Overview of third-party addons for EKS (Teleport)

In the previous post we checked several EKS addons (Kubecost, Dynarace and Istio), but we still have others. In this post we will look at Teleport. Teleport is an identity-aware, multi-protocol access proxy which understands SSH, HTTPS, RDP, Kubernetes API, MySQL, MongoDB and PostgreSQL wire protocols. Add-on installation Teleport can be installed into your EKS […]
Overview of third-party addons for EKS (Teleport)

In the previous post we checked several EKS addons (Kubecost, Dynarace and Istio), but we still have others. In this post we will look at Teleport. Teleport is an identity-aware, multi-protocol access proxy which understands SSH, HTTPS, RDP, Kubernetes API, MySQL, MongoDB and PostgreSQL wire protocols. Add-on installation Teleport can be installed into your EKS […]
Overview of third-party addons for EKS (Kubecost, Dynarace, Istio)

AWS introduced EKS addons in the EKS v1.20. Just a few add-ons appeared back then, e.g. VPC CNI plugin, CoreDNS, and Kube-proxy. All Amazon EKS add-ons include the latest security patches, bug fixes, and are validated by AWS to work with Amazon EKS. Amazon EKS add-ons allow you to consistently ensure that your Amazon EKS […]
„Secure EKS“ – Automat-it’s solution with strict security, governance, and compliance standards.

Overview The Automat-it Secure EKS Solution is a fully automated solution for creating AWS cloud infrastructure and CI/CD process for Kubernetes workloads according to the best security practices. Based on the shared responsibility model we are responsible for the security in the cloud. Even though the EKS control plane is secure itself, we need to […]
Egress traffic inspection using Palo Alto VM-series firewall in multi-account AWS environment

Problem statement Centralized network security may be challenging but absolutely required by some companies. Auditors might need evidence, that network traffic undergoes an inspection, and the tool/appliance that fulfills this function is strictly isolated and protected. We can achieve this by placing the tool in the dedicated AWS account, according to the best security practices. […]
Optimizing CI/CD process for machine learning application in Kubernetes

Problem statement Sometimes companies are so focused on product development and feature release, which may result in flaws in security, velocity, and cost-optimization (especially for startups). Automat-it as a company of DevOps experts not only implements customer requests, we also analyze environments and prepare recommendations regarding possible improvements. One of our customers had a Docker […]
Using Epsagon for tracing and monitoring in AWS

Problem statement A modern microservices architecture allows a large application to be separated into smaller independent parts, with each part having its functionality and responsibility. To serve a single user request, a microservices-based application can call on many internal microservices to compose its response. The advantage here is that different teams/developers can work on their […]
Custom Kubernetes scheduler with EKS and Step Functions for machine learning workloads.

Problem statement Sometimes companies have complicated business logic that requires a custom scheduler or autoscaler in a Kubernetes cluster. The initial machine learning application design included 3 pods: web application (platform), pre-processing pod (preliminary data preparation), and processing pod with ML application. The main problem here was that the solution was NOT scalable and cost-effective. […]
Ephemeral environments for serverless applications in AWS using Terraform and GitHub Actions

Problem statement Many organizations try to achieve higher development release velocity, especially in a competitive environment. Moreover, in a big team, where many developers work on various features in parallel, release process acceleration (even for a few minutes) saves a considerable amount of time. One more important thing is the cost of the environment. Cloud […]
Palo Alto Prisma Cloud for AWS and Kubernetes

Problem statement Security in a cloud contains many layers, so it can be quite challenging to cover everything, especially if you have many different workloads and need to pass a compliance audit, like HIPAA or PCI DSS. Moreover, security issues can be related not only to the cloud itself. Libraries and packages can have vulnerabilities, […]