Alternatives to consider before investing in service meshes 4 alternatives to service meshes which – in our experience – are closer to what…
Why We Selected Thanos for Long Term Metrics Storage Long-term Metrics Storage: Thanos vs. Cortex vs. InfluxDB vs. M3DB vs. VictoriaMetrics vs. TimescaleDB Why…
HOWTO stop running containers as root Running containers as root is a bad idea for security. This has been shown time…
Istio and OAuth2-Proxy in Kubernetes for microservice authentication HOWTO use Istio and OAuth2-Proxy to secure all your micro-service endpoints in a centralized and…
DevOps: Why it is misunderstood & what it always should have been We discuss the difference in skill sets between developers and platform operators. And what a…
Free Guide: How to security-harden Kubernetes against unknown unknowns Security-harden Kubernetes against "unknown unknowns" using network policies, vulnerability management, and an intrusion detection system!
Free Guide: How to Operate a Secure Kubernetes Platform This guide discusses the four most important aspects when operating a secure Kubernetes platform.
Free Guide: How to security harden Kubernetes in 2022 How to security harden Kubernetes in 2022. The NSA/CISA guidelines summarized, with Elastisys hands-on advice…
Free Guide: Our 15 Principles for Designing and Deploying Scalable Applications on Kubernetes Our 15 principles for how to design and deploy cloud native applications on Kubernetes -…
Scalability Design Principles Our 10 best software scalability design principles covering the four scalability dimensions: performance, availability, maintenance,…
Kubernetes “what is” Our DevOps engineers explain basic Kubernetes and container concepts, such as Nodes, Pods, Deployments, and many more.
Free Guide: How to security-harden Kubernetes against unknown unknowns Security-harden Kubernetes against "unknown unknowns" using network policies, vulnerability management, and an intrusion detection system!
Connect your IDP to your Compliant Kubernetes cluster Learn what information you need to provide to connect your Google or Azure IDP to your Managed Compliant Kubernetes cluster.
Operating Secure Kubernetes Platforms: Maintenance Keeping key software components up to date is crucial to operate a secure Kubernetes platform. Learn what to automate and how!
Operating Secure Kubernetes Platforms: Disaster Recovery Operating secure Kubernetes platforms requires ability to recover from when disaster strikes. Preparation in the form of frequent backups and training are key to success.
Process for Passing the BSI IT-Grundschutz Audit Learn how Elastisys helped Data4Life, a German non-profit HealthTech company, establish a process that helped them pass the BSI IT-Grundschutz audit.