Agilicus presents its architecture, philosophy, strategy at CNCF Eastern Canada Stories Meetup
We often think in Boolean terms: Outside Bad, Inside Good
Instead, assume each layer will be breached
For audit, security, tracing, we want the origin IP logged. Load-balancers can mask this. Learn how to log the true client IP from nginx with lua, when that nginx is behind a load-balancer (reverse proxy)
Idenity: Authentication a user in a simple, secure way, with two-factor authentication, and allowing the user to interact with API are the key to success.
Secure. Reliable. Economical. All three. We have embraced failures to create a reliable municipal hybrid cloud with unreliable components, economically.