Automat-it Blog

headline image
Latest

3 Common FinOps Mistakes Costing Startups More Than They Think

Cloud computing is essential for startups. It makes it possible for them to quickly develop products, scale, and compete. But

image header

Reliable monitoring with AWS-managed Prometheus and Grafana

Problem statement Prometheus is an open-source monitoring system with a dimensional data model, flexible query language, efficient time series database,

blog image

Send an agregated security report from AWS Security Hub

Problem statement AWS Security Hub is an excellent service that collects and aggregates security findings from many AWS services (e.g.

START-UP SUCCESS: HOW TO SELECT THE RIGHT CLOUD PROVIDER AND PARTNER

As more and more businesses move their operations to the cloud, the demand for cloud solutions continues to grow. Reasons

Automat-it branded element design

Overview of third-party addons for EKS (Datree, GuardDuty EKS Runtime Monitoring)

This is the third post where we continue the discovery of EKS add-ons. The first one was about Kubecost, Dynatrace,

Overview of third-party addons for EKS (Teleport)

In the previous post we checked several EKS addons (Kubecost, Dynarace and Istio), but we still have others. In this

blog image

Overview of third-party addons for EKS (Teleport)

In the previous post we checked several EKS addons (Kubecost, Dynarace and Istio), but we still have others. In this

Automat-it branded element design

Overview of third-party addons for EKS (Kubecost, Dynarace, Istio)

AWS introduced EKS addons in the EKS v1.20. Just a few add-ons appeared back then, e.g. VPC CNI plugin, CoreDNS,

headline image

« Secure EKS » – Automat-it’s solution with strict security, governance, and compliance standards.

Overview The Automat-it Secure EKS Solution is a fully automated solution for creating AWS cloud infrastructure and CI/CD process for

Egress traffic inspection using Palo Alto VM-series firewall in multi-account AWS environment

Problem statement Centralized network security may be challenging but absolutely required by some companies. Auditors might need evidence, that network

Search for content