Detecting AWS DynamoDB Tables With Stale Data
If you are using Amazon DynamoDB, stale data might be costing your organization money. In this post, we'll explain how to find and handle stale data.
Run Containers Securely with gVisor on EKS
At Blink, we needed a solution for running pods on EKS cluster in full isolation, not just for the network, but for system calls as well. This blog post describes how we used gVisor to create a solution.
Ensuring AWS CloudWatch Log Groups Have Set Retention Periods
If your log groups don't have the right rules in place, you could be paying unnecessary storage costs. In this guide, we'll show how you can find and fix AWS CloudWatch log groups without retention policies.
Following the Best Practices for Kubernetes Pod Security
Is your organization following the best practices when it comes to Kubernetes? In this post, we'll outline security practices that can keep your clusters safe.
Tracking Down Amazon Load Balancers With No Target
AWS load balancers with no targets might quietly be costing your organization money. In this guide, we'll show you how to find and delete unused load balancers.
Lowering AWS CloudTrail Costs by Removing Redundant Trails
Redundant trails can inflate how much your organization has to spend for AWS CloudTrail. In this post, we'll show you how to find and remove unneeded trails.
How to Find EC2 Instances Scheduled To Retire Soon
To avoid unexpected interruptions, it's a good practice to check to see if you have any EC2 instances scheduled to retire. Here are the steps for locating and handling these EC2 instances.
Using Git Sizer to Inform Your Git Repository Management
To avoid unexpected delays and performance issues, it's important to track the size of your repos. In this post, we'll share how the open-source tool Git Sizer can help.
Checking S3 Bucket Encryption Compliance Across Your AWS Account
S3 encryption is critical for keeping your data safe. In this guide, we'll show you how to check and implement S3 encryption best practices.
Running Global Health Checks on Your Kubernetes Cluster
Kubernetes is smart enough to orchestrate containers and pods, but only if it's healthy enough to run as intended — and that's where a Kubernetes global health checklist comes into play.
Securing Publicly Accessible Amazon RDS Snapshots
If you're using Amazon RDS, you need to ensure that RDS instances and RDS snapshots are both not publicly accessible. In this guide, we'll show you how to secure your RDS snapshots.
Tracking Down Amazon RDS Instances That Are Publicly Accessible
Are your Amazon RDS instances vulnerable? In this post, we show you how to check that your RDS instances are not publicly available and vulnerable.
Finding and Deleting Unattached Disks with the Azure CLI
If you don't regularly find and remove unattached disks, your organization may spend more than you need to on Azure resources. Here is how you can run these checks with the Azure CLI.
Enforcing Mandatory Tags Across Your AWS Resources
Mandatory tags can be a good way to standardize how your organization creates and labels resources. This post looks at how you can check the tags on your AWS resources.
Enforcing HTTP Redirection Across Your AWS Application Load Balancers
In this post, we walk through how you can use your load balancer to set a rule for redirecting HTTP traffic to HTTPS.
Troubleshooting Kubernetes Pods: The "RunContainerError"
If you receive the "RunContainerError" message when working with Kubernetes, here are the steps you should take to remedy your deployment.
Enforcing Mandatory Tags Across Your Azure Resources
To get the most out of tags and labels in Azure, your organization will need to align on a standard and enforceable best practice. Here is how you can enforce certain tags in Azure.
How To Find and Delete Unattached GCP Disks
If you’re working within the Google Cloud Platform (GCP), locating and deleting unattached GCP disks is a critical to controlling costs and bolstering security. In this post, we'll walk through each step you can take to clean up wasteful resources.
Using the AWS CLI to Update and Manage AWS User Permissions
Depending on the size of your organization, updating permissions and managing groups in AWS can be complex and time-intensive. In this post, we'll walk through how you can make updates using the AWS CLI tool.
Enforcing Labels and Tags Across Your GCP Resources
Labels and tags are the best way to organize and track your GCP resources. In this post, we'll outline the common ways to create tags and ensure tagging compliance.
Troubleshooting Kubernetes Pods: Stuck in a "Pending" State
If your pods are stuck in pending state, you may need to do some quick troubleshooting. Here are the steps to follow to get your pods back up and running.
Adding a New IAM User With AWS CLI
If your company is growing, adding a new user to your AWS account can be a common tasks. In this post, we'll show you the CLI steps for adding a new user so you can start to automate this process.
Troubleshooting the "CrashLoopBackOff" Error
If you encounter a Pod in a "CrashLoopBackOff" state, you can start troubleshooting by running a few different commands. In this post, we walk through each step.
How to Find and Delete Unattached AWS Resources
Managing your AWS resources is critical to making sure that you aren't wasting money. Here are the steps you can take to ensure that your team is keeping costs down.
Troubleshooting Your EC2 Configuration in a Private Subnet
If you have configured EC2 instances in a private subnet, you might need to do some troubleshooting to make sure that you can receive updates or access other AWS resources. Here are the steps to work through.