Alternatives to Consider Before Investing in Service Meshes 4 alternatives to service meshes which – in our experience – are closer to what…
Why We Selected Thanos for Long Term Metrics Storage Long-term Metrics Storage: Thanos vs. Cortex vs. InfluxDB vs. M3DB vs. VictoriaMetrics vs. TimescaleDB Why…
HOW TO Stop Running Containers as Root Running containers as root is a bad idea for security. This has been shown time…
Istio and OAuth2-Proxy in Kubernetes for Microservice Authentication HOWTO use Istio and OAuth2-Proxy to secure all your micro-service endpoints in a centralized and…
DevOps: Why It Is Misunderstood & What It Always Should Have Been We discuss the difference in skill sets between developers and platform operators. And what a…
Free Guide: How to Security-Harden Kubernetes Against Unknown Unknowns Security-harden Kubernetes against "unknown unknowns" using network policies, vulnerability management, and an intrusion detection system!
Free Guide: How to Operate a Secure Kubernetes Platform This guide discusses the four most important aspects when operating a secure Kubernetes platform.
Free Guide: How to Security Harden Kubernetes in 2022 How to security harden Kubernetes in 2022. The NSA/CISA guidelines summarized, with Elastisys hands-on advice…
Free Guide: Our 15 Principles for Designing and Deploying Scalable Applications on Kubernetes Our 15 principles for how to design and deploy cloud native applications on Kubernetes -…
Free Guide: Scalability Design Principles Our 10 best software scalability design principles covering the four scalability dimensions: performance, availability, maintenance,…
Operating Secure Kubernetes Platforms: Maintenance Keeping key software components up to date is crucial to operate a secure Kubernetes platform. Learn what to automate and how!
Operating Secure Kubernetes Platforms: Disaster Recovery Operating secure Kubernetes platforms requires ability to recover from when disaster strikes. Preparation in the form of frequent backups and training are key to success.
Process for Passing the BSI IT-Grundschutz Audit Learn how Elastisys helped Data4Life, a German non-profit HealthTech company, establish a process that helped them pass the BSI IT-Grundschutz audit.
Operating Secure Kubernetes Platforms: Alerting Culture Operating secure Kubernetes platforms requires an alerting culture of clear, prioritized, actionable alerts supporting administrators 24/7.
Edge Computing with Avassa and Elastisys Compliant Kubernetes Learn how to design a two-tiered application for edge and cloud with Avassa and Elastisys Compliant Kubernetes in this white-paper.
Enable Open Policy Agent (OPA) Policies Learn how to ensure that your application follows security best practices by enabling the OPA-enforced safeguards in Compliant Kubernetes.