How to Scale Down AWS EKS Clusters Nightly to Lower EC2 Costs
Are you running non-production EKS clusters on EC2 instances? In this guide, we'll show you how you can scale them down nightly to lower your cloud costs.
Getting a List of "AccessDenied" Events with Users and Source IP Addresses
Tracking "AccessDenied" errors in your AWS account is a useful way to identify security threats and optimize your IAM permissions. In this guide, we'll show you how to get a list of these recent events.
Checking that Enhanced Monitoring is Enabled on Your RDS Instances
Enhanced Monitoring lets you view real-time performance metrics and catch issues earlier. In this guide, we'll find any RDS instances that don't Enhanced Monitoring enabled and turn it on.
Copying an Existing EC2 Instance to Another Region
Copying EC2 instances from one region to another is one way to increase resilience in case of a resource failure. In this guide, we'll walk through how to copy an EC2 instance from one region to another.
How to Create GCP Disk Snapshots and Snapshot Schedules
Snapshots in GCP are an important tool for backing up data and ensuring resilience. In this guide, we outline the steps for creating snapshots and snapshot schedules for GCP disks.
How to Pause Your AKS Clusters Nightly
If you are running non-production AKS clusters, you might not need them operating 24 hours per day. In this guide, we'll show you how to stop your clusters at night and restart them in the morning to lower your Azure costs.
How to Find and Remove Old EBS Snapshots
Cleaning up old EBS snapshots is a good way of reducing clutter and lowering your storage costs. In this guide, we'll show you how to find certain EBS snapshots and delete them.
Finding and Removing Unused Azure Virtual Network Gateways
If you have unused Azure virtual network gateways, it's important to remove them to lower your cloud costs. In this guide, we'll show you how to find and remove them.
Creating an Approval Process for Helm Charts on your Kubernetes Clusters
Before you install Helm Charts on your Kubernetes clusters, you should make sure that the chart has been checked for quality and security gaps. In this guide, we talk through how to set up an approval process for Helm Charts.
How to Find and Remove Old Azure Snapshots
If you have Azure snapshots in your account that are outdated, you can clean them up to lower your monthly cloud costs. In this guide, we'll show you how to find and delete these snapshots.
Using Okta to Validate VMware Workspace ONE Installation Compliance
If your organization is using VMware Workspace ONE for device management, you need to validate that all active users in your organization have it installed. Here are the steps to do that using Okta.
How to Find and Remove Old GCP Disk Snapshots
If you have GCP snapshots you no longer need, removing them is a great way to lower your cloud costs. Here's a guide on how to find and remove old GCP snapshots.
Finding and Resizing Amazon EC2 Instances with Low CPU Usage
If your EC2 instances are averaging a low max CPU utilization, you may be able to save costs by resizing them. Here are the steps to finding and resizing low CPU usage EC2 instances.
Lowering Costs on Long Running AWS EC2 Instances
If you have long running Amazon EC2 instances, you may want to consider applying Reserved Instances to lower your cloud costs. Here are the steps.
Lowering Costs for Long Running GCP Instances with Committed Use Discounts
The costs for long running GCP Instances can be high. In this guide, we show you how to find long running instances and apply committed use discounts to lower your cloud costs.
Optimizing Costs for Long Running Azure VMs with Reserved Instances
One way to optimize your Azure cloud costs is by finding long running Azure VMs and utilizing Reserved Instances instead. In this guide, we'll show you how.
How to Detect and Remove Unattached Azure Public IP Addresses
For each Azure public IP address your organization uses, there is a small hourly cost. In this guide, we'll show you how to find and remove unused public IP addresses.
Detaching an AWS EC2 Instance from its Auto Scaling Group and Load Balancer
To perform routine maintenance and testing on an EC2 instance, you'll want to detach it from its Auto Scaling group and load balancer first. Here is how.
Finding and Removing Unattached AWS Elastic IP addresses
Unattached Elastic IP Addresses can add extra costs to your monthly AWS bill. In this guide, we'll show you how to find and remove unneeded Elastic IP addresses.
How to Pause Your GKE Cluster Nightly
If you have non-production GKE clusters, you might be able to reduce your cloud costs by pausing them at night and restarting them the next morning. In this guide, we show you the steps to do it.
Finding and Resizing GCP Compute Instances with Low CPU Usage
Monitoring your GCP instances is critical to ensuring that you are optimizing your cloud resources. If you have instances with consistently low CPU usage, you may be able to resize them and reduce your costs.
Finding and Resizing Azure Virtual Machines with Low CPU Usage
If your Azure Virtual Machines are operating at a low usage rate, you might be able to resize them and lower your cloud costs. Here are the steps for finding and resizing low CPU usage VMs.
Finding and Removing Unattached GCP External IP Addresses
Unattached external IP Addresses in GCP are a recurring charge on your monthly bill. Here's how you can find and remove them so you can lower your cloud costs.
Using Okta to Validate JumpCloud Installation Compliance
JumpCloud helps ensure that all employees keep their devices secure and updated. In this guide, we'll show you how to find users in your Okta directory who have not installed JumpCloud yet on one of their devices.
Checking that Google Workspace Users Have JumpCloud Installed on Work Devices
In this guide, we'll show you how to run a compliance check to validate that your Google Workspace users have installed JumpCloud on at least one of their devices.
Troubleshooting Your Kubernetes Service Deployment
If you run into issues with your Kubernetes deployment, you might have a problem with your service configuration. In this guide, we'll show you the steps to troubleshoot your service.
Blocking SHA-2 and MD5 Hashes with CrowdStrike Falcon
If your team is using CrowdStrike Falcon for endpoint detection and response, you'll want to keep an up-to-date list of blocked hashes. In this guide, we'll show you how.
Managing IAM Policies with the Google Cloud CLI
IAM policies are a critical aspect of managing access to your resources in Google Cloud. In this guide, we'll show how you can add and remove IAM policies using the Google Cloud CLI.
Updating and Managing User Permissions with the Google Cloud CLI
There are many ways to use the Google Cloud CLI tool to script common activities. In this guide, we show how to assign roles to a new user and add them to a group.
Finding and Disabling Non-Active Users in Azure
Non-active users in your Azure account might be costing your organization money and introducing security risks. In this guide, we'll show you how to find and delete non-active users.
Identifying Azure Users with Non-Compliant Password Expiration Settings
Many organizations have a security requirement that user passwords must expire and be changed after a certain period. Here is how you can find Azure users with non-compliant password settings.
Managing Policies with the Azure CLI
Policies are an important aspect of managing your Azure cloud and governing your resources intelligently. In this guide, we'll show how you can use the Azure CLI to make quick updates to policies.
Finding and Deleting Orphaned ConfigMaps
Orphaned resources like ConfigMaps can add clutter to your Kubernetes cluster. In this post, we'll show you how to find and remove unused ConfigMaps using kubectl commands.
Getting and Deleting Orphaned Secrets with Kubectl
Orphaned Secrets can be a security liability and waste memory and storage in your cluster. In this guide, we'll show you how to locate and delete orphaned Secrets using kubectl commands.
Using the Azure CLI To Update and Manage User Permissions
The Azure CLI is a great tool for scripting updates to user permissions. In this guide, we'll walk through the basics of roles and groups and the common commands.
How to Build a Multi-Workspace Slack Application in Go
This hands-on article documents my experience building a Slack integration application. You can use this post as a general how-to guide for building a similar Slack application.
Detecting AWS DynamoDB Tables With Stale Data
If you are using Amazon DynamoDB, stale data might be costing your organization money. In this post, we'll explain how to find and handle stale data.
Run Containers Securely with gVisor on EKS
At Blink, we needed a solution for running pods on EKS cluster in full isolation, not just for the network, but for system calls as well. This blog post describes how we used gVisor to create a solution.
Ensuring AWS CloudWatch Log Groups Have Set Retention Periods
If your log groups don't have the right rules in place, you could be paying unnecessary storage costs. In this guide, we'll show how you can find and fix AWS CloudWatch log groups without retention policies.
Following the Best Practices for Kubernetes Pod Security
Is your organization following the best practices when it comes to Kubernetes? In this post, we'll outline security practices that can keep your clusters safe.
Tracking Down Amazon Load Balancers With No Target
AWS load balancers with no targets might quietly be costing your organization money. In this guide, we'll show you how to find and delete unused load balancers.
Lowering AWS CloudTrail Costs by Removing Redundant Trails
Redundant trails can inflate how much your organization has to spend for AWS CloudTrail. In this post, we'll show you how to find and remove unneeded trails.
How to Find EC2 Instances Scheduled To Retire Soon
To avoid unexpected interruptions, it's a good practice to check to see if you have any EC2 instances scheduled to retire. Here are the steps for locating and handling these EC2 instances.
Using Git Sizer to Inform Your Git Repository Management
To avoid unexpected delays and performance issues, it's important to track the size of your repos. In this post, we'll share how the open-source tool Git Sizer can help.
Checking S3 Bucket Encryption Compliance Across Your AWS Account
S3 encryption is critical for keeping your data safe. In this guide, we'll show you how to check and implement S3 encryption best practices.
Running Global Health Checks on Your Kubernetes Cluster
Kubernetes is smart enough to orchestrate containers and pods, but only if it's healthy enough to run as intended — and that's where a Kubernetes global health checklist comes into play.
Securing Publicly Accessible Amazon RDS Snapshots
If you're using Amazon RDS, you need to ensure that RDS instances and RDS snapshots are both not publicly accessible. In this guide, we'll show you how to secure your RDS snapshots.
Tracking Down Amazon RDS Instances That Are Publicly Accessible
Are your Amazon RDS instances vulnerable? In this post, we show you how to check that your RDS instances are not publicly available and vulnerable.
Finding and Deleting Unattached Disks with the Azure CLI
If you don't regularly find and remove unattached disks, your organization may spend more than you need to on Azure resources. Here is how you can run these checks with the Azure CLI.
Enforcing Mandatory Tags Across Your AWS Resources
Mandatory tags can be a good way to standardize how your organization creates and labels resources. This post looks at how you can check the tags on your AWS resources.
Enforcing HTTP Redirection Across Your AWS Application Load Balancers
In this post, we walk through how you can use your load balancer to set a rule for redirecting HTTP traffic to HTTPS.
Troubleshooting Kubernetes Pods: The "RunContainerError"
If you receive the "RunContainerError" message when working with Kubernetes, here are the steps you should take to remedy your deployment.
Enforcing Mandatory Tags Across Your Azure Resources
To get the most out of tags and labels in Azure, your organization will need to align on a standard and enforceable best practice. Here is how you can enforce certain tags in Azure.
How To Find and Delete Unattached GCP Disks
If you’re working within the Google Cloud Platform (GCP), locating and deleting unattached GCP disks is a critical to controlling costs and bolstering security. In this post, we'll walk through each step you can take to clean up wasteful resources.
Using the AWS CLI to Update and Manage AWS User Permissions
Depending on the size of your organization, updating permissions and managing groups in AWS can be complex and time-intensive. In this post, we'll walk through how you can make updates using the AWS CLI tool.
Enforcing Labels and Tags Across Your GCP Resources
Labels and tags are the best way to organize and track your GCP resources. In this post, we'll outline the common ways to create tags and ensure tagging compliance.
Troubleshooting Kubernetes Pods: Stuck in a "Pending" State
If your pods are stuck in pending state, you may need to do some quick troubleshooting. Here are the steps to follow to get your pods back up and running.
Adding a New IAM User With AWS CLI
If your company is growing, adding a new user to your AWS account can be a common tasks. In this post, we'll show you the CLI steps for adding a new user so you can start to automate this process.
Troubleshooting the "CrashLoopBackOff" Error
If you encounter a Pod in a "CrashLoopBackOff" state, you can start troubleshooting by running a few different commands. In this post, we walk through each step.
Troubleshooting Your EC2 Configuration in a Private Subnet
If you have configured EC2 instances in a private subnet, you might need to do some troubleshooting to make sure that you can receive updates or access other AWS resources. Here are the steps to work through.
How to Find and Delete Unattached AWS Resources
Managing your AWS resources is critical to making sure that you aren't wasting money. Here are the steps you can take to ensure that your team is keeping costs down.