
ELASTISYS BLOG POSTS
Expert Insights
Discover our blog filled with security and compliance best practices, platform how-to’s, cloud native trends, and a rich collection of other expert insights designed to help you build with confidence.
FILTER POSTS
Categories
Tags
-

Vitalis 2026
Read more: Vitalis 2026Vitalis 2026 – The Leading Arena for E-health in the Nordics See You at Vitalis 2026! 4-7 Maj 2026 | Gothenburg | Sweden Vitalis – the leading arena for the future of e-health in the Nordics. A vibrant meeting place…
-

Rethinking the Cloud-First Mandate: Why Modern Enterprises Are Rebalancing Towards On-Prem and Edge
Read more: Rethinking the Cloud-First Mandate: Why Modern Enterprises Are Rebalancing Towards On-Prem and EdgeCloud-native experts from Avassa and Elastisys explore why modern enterprises are rebalancing from cloud-first to hybrid and edge – driven by EU compliance, resilience, and the need for control.
-

Personalkollen Relies on Welkin for Security, Compliance, and Developer Efficiency
Read more: Personalkollen Relies on Welkin for Security, Compliance, and Developer EfficiencyIn this customer case, we highlight how Personalkollen leverages Welkin to spend less time maintaining a platform and more time delivering value to their customers.
-

How to Plan and Perform a Successful Migration?
Read more: How to Plan and Perform a Successful Migration?With rising regulatory pressure in Europe, many organizations are being urged to leave US-based cloud providers. For engineering teams, this can be daunting if it’s a first migration. This post offers a clear, practical plan to guide the move, reduce…
-

8 Insights from Tech Leaders Öresund #006 – When Technology Meets Business, Architecture, and Chaos
Read more: 8 Insights from Tech Leaders Öresund #006 – When Technology Meets Business, Architecture, and ChaosHow do we build relevant architectures? How do our organizations mirror our systems? And how can mistakes become a strength? In this blog we summarize the discussions from our event Tech Leaders Öresund with IT decision-makers in Skåne.
-

Automating NIS2 Compliance in Kubernetes with Kyverno: A Practical Guide
Read more: Automating NIS2 Compliance in Kubernetes with Kyverno: A Practical GuideLearn how NIS2 impacts platform engineering and get practical implementation insights with Kyverno. This guide helps you overcome “analysis paralysis” and take the first steps toward NIS2 compliance.
-

From +AI to AI+: 10 Insights from Tech Leaders Öresund
Read more: From +AI to AI+: 10 Insights from Tech Leaders ÖresundFrom +AI to AI+. Learn about AI’s possibilities, its challenges, and how companies and society should navigate a world that is changing faster than ever. Here are 10 key insights from the discussions of Tech Leaders Öresund.
-

Secure Growth in Organizations Developing Critical Software: 5 Insights from Tech Leaders Norr
Read more: Secure Growth in Organizations Developing Critical Software: 5 Insights from Tech Leaders NorrAt our event Tech Leaders Norr, IT decision-makers met in Umeå to discuss technical and security challenges that appear during organizational growth, especially in companies that develop critical software.
-

AKS vs Elastisys Managed Kubernetes Platform on Azure
Read more: AKS vs Elastisys Managed Kubernetes Platform on AzureIn this blog post, we explain the benefits of running your applications on top of Welkin Managed on Azure compared to the default AKS deployment.
-

Elastisys Welkin® Featured on Thoughtworks Tech Radar
Read more: Elastisys Welkin® Featured on Thoughtworks Tech RadarWe are thrilled to share that Welkin (formerly Elastisys Compliant Kubernetes) has been featured on the Thoughtworks Tech Radar as a platform technology to assess!
-

Resilient by Design: Managed Welkin on Azure
Read more: Resilient by Design: Managed Welkin on AzureWe’re excited to share that Welkin, our fully managed, secure, and compliant Kubernetes platform, is now available on Microsoft Azure Marketplace.
-

Discover Kubernetes – Security and Scalability for Software Critical to Society
Read more: Discover Kubernetes – Security and Scalability for Software Critical to SocietyFor those of you who are owners, investors, or perhaps part of the management team of a company working with software critical to our society, you’ve probably heard of Kubernetes. But what exactly is it, and why should you care?
-

Elastisys Compliant Kubernetes becomes Welkin!
Read more: Elastisys Compliant Kubernetes becomes Welkin!Compliant Kubernetes is now Welkin! Our platform’s name has changed, but our commitment to secure, compliant, and scalable cloud native solutions remains the same. Learn more about our exciting rebrand!
-

The Business Value of a Kubernetes-Based Platform
Read more: The Business Value of a Kubernetes-Based PlatformThe upcoming NIS2 directive will impact all industry sectors. They will have to tighten up the security of their applications, or risk heavy fines. Learn how a Kubernetes-based platform can reduce the time and cost to implement certain security measures,…
-

Benefits of Kubernetes App Developer Training and Certification with Elastisys and Elastx
Read more: Benefits of Kubernetes App Developer Training and Certification with Elastisys and ElastxDiscover the benefits of Kubernetes Application Developer training and certification with Elastisys and Elastx. Learn about course content, hands-on labs, expert instructors, and how this training can enhance your Cloud Native skills and prepare you for the CKAD exam. Plus,…
-

The 7-step Innovation Process
Read more: The 7-step Innovation ProcessFor decades, the “build-measure-learn” mantra guided SaaS innovation. Today, compliance with regulations is crucial, especially in sectors critical to society like healthcare. This blog presents Swelife’s 7-step innovation process, blending creativity with compliance. From clarifying ideas and mapping information flow…
-

Business Continuity: Cybersecurity in Focus
Read more: Business Continuity: Cybersecurity in FocusFor the second time this spring, Elastisys invited leading cybersecurity experts in northern Sweden to share knowledge and discuss cybersecurity. In this blog post, we at Elastisys summarize the key insights from these discussions.
-

Elastisys Fully Managed Kubernetes Platform is Now Also Available on Azure
Read more: Elastisys Fully Managed Kubernetes Platform is Now Also Available on AzureWe at Elastisys are excited to announce that our fully managed Kubernetes platform solution is now available on Microsoft Azure. This strategic expansion marks a significant milestone in our mission to provide innovative cloud solutions tailored to the specific needs…
-

3 Key Takeaways from Vitalis 2024
Read more: 3 Key Takeaways from Vitalis 2024Explore the key insights from Vitalis 2024, Scandinavia’s largest eHealth event. Discover the role of AI/ML in healthcare innovation, the implications of the upcoming NIS2 directive, and the success stories of leading health tech innovators.
-

5 Key Takeaways from KubeCon EU 2024
Read more: 5 Key Takeaways from KubeCon EU 2024Being big fans of platform engineering, we at Elastisys went to Paris to listen in on the latest and greatest trends in the area. Delve into the 5 key takeaways from KubeCon EU 2024, handpicked by our DPO and Product…
-

Cybersecurity Trends 2024 – How Can We Face the Threats Together?
Read more: Cybersecurity Trends 2024 – How Can We Face the Threats Together?Cybersecurity Trends 2024 – How Can We Face the Threats Together? Elastisys recently brought together top cybersecurity experts in Norrland (Northern Sweden), including those in charge of critical societal services, suppliers to these services, and other industry professionals, for an…
-

How Elastisys responds to the Redis license change
Read more: How Elastisys responds to the Redis license changeHow Elastisys Responds to the Redis License Change The company behind Redis, Redis Labs, has changed the license of an upcoming release of Redis to one that disallows offering it as a managed service. This message explains how Elastisys responds.…
-

NIS2: But what exactly do I need to do?
Read more: NIS2: But what exactly do I need to do?NIS2 is on everyone’s mind and it is natural to worry about the implementation burden that NIS2 would bring on your organization. In this post, we’ll illustrate what the NIS2 Directive really means for you who is a CTO or…
-

Secure Kubernetes Operational Practices: Protecting Access Credentials
Read more: Secure Kubernetes Operational Practices: Protecting Access CredentialsLearn how Elastisys protects access credentials on all levels: cloud infrastructure, Kubernetes API, and SSH logins to servers. In this article, we explain one very important aspect of how we earn that faith: how we work with access credentials on…
-

Secure Kubernetes Operational Practices: Cross-provider Disaster Recovery
Read more: Secure Kubernetes Operational Practices: Cross-provider Disaster RecoverySay your cloud provider is ransomware attacked. Switching regions won’t help: those are compromised, too. Learn how Elastisys implements “cross-provider” disaster recovery for our customers, which is great for all customers, and in particular those in sectors of high criticality…
-

All You Need to Know About NIS2
Read more: All You Need to Know About NIS2In this blog post, we present what the recently passed EU NIS2 Directive is and how it will increase the security of networked IT systems in the EU.
-

Reflecting on 2023: A Year in Review with Elastisys
Read more: Reflecting on 2023: A Year in Review with ElastisysLet’s delve into the highlights that made 2023 an extraordinary chapter in the company’s journey, together with our CEO, Johan Tordsson.
-

Container Platforms: Why and How?
Read more: Container Platforms: Why and How?This article is all about demystifying container platforms and showing what value they bring on several levels: business, organization, and tech.
-

Digital Sovereignty for European Companies
Read more: Digital Sovereignty for European CompaniesOne of the most common challenges for companies needing data security is choosing between security and efficient software development. And, of course, understanding the risks associated with this trade-off.
-

Elastisys Launches New Service to Meet Customer Demand
Read more: Elastisys Launches New Service to Meet Customer DemandWe’re thrilled to announce the launch of our Self-Managed Kubernetes platform with Elastisys support, marking a significant milestone for us. At Elastisys, we take pride in our commitment to enhancing security and regulatory compliance for critical infrastructure.
-

Prorenata’s Strategic Move: Bringing Their Application Back Home
Read more: Prorenata’s Strategic Move: Bringing Their Application Back HomeProrenata uses Welkin and Elastx to ensure all data stays in Sweden – meeting GDPR, Patientdatalagen, and ISO-27001 demands. With a fully managed platform, their team can focus on innovating for school healthcare and winning public procurements.
-

Confidential Computing: Great for Security, not for Privacy
Read more: Confidential Computing: Great for Security, not for PrivacyConfidential Computing: Strong security, privacy questions. Elastisys offers EU-based Kubernetes solutions.
-

Elastisys Raises a 30 Million SEK Investment
Read more: Elastisys Raises a 30 Million SEK InvestmentFinally, we can announce the closing of another round of funding where Elastisys raises a 30 million SEK investment to further drive our rapid expansion.
-

The GDPR Storyline: From “Let’s Wait and See” to “We Need to Run in EU Jurisdiction Now”
Read more: The GDPR Storyline: From “Let’s Wait and See” to “We Need to Run in EU Jurisdiction Now”Discover the journey behind a lost public procurement and gain insights into the evolving landscape of GDPR implementation. Learn from past experiences and navigate data protection regulations effectively.
-

Elsa Science – Customer Success Story
Read more: Elsa Science – Customer Success StoryHow Elastisys managed Kubernetes platform enables Elsa Science to improve quality of life for patients with rheumatoid arthritis, empowering them to live every day to its fullest.
-

Kubernetes VS Docker
Read more: Kubernetes VS DockerKubernetes? Docker? Both?! Learn about Kubernetes and Docker and gain a better understanding of how these technologies are used in the Cloud Native ecosystem.
-

Kubernetes “What is”
Read more: Kubernetes “What is”Our DevOps engineers explain basic Kubernetes and container concepts, such as Nodes, Pods, Deployments, and many more.
-

How to Security-Harden Kubernetes Against Unknown Unknowns
Read more: How to Security-Harden Kubernetes Against Unknown UnknownsIn this guide we discuss how to security-harden your Kubernetes platform against “known unknowns” and “unknown unknowns” with restrictive NetworkPolicies, vulnerability management and intrusion detection.”
-

Connect Your IDP to Your Welkin Cluster
Read more: Connect Your IDP to Your Welkin ClusterLearn what information you need to provide to connect your Google or Azure IDP to your Managed Compliant Kubernetes cluster.
-

Operating Secure Kubernetes Platforms: Maintenance
Read more: Operating Secure Kubernetes Platforms: MaintenanceKeeping key software components up to date is crucial to operate a secure Kubernetes platform. Learn what to automate and how!
-

Operating Secure Kubernetes Platforms: Disaster Recovery
Read more: Operating Secure Kubernetes Platforms: Disaster RecoveryOperating secure Kubernetes platforms requires ability to recover from when disaster strikes. Preparation in the form of frequent backups and training are key to success.
-

Process for Passing the BSI IT-Grundschutz Audit
Read more: Process for Passing the BSI IT-Grundschutz AuditLearn how Elastisys helped Data4Life, a German non-profit HealthTech company, establish a process that helped them pass the BSI IT-Grundschutz audit.
-

Operating Secure Kubernetes Platforms: Alerting Culture
Read more: Operating Secure Kubernetes Platforms: Alerting CultureThis is the second blog post in a series on operating a secure Kubernetes platform. Read the blog post to see why alerting culture is important, an example of how it’s used in practice, why it matters, and its greater…
-

Edge Computing with Avassa and Elastisys Welkin
Read more: Edge Computing with Avassa and Elastisys WelkinLearn how to design a two-tiered application for edge and cloud with Avassa and Elastisys Compliant Kubernetes in this white-paper.
-

Enable Open Policy Agent (OPA) Policies
Read more: Enable Open Policy Agent (OPA) PoliciesLearn how to ensure that your application follows security best practices by enabling the OPA-enforced safeguards in Compliant Kubernetes.
-

Operating Secure Kubernetes Platforms: Setting the Scope
Read more: Operating Secure Kubernetes Platforms: Setting the ScopeRead this blog post to see why the scope is important, an example of how it’s used in practice, why it matters, and its greater context.
-

How to Operate a Secure Kubernetes Platform
Read more: How to Operate a Secure Kubernetes PlatformThis guide discusses the four most important aspects when operating a secure Kubernetes platform. Having been with Kubernetes since 2015, we identified these aspects to still challenge platform teams, even as technology matures.
-

Elastisys och Avassa inleder partnerskap
Read more: Elastisys och Avassa inleder partnerskapElastisys och Avassa krokar arm för att erbjuda flexibel applikationshantering i centrala och distribuerade moln.
-

The Why, How, and What of Kubernetes Access Control
Read more: The Why, How, and What of Kubernetes Access ControlAccess control is about deciding and enforcing who gets to do what in a system. Learn the why, how, and what of Kubernetes access control.
-

What Was Observability Again?
Read more: What Was Observability Again?Let us dive deeper into observability: What it is, different types of observability, and what it technically means to implement observability. At the end of this post, you will understand why you should resist the temptation to save a few…
-

Alternatives to Consider Before Investing in Service Meshes
Read more: Alternatives to Consider Before Investing in Service Meshes4 alternatives to service meshes which – in our experience – are closer to what administrators are already familiar with.
-

How to Strike a Healthy Balance Between Dev and Ops (DevOps?)
Read more: How to Strike a Healthy Balance Between Dev and Ops (DevOps?)In this post, we share thoughts on the psyche of Dev and Ops engineers. What motivates them, how they prefer to work, and how to help them strike a balance between Dev and Ops tasks, such that you can adopt…
-

Nu finns Elastisys Kubernetes Platform as a Service tillgänglig hos Elastx
Read more: Nu finns Elastisys Kubernetes Platform as a Service tillgänglig hos ElastxÄntligen kan vi meddela att Elastisys Kubernetes Platform as a Service (KPaaS) finns tillgänglig på Elastx infrastruktur!
-

Zen and the Art of Application Dashboards
Read more: Zen and the Art of Application DashboardsApplication dashboards over user happiness! Leverage application dashboards with Prometheus and Grafana to understand what truly matters.
-

Cloud Native: Why Bother, Its Benefits, and Its Greatest Pitfall
Read more: Cloud Native: Why Bother, Its Benefits, and Its Greatest PitfallIn this article, we will focus on the benefits cloud native technology brings, how it brings them, and also, the greatest pitfall.
-

Free Guide: How to Security Harden Kubernetes in 2022
Read more: Free Guide: How to Security Harden Kubernetes in 2022How to security harden Kubernetes in 2022. The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations.
-

Busting vCluster Myths: What Is a Virtual Cluster?
Read more: Busting vCluster Myths: What Is a Virtual Cluster?This blog examines how vcluster behaves on a security-hardened Kubernetes platform and shows that, while helpful for testing platform components, it still inherits the physical cluster’s restrictions.
-

Best Practices for Deploying Applications to Production in Kubernetes
Read more: Best Practices for Deploying Applications to Production in KubernetesThis blog walks through practical best practices for taking Kubernetes applications to production so you can load test realistically, verify resilience and recovery, and redeploy from scratch with confidence instead of firefighting.
-

Why and How Should You Reboot Kubernetes Nodes?
Read more: Why and How Should You Reboot Kubernetes Nodes?This blog explains why regularly rebooting Kubernetes Nodes is essential for keeping security patches active, and shows how administrators and developers can coordinate smooth, low-impact reboots that keep both the cluster and the applications running safely.
-

Cost-Effective Preview Environments in Kubernetes
Read more: Cost-Effective Preview Environments in KubernetesHow Elastisys helped FRISQ create cost-effective preview environments in Kubernetes – with single click on-demand deployment.
-

The Difference Between Liveness and Readiness Probes in Kubernetes
Read more: The Difference Between Liveness and Readiness Probes in KubernetesThis blog clarifies the real difference between readiness and liveness probes in Kubernetes and explains how to use them correctly so your applications stay stable, avoid needless restarts, and handle temporary failures gracefully.
-

Why We Selected Thanos for Long Term Metrics Storage
Read more: Why We Selected Thanos for Long Term Metrics StorageLong-term Metrics Storage: Thanos vs. Cortex vs. InfluxDB vs. M3DB vs. VictoriaMetrics vs. TimescaleDB Why we selected Thanos among 28 Prometheus integrations.
-

HOW TO Stop Running Containers as Root
Read more: HOW TO Stop Running Containers as RootThis blog explains why running containers as root is a major security risk and shows practical steps for switching to non-privileged users in your images and Kubernetes manifests, helping you harden your workloads without breaking functionality.
-

Leveraging Kubernetes to Run Databases, Message Queues, and In-Memory Caches: How We Built a Truly Portable Platform
Read more: Leveraging Kubernetes to Run Databases, Message Queues, and In-Memory Caches: How We Built a Truly Portable PlatformThis blog shows how standardising on Kubernetes lets you run databases, message queues and caches securely across any cloud or on-premise environment, and explains how operators and built-in Kubernetes capabilities make it possible to build a truly portable, future-proof platform.
-

Istio and OAuth2-Proxy in Kubernetes for Microservice Authentication
Read more: Istio and OAuth2-Proxy in Kubernetes for Microservice AuthenticationHOWTO use Istio and OAuth2-Proxy to secure all your micro-service endpoints in a centralized and easily managed way on Kubernetes.
-

DevOps: Why It Is Misunderstood & What It Always Should Have Been
Read more: DevOps: Why It Is Misunderstood & What It Always Should Have BeenWe discuss the difference in skill sets between developers and platform operators. And what a realistic approach to DevOps truly means.
-

Our 15 Principles for Designing and Deploying Scalable Applications on Kubernetes
Read more: Our 15 Principles for Designing and Deploying Scalable Applications on KubernetesOur 15 principles for how to design and deploy cloud native applications on Kubernetes – for scalability, observability, automation & security.
-

The GDPR Storyline: From “Business as Usual” to “We Need to Run in EU Jurisdiction”
Read more: The GDPR Storyline: From “Business as Usual” to “We Need to Run in EU Jurisdiction”How should you technically implement GDPR? A myriad of court rulings, opinions, recitals and guidelines has brought much needed clarity.
-

How to Do Vulnerability Management via Image Scanning in Harbor
Read more: How to Do Vulnerability Management via Image Scanning in HarborIn this article, we describe what container vulnerability scanning is, how it is done, and how open source tools help automate the procedure.
-

The Challenges of Availability Zone Outage
Read more: The Challenges of Availability Zone OutageThe Challenges of Availability Zone Outage AWS recently had an outage of one of their availability zones in their US East region. The outage took down parts of popular services such as Slack and Hulu. The effects were felt worldwide:…
-

4 Actionable Advice When Moving to EU Clouds
Read more: 4 Actionable Advice When Moving to EU CloudsFour invaluable pieces of advice for those that migrate from US- to EU-owned clouds for GDPR compliance reasons.
-

Elastisys Announces CEO Transition
Read more: Elastisys Announces CEO TransitionElastisys announces that Johan Tordsson has been appointed interim CEO by the Board of Directors as Robert Winter steps down as CEO during the beginning of 2022.
-

Using Lens with Compliant Kubernetes
Read more: Using Lens with Compliant KubernetesThis post explains how Lens provides an easy, secure graphical interface for managing Compliant Kubernetes clusters. It shows how Lens works with your existing permissions, requires no extra setup in the cluster, supports Helm, and can be quickly installed and…
-

How to Integrate Your CI/CD Pipeline with Kubernetes When Using Role Based Access Control (RBAC)
Read more: How to Integrate Your CI/CD Pipeline with Kubernetes When Using Role Based Access Control (RBAC)In this article, I’ll walk you through different kinds of CI/CD pipelines and how you can integrate them with your existing RBAC solution.
-

Access control via OpenID Connect (OIDC)
Read more: Access control via OpenID Connect (OIDC)This blog post gets hands-on about access control, including everything from the difference between authentication and authorization, how this works in a couple of CNCF projects, and how to set it all up.
-

Managed Container Services: KaaS, KPaaS & CaaS Explained and Compared
Read more: Managed Container Services: KaaS, KPaaS & CaaS Explained and ComparedA comparison between Kubernetes as a Service (e.g (EKS, GKE, AKS), Kubernetes Platform as a Services & Containers as a Service (e.g Fargate).
-

What do I need to add on top of Kubernetes?
Read more: What do I need to add on top of Kubernetes?Is Kubernetes sufficient by itself? This post highlights the features that a DevOps team typically needs to add on top of a vanilla Kubernetes cluster to obtain a secure, production-ready Kubernetes cluster.
-

Redundancy across Data Centers with Kubernetes, WireGuard and Rook
Read more: Redundancy across Data Centers with Kubernetes, WireGuard and RookIn this post, we will show you how we solve Cross-data-center redundancy using Kubernetes, Rook / Ceph, Calico and WireGuard.
-

NSA and CISA Kubernetes Security Guidance: Summarized and Explained
Read more: NSA and CISA Kubernetes Security Guidance: Summarized and ExplainedKubernetes is now the most popular container orchestration platform. This article is an informative read for decision makers
-

Automatic Multi-cluster Deployments and Services in Kubernetes
Read more: Automatic Multi-cluster Deployments and Services in KubernetesLearn how Multi-Cluster Kubernetes (mck8s) uses custom Controllers to vastly improve the multi-cluster experience and how you can deploy it.
-

Why Kubernetes was inevitable
Read more: Why Kubernetes was inevitableIn this article, I walk down my own memory lane and share my embarrassing experience from cobbling together much of what Kubernetes is today. Why do I now love Kubernetes? You’ll see when you read it.
-

Evaluation of Caching Methodologies for Microservice-Based Architectures in Kubernetes
Read more: Evaluation of Caching Methodologies for Microservice-Based Architectures in KubernetesJoel Sandman’s Master thesis evaluating caching methodologies (full-page and fine-grained caching) of microservices in Kubernetes.
-

“But what if we just use encryption?” – Practical GDPR for CTOs
Read more: “But what if we just use encryption?” – Practical GDPR for CTOs“But what if we just use encryption?” I get this a lot from CTOs when it comes to GDPR compliance. Can we use US cloud services if we encrypt the data?
-

Introducing ARVOS: Vulnerability Management Done Right
Read more: Introducing ARVOS: Vulnerability Management Done RightToday, Elastisys and Debricked announced the joint project ARVOS – using AI and eBPF to turn 53 vulnerabilities into 2 action points.
-

Cloud-agnostic third party managed Kubernetes services – the unexploited opportunity
Read more: Cloud-agnostic third party managed Kubernetes services – the unexploited opportunityManaged Kubernetes services from cloud providers are not for everyone. We list 5 benefits of using a cloud-agnostic managed Kubernetes.
-

Kube-Prometheus – A Complete Monitoring Stack Using Jsonnet
Read more: Kube-Prometheus – A Complete Monitoring Stack Using JsonnetMonitoring your application and its platform is basic hygiene for running a healthy software-as-a-service business. But how exactly do you monitor your application? In this post, we will illustrate how to achieve that using kube-prometheus.
-

How open source benefits business continuity
Read more: How open source benefits business continuityOne of the most important aspects of compliance is business continuity. In this post, we will explain how using off-the-shelf open source components makes business continuity planning a breeze for risk officers.
-

Enforcing Policy as Code using OPA and Gatekeeper in Kubernetes
Read more: Enforcing Policy as Code using OPA and Gatekeeper in KubernetesThis post explains how to use OPA and Gatekeeper to enforce policy as code in Kubernetes. It walks through installing Gatekeeper, creating simple policies, and blocking non-compliant resources—helping teams automatically prevent configuration and security mistakes.
-

Elastisys Engineering: How to use Dex with Google accounts to manage access in Kubernetes
Read more: Elastisys Engineering: How to use Dex with Google accounts to manage access in KubernetesEverything needed to use Google as your identity provider in a Kubernetes cluster.
-

Elastisys contributes Kubespray support for UpCloud
Read more: Elastisys contributes Kubespray support for UpCloudElastisys is committed to open source, and to supporting Kubernetes on a wide range of cloud infrastructure. Our recently contributed updates enable Kubespray to fully support the features of our partner cloud infrastructure provider UpCloud.
-

Welkin 21-03.2 Network Policy Dashboards: Defend against data breaches
Read more: Welkin 21-03.2 Network Policy Dashboards: Defend against data breachesWe are proud to announce the release of Welkin 21-03.2, our second release in March. Among the most exciting features are dashboards for auditing Kubernetes network policies.
-

A Fortnight in the Life of the Welkin DevOps Team
Read more: A Fortnight in the Life of the Welkin DevOps TeamIn this blog post, we’ll give you an insight in the daily life of the team, starting top down with the operations part.
-

Ny CISO-panel som underlättar regelefterlevnad
Read more: Ny CISO-panel som underlättar regelefterlevnadElastisys senaste produktversion – Welkin 21-03 – är specifikt utformad för att säkerställa högre säkerhet och enklare efterlevnad i den nya, moderna infrastrukturen.
-

CTO Headaches: Top 5 cloud-to-cloud migration woes (and how to solve them!)
Read more: CTO Headaches: Top 5 cloud-to-cloud migration woes (and how to solve them!)Ensure your cloud-to-cloud migration is cost-effective and successful. Careful service inventory required but cloud native tech come to the rescue!
-

Elastisys and OVHcloud partner up to provide GDPR-compliant managed container services
Read more: Elastisys and OVHcloud partner up to provide GDPR-compliant managed container servicesElastisys today announced Europe’s biggest cloud provider OVHcloud as a Partner. This partnership will enable customers of both companies to access enterprise grade security-focused container services that are fully EU compliant.
-

Svensk utmanare ingår partnerskap med Europas största molnleverantör
Read more: Svensk utmanare ingår partnerskap med Europas största molnleverantörDet norrländska snabbväxande bolaget Elastisys offentliggjorde idag sitt partnerskap med OVHcloud, Europas största molnleverantör. Partnerskapet stärker det europeiska utbudet av moderna molntjänster och erbjuder GDPR-säker behandling av personuppgifter.
-

Elastisys Engineering: How to set up Kubernetes on Exoscale
Read more: Elastisys Engineering: How to set up Kubernetes on ExoscaleIn this Elastisys Engineering blog post, we show how to set up a production-ready Kubernetes cluster on Exoscale using kubespray and Terraform. It gets a control plane and a set of worker nodes, and leverages Rook and Ceph to get…
-

DevSecOps as a Service explained
Read more: DevSecOps as a Service explainedWhat is DevSecOps as a Service? Our philosophy is that “DevSecOps” is a functional role, not individual people. So rather than hiring an individual DevSecOps expert on a professional service basis as a consultant, you get a dedicated multi-person team.
-

Elastisys Engineering: How to set up Rook with Ceph on Kubernetes
Read more: Elastisys Engineering: How to set up Rook with Ceph on KubernetesLearn how to set up Rook with Ceph on Kubernetes to get dynamic Persistent Volume support even in cloud environments without a block storage service or in bare metal, on-premise setups.