Explore different tools & platforms for hassle-free and easy management of K8s clusters, here in this blog. Read further to know more!
The Rise of Containers
Today, it wouldn’t be wrong to consider containers and microservice-based architectures as key threads in the fabric of next-gen tools and technologies to modernize enterprise applications. The basic concept behind the approach is to replace traditional, monolithic app development with a Microservices architecture supported by the cloud, API-based services, CI/CD pipelines, and cloud-native storage.
But how easy is the adoption of these advanced tools? Do you have the basic foundation and setup for adopting containers and is your container strategy sustainable for the long haul? These are some of the many challenges that organizations face while adopting containers.
Continue reading “The Rise of Containers: Comparing Amazon ECS and Google Kubernetes￼”
In the last blog, we covered a few and important security practices of AWS IAM but unfortunately, we didn’t cover many security options. So, we bring to you another AWS IAM blog. This blog covers the other remaining and also the important AWS IAM security options. So, it’s time to wear your ironman suit and get started with security edition part-2 [ The endgame ]. Here we go!
Continue reading “AWS IAM: Security edition [part-2]”
In the last blog, we talked about why proper management is important for AWS IAM which is not only related to security but also paves an appropriate way of handling things.
Now we’ll discuss some approaches to manage IAM, how these approaches/practices will affect access management and by using an example, we will also discuss how we can include these practices in the existing or new setup. Let’s jump into these approaches and discuss these practices one by one.
Continue reading “AWS IAM: Best practices [Part 1]”