Alternatives to consider before investing in service meshes 4 alternatives to service meshes which – in our experience – are closer to what…
Why We Selected Thanos for Long Term Metrics Storage Long-term Metrics Storage: Thanos vs. Cortex vs. InfluxDB vs. M3DB vs. VictoriaMetrics vs. TimescaleDB Why…
HOWTO stop running containers as root Running containers as root is a bad idea for security. This has been shown time…
Istio and OAuth2-Proxy in Kubernetes for microservice authentication HOWTO use Istio and OAuth2-Proxy to secure all your micro-service endpoints in a centralized and…
DevOps: Why it is misunderstood & what it always should have been We discuss the difference in skill sets between developers and platform operators. And what a…
What was observability again? Let us dive deeper into observability: What it is, the different types and what it…
Alternatives to consider before investing in service meshes 4 alternatives to service meshes which – in our experience – are closer to what…
How to Strike a Healthy Balance Between Dev and Ops (DevOps?) What is the difference in psyche of developers and operators, what makes them great, and…
Zen and the Art of Application Dashboards Application dashboards over user happiness! Leverage application dashboards with Prometheus and Grafana to understand what…
Cloud Native: why bother, its benefits, and its greatest pitfall In this article, we will focus on the benefits cloud native technology brings, how it…
Free Guide: How to security harden Kubernetes in 2022 How to security harden Kubernetes in 2022. The NSA/CISA guidelines summarized, with Elastisys hands-on advice…
Busting vcluster myths: *what is* a virtual cluster? Vcluster allows running a logical Kubernetes cluster within a physical Kubernetes cluster, without needing cluster-admin…
Best Practices for Deploying Applications to Production in Kubernetes Going live with your application and deploying it to production on Kubernetes means you are…
Why and how should you reboot Kubernetes Nodes? As recently highlighted by the Swedish Authority for Privacy Protection (IMY), data breaches are on…