Bion Blog: Kubernetes

New Relic NOW 2025: The New Era of AI-Driven Observability

Digital systems are living ecosystems of microservices, distributed pipelines, real-time user...

Simplified Apache Spark Deployment on AWS EKS with Pod Identity

Apache Spark is pivotal in the big data ecosystem, processing vast amounts of data efficiently and...

Grant AWS Resource Access to AWS EKS: Pod Identity

In Kubernetes, Role-Based Access Control is essential for securing your cluster. In 2019, AWS...

Running Production-Ready Databases on EKS-Part 2

This is the 2nd blog post of a series. Please check out the previous one to understand Kubernetes...

Confidential Nodes and Computing in GKE

Do you feel like a spy? No worries, you’re in a good place to explore Confidential Computing and...

Running Production-Ready Databases on EKS - Part 1

Introduction

Briefly, a Stateless Application implies that a process never stores a state/data that...

Detecting Threats and Securing the Kubernetes Environment with Falco

We are always looking for best practices while working with the Kubernetes cluster to secure our...

Karpenter - Native Kubernetes Workload Scheduler

In Kubernetes, the ability to scale the infrastructure dynamically based on demand is a major...

Monitoring and Gathering Metrics from Kubernetes Audit Logs

Log files, streams and messages provide lots of information about what's going on at runtime. Since...

Using KEDA to trigger HPA with Prometheus Metrics

This blog post will explain the external metric providers for Kubernetes, which allows us to...