key method for making your cluster secure. If you are...