Get Appointment

  • contact@wellinor.com
  • +(123)-456-7890

Blog & Insights

WP_Query Object ( [query] => Array ( [post_type] => post [showposts] => 8 [orderby] => Array ( [date] => desc ) [autosort] => 0 [paged] => 2 [post__not_in] => Array ( ) ) [query_vars] => Array ( [post_type] => post [showposts] => 8 [orderby] => Array ( [date] => desc ) [autosort] => 0 [paged] => 2 [post__not_in] => Array ( ) [error] => [m] => [p] => 0 [post_parent] => [subpost] => [subpost_id] => [attachment] => [attachment_id] => 0 [name] => [pagename] => [page_id] => 0 [second] => [minute] => [hour] => [day] => 0 [monthnum] => 0 [year] => 0 [w] => 0 [category_name] => [tag] => [cat] => [tag_id] => [author] => [author_name] => [feed] => [tb] => [meta_key] => [meta_value] => [preview] => [s] => [sentence] => [title] => [fields] => all [menu_order] => [embed] => [category__in] => Array ( ) [category__not_in] => Array ( ) [category__and] => Array ( ) [post__in] => Array ( ) [post_name__in] => Array ( ) [tag__in] => Array ( ) [tag__not_in] => Array ( ) [tag__and] => Array ( ) [tag_slug__in] => Array ( ) [tag_slug__and] => Array ( ) [post_parent__in] => Array ( ) [post_parent__not_in] => Array ( ) [author__in] => Array ( ) [author__not_in] => Array ( ) [search_columns] => Array ( ) [ignore_sticky_posts] => [suppress_filters] => [cache_results] => 1 [update_post_term_cache] => 1 [update_menu_item_cache] => [lazy_load_term_meta] => 1 [update_post_meta_cache] => 1 [posts_per_page] => 8 [nopaging] => [comments_per_page] => 50 [no_found_rows] => [order] => DESC ) [tax_query] => WP_Tax_Query Object ( [queries] => Array ( ) [relation] => AND [table_aliases:protected] => Array ( ) [queried_terms] => Array ( ) [primary_table] => wp_posts [primary_id_column] => ID ) [meta_query] => WP_Meta_Query Object ( [queries] => Array ( ) [relation] => [meta_table] => [meta_id_column] => [primary_table] => [primary_id_column] => [table_aliases:protected] => Array ( ) [clauses:protected] => Array ( ) [has_or_relation:protected] => ) [date_query] => [request] => SELECT SQL_CALC_FOUND_ROWS wp_posts.ID FROM wp_posts WHERE 1=1 AND ((wp_posts.post_type = 'post' AND (wp_posts.post_status = 'publish' OR wp_posts.post_status = 'expired' OR wp_posts.post_status = 'acf-disabled' OR wp_posts.post_status = 'tribe-ea-success' OR wp_posts.post_status = 'tribe-ea-failed' OR wp_posts.post_status = 'tribe-ea-schedule' OR wp_posts.post_status = 'tribe-ea-pending' OR wp_posts.post_status = 'tribe-ea-draft'))) ORDER BY wp_posts.post_date DESC LIMIT 8, 8 [posts] => Array ( [0] => WP_Post Object ( [ID] => 5109 [post_author] => 15 [post_date] => 2025-06-09 01:05:26 [post_date_gmt] => 2025-06-09 01:05:26 [post_content] => Our client was struggling with the complexities of securing, managing, and optimizing its AWS environment. As part of their modernization efforts, they wanted to adopt DevOps methodologies, including infrastructure as code and native AWS security features. In addition, they needed to migrate their containerized applications from on-premises systems to AWS Elastic Kubernetes Service (EKS), adding another layer of complexity. [post_title] => Case Study: AWS Cloud Migration and DevOps [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => case-study-aws-cloud-migration-and-devops [to_ping] => [pinged] => [post_modified] => 2025-06-09 15:53:22 [post_modified_gmt] => 2025-06-09 15:53:22 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=5109 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [1] => WP_Post Object ( [ID] => 5099 [post_author] => 15 [post_date] => 2025-06-04 13:37:35 [post_date_gmt] => 2025-06-04 13:37:35 [post_content] => Monitoring has long been a staple of the IT toolset. But as IT leaders become more focused on delivering measurable business value, the limitations of simple monitoring are becoming more apparent. Traditional monitoring is reactive by nature and misses the nuances that can provide proactive indications that the environment is headed toward a problem. Alerts from one system don’t always indicate a root cause lurking in another system, oftentimes leading to a Whack-A-Mole approach where a fix to one system causes issues in another. This can lead to an environment where teams focus more working to absolve their domain as the source of an issue, rather than a quick mean time to repair (MTTR). The reality is simple: You can’t fix what you don’t see. And you certainly can’t improve it. Observability takes simple monitoring to a new level where issues are triangulated among systems to show the true chain of cause and effect throughout an IT stack. Done right, observability can surface leading indicators of risk, letting IT teams proactively address issues before they threaten to impact the business. It helps with correlation of events and causes of those events. Observability helps you see the big picture, understand what's really going on across your systems, and get ahead of potential problems to ensure IT continues to deliver its intended business value. Unified observability helps IT teams reduce risk, make informed decisions faster, and helps the business stay competitive. A highly mature observability program can even be a competitive advantage. Observability goes beyond toolsets and encompasses a new way of thinking about how to integrate and use the monitoring tools you already have. The shift is more about strategy and less about tools and technologies.

Observability vs. Visibility

Observability is the process of gathering, aggregating, normalizing, and presenting data from across your IT monitoring tools to create comprehensive visibility across systems — including data from APM tools, logs, traces, EDR, SIEMs, and more — to make sense of it. Observability gives you the power to see across domains, functions, and systems. Visibility is the outcome you get when observability is done well. It’s the ability to take a deeper look into your stack and understand what’s happening in a meaningful way, whether you’re in infrastructure, security, application development, or operations. In this way, observability is a new way of collaborating across silos and creates a common source of truth for all IT stakeholders.

The Cost of Operating Without Observability

Without comprehensive observability, teams will continue to invest valuable time in reacting to problems inside their silos, dashboards, and their interpretation of root causes. Operating without observability is a missed opportunity. You can’t see the signals that tell you a problem is coming. You can’t automate a response. You can’t innovate. You’re stuck spending resources just to keep the lights on. In today’s business environment, keeping the lights on isn’t enough because the competition is making progress where you aren’t. From a security perspective, the risk is even greater. If you're relying solely on signature-based detection, you may be blind to real threats and miss the ability to identify anomalous behavior across multiple vectors.

The Power of a Unified Approach

Observability enables teams to identify potential risks to the business, including things like system stability or data loss. It provides factual insights to help IT leaders make more informed, data-driven decisions, helps IT teams pivot from reactive to proactive, and ensures that IT delivers its intended value. It allows you to correlate symptoms with root causes, taking the guesswork out of troubleshooting. Observability starts with the data you’re already generating then centralizing and normalizing it for analysis, which leads to a unified view of your environment. With enough data, you can get better context for what’s happening and gain the ability to spot leading indicators of risk. This gives you time to act before an issue begins to impact the business. The ability to personalize insights for each stakeholder is what makes observability valuable for the entire organization. The ability to draw from a single source of truth about IT operations means you can deliver consistent insights for each role. That’s important because observability data needs to be presented in a way that’s easily consumable by key IT stakeholders, each of whom needs specific insights about specific things. For example: This unified, role-aware approach enables: Observability should be treated as a strategic initiative, not a one-off project. Like zero trust, it requires long-term commitment and executive sponsorship, which is why the stakeholders also need to be involved with crafting an observability strategy. The broader the input, the broader the adoption and the greater the payoff.

Tangible Business Benefits

Observability helps the business understand how IT is driving business value. It links IT health directly to outcomes like revenue protection, risk reduction, and strategic agility. Quantitative benefits of observability can include: Qualitative advantages can include:

Measuring Success with Observability

Success with observability results in your IT organization spending less time reacting and more time delivering value. One of the simplest ways to measure success is to look at two metrics: These are the blocking-and-tackling benefits every observability initiative should deliver. As your observability practice matures, you can accumulate other measurable benefits, such as:

How Evolving Solutions and Keyva Can Help

Whether you're just beginning your observability journey or trying to scale a mature practice, Evolving Solutions and Keyva can help clients create an effective observability approach that can drive tangible business outcomes. We focus on delivering real business outcomes, not just dashboards. We meet clients where they are to help them define a strategy, select the right tools, or more fully utilize tools they already have to maximize their existing investments. We also have the talent to help you choose the right technology for your organization, structure a roadmap, and co-create a solution. With a broad view across clients and industries, we see what works and what doesn’t, which helps you avoid common pitfalls. Contact us today to get started. [table id=14 /] [post_title] => Beyond Monitoring: The Case for Unified IT Observability [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => beyond-monitoring-the-case-for-unified-it-observability [to_ping] => [pinged] => [post_modified] => 2025-06-04 13:37:35 [post_modified_gmt] => 2025-06-04 13:37:35 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=5099 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [2] => WP_Post Object ( [ID] => 5076 [post_author] => 7 [post_date] => 2025-05-21 16:53:27 [post_date_gmt] => 2025-05-21 16:53:27 [post_content] => Read about a client who faced a significant challenge in securing their AWS environment, which exposed the organization to potential service disruptions, security breaches, data exposure, and regulatory non-compliance. Download now. [post_title] => Case Study: AWS Security for Business Resilience [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => case-study-aws-security-for-business-resilience [to_ping] => [pinged] => [post_modified] => 2025-05-21 16:53:27 [post_modified_gmt] => 2025-05-21 16:53:27 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=5076 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [3] => WP_Post Object ( [ID] => 4985 [post_author] => 15 [post_date] => 2025-05-14 16:22:39 [post_date_gmt] => 2025-05-14 16:22:39 [post_content] => Kubernetes powers modern cloud-native infrastructure, but its networking layer often demands more than basic tools can deliver—enter Cilium, an eBPF-powered Container Network Interface (CNI). This blog explores Cilium’s features, a practical use case with a diagram, step-by-step installation and configuration, and a comparison with Istio. Whether you’re securing workloads or optimizing performance, Cilium’s got something to offer—let’s dive in!

What is Cilium CNI?

Cilium is an open-source CNI plugin that leverages eBPF (extended Berkeley Packet Filter) to enhance Kubernetes networking. Running custom programs in the Linux kernel, Cilium outpaces traditional CNIs like Flannel or Calico by offering advanced security, observability, and Layer 3-7 control—all without modifying your apps.

Cilium Capability Services Diagram:

[caption id="attachment_4987" align="alignleft" width="436"] Source: https://github.com/cilium/cilium/blob/main/Documentation/images/cilium-overview.png[/caption]              

Key Features of Cilium

Cilium’s strengths make it a standout for microservices-heavy clusters.

What is Hubble?

Hubble is a fully distributed networking and security observability platform for cloud native workloads. It is built on top of Cilium and eBPF to enable deep visibility into the communication and behavior of services as well as the networking infrastructure in a completely transparent manner. Hubble helps teams understand service dependencies and communication maps, operational monitoring and alerting, application monitoring, and security observability. [caption id="attachment_4990" align="alignnone" width="417"] Source: https://github.com/cilium/hubble/blob/main/Documentation/images/hubble_arch.png[/caption]  

Why Cilium?

Traditional CNIs hit limits with scale—iptables slow down, and IP-based rules struggle with dynamic pods. Cilium’s eBPF approach and Layer 7 support, paired with Hubble’s visibility, address these gaps. But how does it compare to Istio? We’ll get there—first, a use case.

Use Case: Securing an E-Commerce Microservices App

Imagine managing a Kubernetes cluster for an e-commerce platform with user management, order processing, and payment services implemented using 3 tier web architecture:
  1. Frontend: NGINX web server for customer requests.
  2. Backend: Node.js API for user management, order processing & payment services.
  3. Database: PostgreSQL for persisting sensitive data.

Requirements

Cilium handles this with ease.

Use Case Diagram

Installing Cilium

Let’s install Cilium on your Kubernetes cluster. This section walks through prerequisites, setup, and validation for a smooth deployment.

Prerequisites

Step 1: Prepare Your Cluster

Ensure your cluster is ready:
kubectl get nodes
Step 2: Add Cilium Helm Repository Add and update the Helm repo:
helm repo add cilium https://helm.cilium.io/
helm repo update
Step 3: Install Cilium with Hubble Deploy Cilium with observability enabled:
helm install cilium cilium/cilium --version 1.14.0 \
  --namespace kube-system \
  --set kubeProxyReplacement=disabled \
  --set hubble.enabled=true \
  --set hubble.relay.enabled=true \
  --set hubble.ui.enabled=true
Step 4: Validate Installation Check pod status:
kubectl get pods -n kube-system -l k8s-app=cilium
Expect output like:
NAME            READY   STATUS    RESTARTS   AGE
cilium-abc123   1/1     Running   0          5m
cilium-xyz789   1/1     Running   0          5m
Also verify Hubble:
kubectl get pods -n kube-system -l k8s-app=hubble-relay
Step 5: Test Connectivity Deploy a simple pod and test networking:
kubectl run test-pod --image=nginx --restart=Never
kubectl exec -it test-pod -- curl <another-pod-ip>
Cilium should route traffic seamlessly.

Configuring Cilium for the Use Case

Now, configure Cilium for our e-commerce app.

Step 1: Label Pods

Add labels to your deployments:
# Frontend (snippet)
metadata:
  labels:
    app: frontend
# Backend
metadata:
  labels:
    app: backend
# Database
metadata:
  labels:
    app: database
Apply: kubectl apply -f <file>.yaml.

Step 2: Apply Network Policies

Define CiliumNetworkPolicy resources:
Policy 1: Frontend-to-Backend
apiVersion: cilium.io/v2
kind: CiliumNetworkPolicy
metadata:
  name: frontend-to-backend
spec:
  endpointSelector:
    matchLabels:
      app: backend
  ingress:
  - fromEndpoints:
    - matchLabels:
        app: frontend
    toPorts:
    - ports:
      - port: "8080"
        protocol: TCP
Policy 2: Backend-to-Database
apiVersion: cilium.io/v2
kind: CiliumNetworkPolicy
metadata:
  name: backend-to-db
spec:
  endpointSelector:
    matchLabels:
      app: database
  ingress:
  - fromEndpoints:
    - matchLabels:
        app: backend
    toPorts:
    - ports:
      - port: "5432"
        protocol: TCP
Apply: kubectl apply -f <file>.yaml. Step 3: Enable Hubble Start Hubble:
cilium hubble port-forward &
Monitor:
hubble observe --selector app=backend
Output:
Feb 22 2025 14:00:01 frontend-xyz -> backend-abc ALLOWED (TCP 8080)
Feb 22 2025 14:00:02 backend-abc -> database-def ALLOWED (TCP 5432)

Feb 22 2025 14:00:03 external-ip -> database-def DROPPED
Step 4: Optional Layer 7 Policy
Restrict to GET requests:
apiVersion: cilium.io/v2
kind: CiliumNetworkPolicy
metadata:
  name: frontend-to-backend-l7
spec:
  endpointSelector:
    matchLabels:
      app: backend
  ingress:
  - fromEndpoints:
    - matchLabels:
        app: frontend
    toPorts:
    - ports:
      - port: "8080"
        protocol: TCP
      rules:
        http:
        - method: "GET"
          path: "/api/.*"
Apply: kubectl apply -f frontend-to-backend-l7.yaml.

Istio vs. Cilium: A Comparison

Cilium and Istio both enhance Kubernetes networking, but they differ in scope and approach.

Overview

Key Differences

AspectCiliumIstio
LayerKernel (eBPF, L3-L7)Application (sidecar, L7 focus)
Primary RoleNetworking + securityTraffic management + observability
PerformanceHigh (no proxies)Sidecar overhead
SecurityIdentity policies, encryptionmTLS, L7 rules
ObservabilityHubble (flow logs)Metrics, traces (Prometheus, grafana)
Use Case FitCluster-wide networkingMicroservices communication

Strengths

When to Choose?

The Result

Our e-commerce app gains:

Conclusion

Cilium transforms Kubernetes networking with eBPF, offering a potent mix of security, speed, and insight. Its installation is straightforward, and it shines in use cases like ours—while holding its own against Istio. Try it out and reach Keyva for any professional services support! [table id=13 /] [post_title] => Cilium CNI & Hubble: A Deep Dive with Installation, Configuration, Use Case Scenario and Istio Comparison [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => cilium-cni-hubble-a-deep-dive-with-installation-configuration-use-case-scenario-and-istio-comparison [to_ping] => [pinged] => [post_modified] => 2025-05-21 16:55:42 [post_modified_gmt] => 2025-05-21 16:55:42 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=4985 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [4] => WP_Post Object ( [ID] => 5039 [post_author] => 7 [post_date] => 2025-05-05 19:50:28 [post_date_gmt] => 2025-05-05 19:50:28 [post_content] =>

Manage Your Entire IT Infrastructure with One Service Model. 

  Download now.   [post_title] => Create Seamless Integrations to Support Single Pane-of-glass Visibility [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => create-seamless-integrations-to-support-single-pane-of-glass-visibility [to_ping] => [pinged] => [post_modified] => 2025-05-05 19:50:28 [post_modified_gmt] => 2025-05-05 19:50:28 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=5039 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [5] => WP_Post Object ( [ID] => 4981 [post_author] => 7 [post_date] => 2025-04-29 15:07:41 [post_date_gmt] => 2025-04-29 15:07:41 [post_content] => Many things are usually easy when you first start out. For example, purchasing a new home is exciting and straightforward at first, but over time, maintenance issues arise, insurance costs and property taxes increase, and neighborhood dynamics change. Suddenly that dream home starts keeping you up at night. It is the same with the cloud.

Beyond the Cloud’s Silver Lining

Cloud adoption is easy at the beginning too. Cloud providers typically offer straightforward onboarding processes for small-scale migrations using an easy-to-use GUI interface. The pay-as-you-go model seems like a great deal compared to the cost of depreciating datacenter assets, forklift upgrades and software maintenance. Cloud offers a perfect alternative to fixed depreciating assets, especially when organizations have a need for increased workloads based on seasonal business trends. However, the more services and applications you migrate to the cloud, it becomes increasingly important to manage these assets in a standardized and streamlined manner. In the beginning, cloud optimization may seem like a Day 2 exercise; however, it can quickly become an imperative activity if budgets are exceeded due to unintentional wastage of resources. The cloud is no different than on prem in the fact that it requires planning, continuous monitoring, and proactive management to ensure that everything runs to meet business objectives. It is something you cannot afford to put off.

Why aren’t Companies Achieving Cost Optimization?

If the cloud was supposed to be simpler than on-prem, then why does cloud optimization seem elusive to some organizations? A primary reason is the pace at which cloud transformation has taken place; the priority has often been “move to the cloud first and worry about optimization later”. It is an easy trap to get into. At Keyva, we've seen companies spend substantial amounts on cloud migrations, sometimes up to a million dollars per month. Imagine if you could save just 2% of that expenditure. That translates into real savings that could be reinvested in other business initiatives. Another reason why optimization isn’t achieved for a while is that like anything, the cloud has a learning curve, and some of those lessons can prove quite costly. Consulting with third-party experts who understand common pitfalls and mistakes can help you bypass the trial-and-error phase. These experts can guide you through the optimization process, ensuring you avoid the typical gotchas and costly errors and achieve cost efficiency and ROI sooner.

Achieving Operational Hygiene

We often hear about security hygiene. At Keyva, we also emphasize operational hygiene. That topic includes a lot of things, and one of the big ones is right-sizing. Overprovisioning is the #1 culprit of cloud overspending and it’s surprisingly easy to do. When choosing options in the cloud menu, the largest ones may be chosen for you by default, or you may be driven by normal human tendency to select a larger option. An organization should have guardrails to ensure a structured process for choosing the right amount and right-sized resource bundles. This can be done in several ways – by establishing a committee that must approve larger or expensive options to prevent unnecessary expenditures, or by using infrastructure as code methodologies. By incorporating chargeback and showback features which enhance cost visibility and accountability, it can be helpful to see the breakdown for features and resources used by various teams within the organization. Here’s how they work:

Some Steps are Easy

Cloud optimization doesn't have to be complicated. It can be as simple as turning off resources after use. Just as you learned to turn off lights when leaving a room to save on the electric bill, you should deprovision resources when they're not needed. The sooner guardrails are set up to manage cloud costs, the better it is for adoption. While provisioning cloud native VMs or services in response to demand spikes is typically prioritized, turning them off after intended use or reducing the size and scale of utilized clusters should receive equal attention. All of this can be automated using infrastructure as code pipelines as well. License bundling is another simple but effective strategy for optimizing cloud costs as it helps streamline expenses, enhances flexibility and reduces administrative overhead. Much like cloud computing, where shared resources maximize efficiency, bundled licensing prevents service redundancies and minimizes underutilized cloud instances. By consolidating licenses, organizations ensure they are only paying for what they actually need, leading to greater cost efficiency and a more optimized cloud environment.

The 15-point Approach

At Keyva, we've developed a comprehensive 15-point strategy to achieve cloud optimization. When working with clients, we utilize monitoring to analyze key metrics such as average utilization, volume requests, and peak time utilization. This helps determine the optimal sourcing of resources. Monitoring is only valuable if it leads to actionable insights. At Keyva, we work with all the major cloud vendors, and use Well Architected Framework (WAF) model as a guide to achieving efficiency in systems and capacity. Our certified staff has worked with all major hyperscalers and cloud providers, and implemented WAF framework for multiple clients across various industry verticals. Cloud optimization is about finding real savings that can show an ROI quickly. Find out more about our 15-point strategy by contacting us today. [table id=3 /] [post_title] => Cloud Optimization: Act Now or Pay Later [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => cloud-optimization-act-now-or-pay-later [to_ping] => [pinged] => [post_modified] => 2025-05-05 19:59:54 [post_modified_gmt] => 2025-05-05 19:59:54 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=4981 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [6] => WP_Post Object ( [ID] => 4978 [post_author] => 15 [post_date] => 2025-04-17 14:53:36 [post_date_gmt] => 2025-04-17 14:53:36 [post_content] => At Evolving Solutions and Keyva, our Kubernetes expertise extends past the platform to your broader IT and business needs. While Kubernetes outperforms traditional virtual machine environments in flexibility and efficiency, its complexity can be daunting. [post_title] => From Warm-Up Act to Headliner: The Rise of Kubernetes [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => from-warm-up-act-to-headliner-the-rise-of-kubernetes [to_ping] => [pinged] => [post_modified] => 2025-04-17 14:53:36 [post_modified_gmt] => 2025-04-17 14:53:36 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=4978 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [7] => WP_Post Object ( [ID] => 4974 [post_author] => 7 [post_date] => 2025-04-17 14:38:48 [post_date_gmt] => 2025-04-17 14:38:48 [post_content] => Read about a client faced an urgent issue when key IT personnel left the organization without leaving documentation artifacts. Download now [post_title] => Case Study: LAMP Stack Deployment Support [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => case-study-lamp-stack-deployment-support [to_ping] => [pinged] => [post_modified] => 2025-04-21 15:52:14 [post_modified_gmt] => 2025-04-21 15:52:14 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=4974 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) ) [post_count] => 8 [current_post] => -1 [before_loop] => 1 [in_the_loop] => [post] => WP_Post Object ( [ID] => 5109 [post_author] => 15 [post_date] => 2025-06-09 01:05:26 [post_date_gmt] => 2025-06-09 01:05:26 [post_content] => Our client was struggling with the complexities of securing, managing, and optimizing its AWS environment. As part of their modernization efforts, they wanted to adopt DevOps methodologies, including infrastructure as code and native AWS security features. In addition, they needed to migrate their containerized applications from on-premises systems to AWS Elastic Kubernetes Service (EKS), adding another layer of complexity. [post_title] => Case Study: AWS Cloud Migration and DevOps [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => case-study-aws-cloud-migration-and-devops [to_ping] => [pinged] => [post_modified] => 2025-06-09 15:53:22 [post_modified_gmt] => 2025-06-09 15:53:22 [post_content_filtered] => [post_parent] => 0 [guid] => https://keyvatech.com/?p=5109 [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [comment_count] => 0 [current_comment] => -1 [found_posts] => 140 [max_num_pages] => 18 [max_num_comment_pages] => 0 [is_single] => [is_preview] => [is_page] => [is_archive] => [is_date] => [is_year] => [is_month] => [is_day] => [is_time] => [is_author] => [is_category] => [is_tag] => [is_tax] => [is_search] => [is_feed] => [is_comment_feed] => [is_trackback] => [is_home] => 1 [is_privacy_policy] => [is_404] => [is_embed] => [is_paged] => 1 [is_admin] => [is_attachment] => [is_singular] => [is_robots] => [is_favicon] => [is_posts_page] => [is_post_type_archive] => [query_vars_hash:WP_Query:private] => f3b559e319441b05b29eaa45689cc541 [query_vars_changed:WP_Query:private] => [thumbnails_cached] => [allow_query_attachment_by_filename:protected] => [stopwords:WP_Query:private] => [compat_fields:WP_Query:private] => Array ( [0] => query_vars_hash [1] => query_vars_changed ) [compat_methods:WP_Query:private] => Array ( [0] => init_query_flags [1] => parse_tax_query ) [query_cache_key:WP_Query:private] => wp_query:21893ff35b6eb6031d94b32e5e8d3b5a:0.01353100 1761926431 [tribe_is_event] => [tribe_is_multi_posttype] => [tribe_is_event_category] => [tribe_is_event_venue] => [tribe_is_event_organizer] => [tribe_is_event_query] => [tribe_is_past] => )

Case Study: AWS Cloud Migration and DevOps

Our client was struggling with the complexities of securing, managing, and optimizing its AWS environment. As part of their modernization efforts, they wanted to adopt DevOps methodologies, including infrastructure as ...

Beyond Monitoring: The Case for Unified IT Observability

Monitoring has long been a staple of the IT toolset. But as IT leaders become more focused on delivering measurable business value, the limitations of simple monitoring are becoming more ...

Case Study: AWS Security for Business Resilience

Read about a client who faced a significant challenge in securing their AWS environment, which exposed the organization to potential service disruptions, security breaches, data exposure, and regulatory non-compliance. Download ...

Cilium CNI & Hubble: A Deep Dive with Installation, Configuration, Use Case Scenario and Istio Comparison

Kubernetes powers modern cloud-native infrastructure, but its networking layer often demands more than basic tools can deliver—enter Cilium, an eBPF-powered Container Network Interface (CNI). This blog explores Cilium’s features, a ...

Create Seamless Integrations to Support Single Pane-of-glass Visibility

Manage Your Entire IT Infrastructure with One Service Model.    Download now.  

Cloud Optimization: Act Now or Pay Later

Many things are usually easy when you first start out. For example, purchasing a new home is exciting and straightforward at first, but over time, maintenance issues arise, insurance costs ...

From Warm-Up Act to Headliner: The Rise of Kubernetes

At Evolving Solutions and Keyva, our Kubernetes expertise extends past the platform to your broader IT and business needs. While Kubernetes outperforms traditional virtual machine environments in flexibility and efficiency, its complexity can ...

Case Study: LAMP Stack Deployment Support

Read about a client faced an urgent issue when key IT personnel left the organization without leaving documentation artifacts. Download now