Introduction For over a decade, we've relied on AWS Managed Kubernetes (EKS) clusters to deploy our microservices workloads. As businesses increasingly depend on cloud-native applications, security, and compliance have become critical components for ensuring business continuity and growth. These applications, deployed across clusters,...
Introduction CIS is a renowned nonprofit organization that offers recommendations for security best practices; offerings include a bunch of guidelines for configuring & securely K8s clusters. Trivy is a comprehensive container security auditing tool that brings the power of CIS (Center for Internet Security) compliance...
In the past decade, we have seen industries evolve their businesses by migrating their applications from monolithic to microservices using various container orchestrations such as K8s, ECS, Docker etc. In this process, a lot of effort has been put into designing architecture that should be scalable, robust, reliable, and so on. As...
In Cloud’s Chronology, Kubernetes is most widely used container orchestrator to deploy microservices. In its ecosystem, maintenance is quite challenging. Though numerous companies are grappling daily to quantify/monitor cost utilisation for their running clusters because 99.99% uptime or High Availability of clusters is a bit...