Blog DevOps Keep in touch
Subscribe to our newsletter
Understanding how EKS and IAM work together
EKS and IAM work well with OIDC to achieve minimum privilege for your Kubernetes workloads. Let me show you how exactly this works!
How to deploy a minimalistic web application using ECS and Fargate
Learn how to quickly and easily deploy and app with AWS ECS using Fargate!
What happens during an HTTP request?
This article describes the path of an HTTP request and the different protocols it must follow to be properly routed.
Reduce your cluster cost with kube-downscaler
This article shows you how to optimize the costs of your Kubernetes cluster with kube-downscaler.
burrito is a TACoS
Introducing burrito, our home-cooked open-source TACoS Kubernetes operator. A tool, still in early development, to manage terraform at scale freely!
Demystifying the “Essential container in task exited” error in ECS
In this post, we will learn how to debug and fix the “essential container in task exited” error within ECS Fargate.
Secure and access easily your cloud infrastructure with bastion and sshuttle
Learn how to implement an SSH bastion host on the cloud with sshuttle for secure and encrypted access to internal resources. Read our guide now!
Header Based routing in Kubernetes with Traefik and ArgoCD
In this article, you will learn how you can use ArgoCD and Traefik to set up a header routing solution for an application in Kubernetes.
How to setup a Prometheus monitoring stack with Ansible ?
Do you have a Virtual Machine with Docker containers that need monitoring? With Ansible, we will see how to set up a full Prometheus monitoring stack.
How to migrate to hub-and-spoke on AWS and why is it worth it?
Discover how we implemented a hub-and-spoke architecture for one of our customers, what it brought and which challenges we faced!
What is DRP and what are the possibles technical solutions to implement it?
Building a Disaster Recovery Plan can be long and tedious, here are some tips to help you understand and organize your plan!
Complex Gitlab pipelines
Deploy complex environments using Gitlab pipelines with multi-project dynamic pipelines, downstream jobs, and artifact management.
How to pentest AWS Cognito? Attack and remediation explained
So, you are pentesting a website, and it uses AWS Cognito. But you don’t know what is this service nor how to abuse it? Let's see how to pwn it!
What is GitOps and why should you look into it?
Have you heard of GitOps? Discover what it is, where it comes from, and why you should use it to improve your infrastructure management.
Discover Karpenter: the new Kubernetes native autoscaler!
Do you need to set up node autoscaling for your AWS EKS cluster? Consider using Karpenter, the new Kubernetes native autoscaler!
Secure your authentication to your data warehouse with SSO and Snowflake
You don’t know what kind of service you want to use for your data warehouse? Learn why you might consider using Snowflake with SSO!
Automate your GitHub Releases with Release Please
Manually creating releases for your repos can be quite tedious. Get automated version bumps and conventional changelogs with Release Please!
The sole purpose of SSL Certificates
The internet is a vast space. Your computer interacts with multiple other entities. SSL certificates play a key role in making the web a safer place.