Bion Blog

A technical blog about Kubernetes, Kubernetes Security, DevSecOps, AWS, AWS Security and DevOps.

Analyse Kubernetes Security Findings with New Relic Vulnerability Management

At Bion Consulting, we care about security and always build using best security practices. I give...

Database DevOps - Why you should do it

In today's fast-paced business environment, organizations are under constant pressure to deliver...

Having More Secure AWS Environments with AWS Security Hub - Part 1

How secure do you think your cloud environment is? According to the 2021 Cloud Security Report by ...

Running Production-Ready Databases on EKS-Part 2

This is the 2nd blog post of a series. Please check out the previous one to understand Kubernetes...

Confidential Nodes and Computing in GKE

Do you feel like a spy? No worries, you’re in a good place to explore Confidential Computing and...

Running Production-Ready Databases on EKS - Part 1

Introduction

Briefly, a Stateless Application implies that a process never stores a state/data that...

GCP IAP Tunnelling on Ansible with Dynamic Inventory

One of our main motivations at Bion is to automate everything eventually. With this motivation in...

Detecting Threats and Securing the Kubernetes Environment with Falco

We are always looking for best practices while working with the Kubernetes cluster to secure our...

Karpenter - Native Kubernetes Workload Scheduler

In Kubernetes, the ability to scale the infrastructure dynamically based on demand is a major...

Monitoring and Gathering Metrics from Kubernetes Audit Logs

Log files, streams and messages provide lots of information about what's going on at runtime. Since...