How to Size Log Topics in the Avassa Edge Platform
Published on:August 25, 2025In this blog post, I will describe how to properly size log topics in an Avassa system. Log topics are critical for capturing and reviewing logs from…
Published on:August 25, 2025In this blog post, I will describe how to properly size log topics in an Avassa system. Log topics are critical for capturing and reviewing logs from…
Published on:August 25, 2025Edge applications often need to connect back to the cloud—commonly to send data or consume services. A critical part of this process is secure authentication with AWS….
Published on:February 5, 2025Multi-tenancy is a great feature—it allows multiple teams to share compute resources while still maintaining control over their own applications. Each team can deploy, upgrade, and monitor…
Published on:December 2, 2024Many of our users face the challenge of accessing their software running on end-customers’ networks. Often, a VPN is set up, which can be both costly and…
Published on:October 15, 2024Avassa Secrets Management and Hashicorp Vault are two products with a common objective in addressing the problem of storing secrets securely, both at rest and when in…
Published on:September 3, 2024Security enforcing measures differ a lot between centralized cloud environments and the more exposed distributed edge. Central solutions can trust perimeter security and operational processes covering a…
Published on:May 13, 2024You have a lot of hardware, distributed over many locations. If you want to deploy the exact same software, with the exact same configuration on all those…
Published on:March 24, 2024Offline sites. Can’t live with them, can’t live without them. Suppose you have systems running at thousands of locations, such as Edge AI applications, robot controllers, video…
Published on:February 6, 2024At the edge sites, where our customer have deployed Edge Enforcers to manage the container application, there are often other servers and network equipment. At times the…
Published on:February 6, 2024It is a well-established practice to use certificates to affirm the identity of an application. Managing certificates can be cumbersome, especially when you may need 100s or…