Bion Blog: K8S

Simplified Apache Spark Deployment on AWS EKS with Pod Identity

Apache Spark is pivotal in the big data ecosystem, processing vast amounts of data efficiently and...

Grant AWS Resource Access to AWS EKS: Pod Identity

In Kubernetes, Role-Based Access Control is essential for securing your cluster. In 2019, AWS...

Running Production-Ready Databases on EKS-Part 2

This is the 2nd blog post of a series. Please check out the previous one to understand Kubernetes...

Confidential Nodes and Computing in GKE

Do you feel like a spy? No worries, you’re in a good place to explore Confidential Computing and...

Running Production-Ready Databases on EKS - Part 1

Introduction

Briefly, a Stateless Application implies that a process never stores a state/data that...

Detecting Threats and Securing the Kubernetes Environment with Falco

We are always looking for best practices while working with the Kubernetes cluster to secure our...

Karpenter - Native Kubernetes Workload Scheduler

In Kubernetes, the ability to scale the infrastructure dynamically based on demand is a major...

Monitoring and Gathering Metrics from Kubernetes Audit Logs

Log files, streams and messages provide lots of information about what's going on at runtime. Since...

Using KEDA to trigger HPA with Prometheus Metrics

This blog post will explain the external metric providers for Kubernetes, which allows us to...

Securing Kubernetes Workloads Using Anchore Engine

Everyone wants to implement a secure system, but it’s a never-ending job. Day after day, new...