About us
Open Source, innovation and excellence
We are not just regular technology enthusiasts!
We are the Getup Cloud team, deeply immersed in the Cloud-Native scene since the early days of the CNCF and Kubernetes, back in version 1.0. We are remote, global, believe in open source, collaborative, experienced, and passionate about what we do. Learn more about us.
About us
Open Source, innovation and excellence
We are not just regular technology enthusiasts!
We are the Getup Cloud team, deeply immersed in the Cloud-Native scene since the early days of the CNCF and Kubernetes, back in version 1.0. We are remote, global, believe in open source, collaborative, experienced, and passionate about what we do. Learn more about us.
About us
Open Source, innovation and excellence
We are not just regular technology enthusiasts!
We are the Getup Cloud team, deeply immersed in the Cloud-Native scene since the early days of the CNCF and Kubernetes, back in version 1.0. We are remote, global, believe in open source, collaborative, experienced, and passionate about what we do. Learn more about us.
Pioneers in Kubernetes and Containers
Our journey with containers and Kubernetes began at the same time as the Cloud Native Computing Foundation (CNCF). We have been working, learning, and specializing in these technologies ever since.
Open Source
Our passion for open source goes deeper than offering services; we create tools to share the knowledge we've gained and empower other Kubernetes practitioners. From Go to WebAssembly (WASM), our tools encapsulate and automate best practices for configuration and security in cloud-native environments.
Explore now our open source projects!
Constant Learning and Evolution
Our team of CNCF-certified experts drive Getup's commitment to cloud security and DevOps best practices in all our services. They're dedicated to exceptional results, making them your ideal collaborators for achieving success in the cloud.
Pioneers in Kubernetes and Containers
Our journey with containers and Kubernetes began at the same time as the Cloud Native Computing Foundation (CNCF). We have been working, learning, and specializing in these technologies ever since.
Open Source
Our passion for open source goes deeper than offering services; we create tools to share the knowledge we've gained and empower other Kubernetes practitioners. From Go to WebAssembly (WASM), our tools encapsulate and automate best practices for configuration and security in cloud-native environments.
Explore now our open source projects!
Constant Learning and Evolution
Our team of CNCF-certified experts drive Getup's commitment to cloud security and DevOps best practices in all our services. They're dedicated to exceptional results, making them your ideal collaborators for achieving success in the cloud.
Pioneers in Kubernetes and Containers
Our journey with containers and Kubernetes began at the same time as the Cloud Native Computing Foundation (CNCF). We have been working, learning, and specializing in these technologies ever since.
Open Source
Our passion for open source goes deeper than offering services; we create tools to share the knowledge we've gained and empower other Kubernetes practitioners. From Go to WebAssembly (WASM), our tools encapsulate and automate best practices for configuration and security in cloud-native environments.
Explore now our open source projects!
Constant Learning and Evolution
Our team of CNCF-certified experts drive Getup's commitment to cloud security and DevOps best practices in all our services. They're dedicated to exceptional results, making them your ideal collaborators for achieving success in the cloud.
Every moment matters. In day-to-day life, at events, talks or Kubicast; we build Getup together.
Join us on this journey.
Join us on this journey.
Whether you're a Kubernetes enthusiast exploring new possibilities, a potential collaborator seeking expertise, or simply curious about the magic of cloud-native, you've found a welcoming community.
Whether you're a Kubernetes enthusiast exploring new possibilities, a potential collaborator seeking expertise, or simply curious about the magic of cloud-native, you've found a welcoming community.
Getup team
Getup team
The professionals responsible for making Getup a building and collaboration environment for the future of technology.
The professionals responsible for making Getup a building and collaboration environment for the future of technology.
CEO
Diogo Goebel
CTO & K8s Advocate
João Brito
Chief Administrative Officer
Andrea Thompsen
Sales Executive
Cristiane Rodrigues
Service Delivery Manager
Thamires Monteiro
Strategic Advisor
Diane Mueller
Chief Engineer
Kevin Conner
Distinguished Developer
Mateus Carrucio
DevOps Engineer
Marcelo Melo
DevOps Engineer
Angela de Jesus
Head of Product
Camila Bedretchuk
Software Engineer
Matheus Faria
QA Analyst
Lucas Texeira
Front end Developer
João Victor
UX/UI & Web Designer
Arley Gomes
Our contributions to the community
Our contributions to the community
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
Open Source
Toda vez que participamos de uma Kubecon fazemos a reflexão sobre tudo que foi construído a partir de um único projeto open source: uma conferência com milhares de participantes, inúmeros outros projetos criados, assim como empresas, incluindo a própria Getup, empregos, negócios e inovação.
Open source é colaboração, é dividir conhecimento, promover inovação e crescimento.
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces