0
1
2
3
4
5
6
7
8
9


Onix DevOps Expertise
Web product
1 / 2



Here are the main dimensions our DevOps are knowledgeable at.
To handle security we use external tools to scan our architecture, application, for example Drata is used to keep general security concept.
Snyk, JFrog, Trivy, Github Security help us to not allow any vulnerability in our code. Also we check code by Sonarqube.
Technologies
AWS
Azure
GitLab
Alibaba Cloud
Docker
Apache
Grafana
Zabbix
GitHub
Bitbucket
jeckins
groovy
Bash
OpenShift
travis ci
Redis
Vault
Vagrant
rds