Balance innovation and agility with security and compliance
risks using a 3-step process across all cloud infrastructure.
Step up business agility without compromising
security or compliance
Everything you need to become a Kubernetes expert.
Always for free!
Everything you need to know about Magalix
culture and much more
We have extended your ability to enforce security, reliability, and best practices policies through KubeAdvisor 2.0, by allowing you to write your own policies against the following K8s object types:
We also added new dashboards for each of the mentioned object groups, so you have better visibility of each group’s compliances and violations.
You can read more about getting started with KubeAdvisor here.
We have released a new set of policies that target your clusters nodes to ensure you have the right configurations for them to help you manage them at scale. To read more about these policies check our documentation here
We have released a rego playground for you to help you author your rego and test them out before using them in your KubeAdvisor policies. You will be able to test out your Rego against a spec you have or better against an existing object YAML spec from your cluster.
We have our regular KubeAdvisor scan every 24 hours to check if your cluster objects are compliant or violating. Now we have enabled you to manually trigger any advisor from KubeAdvisor to be able to check your cluster objects compliance.
We made it really easy for you to identify which containers are the top wasting CPU or memory resources. Currently, in your optimizations view, you will be able to see the top 25 containers that waste resources and how much resources you can save if you started applying the recommended requests or limits.
We are actively enhancing our KubeOptimizer algorithms to have more accurate and reliable recommendations. Recently we have released the following enhancements;
In the search for a better user experience, we started revamping a couple of dashboards. We started with a better-designed onboarding screen to connect your first cluster, we changed the way the cluster dashboard was reporting violations and optimizations summary to help you have a bird-eye view on what’s happening with your cluster and where to take action. Finally, we introduced more filtration ability around tables across all of our dashboards to get you focused on the things that matter the most for you.
Connect your first cluster and start your 30-days free trial with Magalix
Know more about the 4 main types of “leaks” that commonly occur with cloud asset management, and some useful strategies to address them.
With the NIST cybersecurity framework implemented using policy-as-code, companies can strengthen their security processes. Learn more.
A step-by-step guide on how to check for image vulnerabilities using Trivy and policy-as-code.