About us
Open Source, innovation and excellence
We are not just regular technology enthusiasts!
We are the Getup Cloud team, deeply immersed in the Cloud-Native scene since the early days of the CNCF and Kubernetes, back in version 1.0. We are remote, global, believe in open source, collaborative, experienced, and passionate about what we do. Learn more about us.
About us
Open Source, innovation and excellence
We are not just regular technology enthusiasts!
We are the Getup Cloud team, deeply immersed in the Cloud-Native scene since the early days of the CNCF and Kubernetes, back in version 1.0. We are remote, global, believe in open source, collaborative, experienced, and passionate about what we do. Learn more about us.
About us
Open Source, innovation and excellence
We are not just regular technology enthusiasts!
We are the Getup Cloud team, deeply immersed in the Cloud-Native scene since the early days of the CNCF and Kubernetes, back in version 1.0. We are remote, global, believe in open source, collaborative, experienced, and passionate about what we do. Learn more about us.
Pioneers in Kubernetes and Containers
Our journey with containers and Kubernetes began at the same time as the Cloud Native Computing Foundation (CNCF). We have been working, learning, and specializing in these technologies ever since.
Open Source
Our passion for open source goes deeper than offering services; we create tools to share the knowledge we've gained and empower other Kubernetes practitioners. From Go to WebAssembly (WASM), our tools encapsulate and automate best practices for configuration and security in cloud-native environments.
Explore now our open source projects!
Constant Learning and Evolution
Our team of CNCF-certified experts drive Getup's commitment to cloud security and DevOps best practices in all our services. They're dedicated to exceptional results, making them your ideal collaborators for achieving success in the cloud.
Pioneers in Kubernetes and Containers
Our journey with containers and Kubernetes began at the same time as the Cloud Native Computing Foundation (CNCF). We have been working, learning, and specializing in these technologies ever since.
Open Source
Our passion for open source goes deeper than offering services; we create tools to share the knowledge we've gained and empower other Kubernetes practitioners. From Go to WebAssembly (WASM), our tools encapsulate and automate best practices for configuration and security in cloud-native environments.
Explore now our open source projects!
Constant Learning and Evolution
Our team of CNCF-certified experts drive Getup's commitment to cloud security and DevOps best practices in all our services. They're dedicated to exceptional results, making them your ideal collaborators for achieving success in the cloud.
Pioneers in Kubernetes and Containers
Our journey with containers and Kubernetes began at the same time as the Cloud Native Computing Foundation (CNCF). We have been working, learning, and specializing in these technologies ever since.
Open Source
Our passion for open source goes deeper than offering services; we create tools to share the knowledge we've gained and empower other Kubernetes practitioners. From Go to WebAssembly (WASM), our tools encapsulate and automate best practices for configuration and security in cloud-native environments.
Explore now our open source projects!
Constant Learning and Evolution
Our team of CNCF-certified experts drive Getup's commitment to cloud security and DevOps best practices in all our services. They're dedicated to exceptional results, making them your ideal collaborators for achieving success in the cloud.
Every moment matters. In day-to-day life, at events, talks or Kubicast; we build Getup together.
Join us on this journey.
Join us on this journey.
Whether you're a Kubernetes enthusiast exploring new possibilities, a potential collaborator seeking expertise, or simply curious about the magic of cloud-native, you've found a welcoming community.
Whether you're a Kubernetes enthusiast exploring new possibilities, a potential collaborator seeking expertise, or simply curious about the magic of cloud-native, you've found a welcoming community.
Getup team
Getup team
The professionals responsible for making Getup a building and collaboration environment for the future of technology.
The professionals responsible for making Getup a building and collaboration environment for the future of technology.
CEO
Diogo Goebel
CTO & K8s Advocate
João Brito
Chief Administrative Officer
Andrea Thompsen
Sales Executive
Cristiane Rodrigues
Service Delivery Manager
Thamires Monteiro
Strategic Advisor
Diane Mueller
Chief Engineer
Kevin Conner
Distinguished Developer
Mateus Carrucio
DevOps Engineer
Marcelo Melo
DevOps Engineer
Angela de Jesus
Head of Product
Camila Bedretchuk
Software Engineer
Matheus Faria
QA Analyst
Lucas Texeira
Front end Developer
João Victor
UX/UI & Web Designer
Arley Gomes
Our contributions to the community
Our contributions to the community
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
Open Source
Every time we attend Kubecon, we reflect on everything built from a single brick of open source: a vibrant conference, countless new projects, and the very foundation of businesses like Getup itself.
That's the power of open source – it creates jobs, builds businesses, and propels the world forward.
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
NAME
CLUSTER
ID
MESSAGE
SEVERITY
kind-kind-m-101-l8fvj
Kind-kind
M-101
Host namespaces
High
kind-kind-m-102-l8fvj
Kind-kind
M-102
Privileged container
High
kind-kind-m-103-l8fvj
Kind-kind
M-103
Insecure capabilities
High
kind-kind-m-104-l8fvj
Kind-kind
M-104
HostPath volume
High
kind-kind-m-105-l8fvj
Kind-kind
M-111
Not allowed volume type
Low
kind-kind-m-106-l8fvj
Kind-kind
M-113
Container could be running as root user
High
kind-kind-m-107-l8fvj
Kind-kind
M-407
CPU not limited
High
kind-kind-m-108-l8fvj
Kind-kind
POP-102
No probes defined
1
kind-kind-m-108-l8fvj
Kind-kind
POP-140
Host namespaces
1
$ kubectl get misconfigurations
Zora
scan completed successfully on cloud-control.eks cluster
SEVERITY
ID
CHECK
STATUS
FAILED
PASSED
High
M-101
Host namespaces
Failed
15
66
High
M-102
Privileged container
Failed
7
87
High
M-104
HostPath volume
Failed
6
25
High
M-103
Insecure capabilities
Passed
0
25
Medium
M-405
CPU not limited
Failed
6
25
Low
M-202
Automounted service account token
Passed
0
25
Low
M-401
Unmanaged Pod
Passed
0
25
Medium
M-404
Memory requests not specified
Failed
7
87
Low
M-114
Liveness probe not configured
Failed
19
36
Low
M-401
Container running as root UID
Passed
0
25
Low
M-471
HostPath volume
Passed
0
25
Medium
M-420
Automounted service account token
Passed
0
25
Marvin
CEL Playground
Open Source
Every time we attend Kubecon, we reflect on everything built from a single brick of open source: a vibrant conference, countless new projects, and the very foundation of businesses like Getup itself.
That's the power of open source – it creates jobs, builds businesses, and propels the world forward.
Open Source
Every time we attend Kubecon, we reflect on everything built from a single brick of open source: a vibrant conference, countless new projects, and the very foundation of businesses like Getup itself.
That's the power of open source – it creates jobs, builds businesses, and propels the world forward.
Training DevOps for the real word
In partnership with LinuxTips, we created a 100% free program to develop beginner professionals in the DevOps field. The program offers technical training, challenges with practical cases, behavioral skills assessment, and mentorship.
3.800
registrations
2
selection stages with live quiz
20
participants
142
hours of tech skills
10
mentorship meetings with the GetUp team
Training DevOps for the real word
In partnership with LinuxTips, we created a 100% free program to develop beginner professionals in the DevOps field. The program offers technical training, challenges with practical cases, behavioral skills assessment, and mentorship.
3.800
registrations
2
selection stages with live quiz
20
participants
142
hours of tech skills
10
mentorship meetings with the GetUp team
Training DevOps for the real word
In partnership with LinuxTips, we created a 100% free program to develop beginner professionals in the DevOps field. The program offers technical training, challenges with practical cases, behavioral skills assessment, and mentorship.
3.800
registrations
2
selection stages with live quiz
20
participants
142
hours of tech skills
10
mentorship meetings with the GetUp team
Our principles
Our principles
Excellence and hard work
When we say we are Kubernetes experts, we commit to implementing the best solutions for our customers, with a mission to make infrastructure invisible so they can focus on their businesses.
We are here to solve problems and we don't accept half-finished work. We are detail-oriented and tireless in our pursuit of the best solutions for our customers.
Collaboration and innovation
The technology landscape is dynamic and constantly evolving. We believe in continuous improvement and that the best solution today may not be the best solution tomorrow.
Balance
We don't like the idea that work isn't rewarding, satisfying, and gratifying. We encourage the growth of people who work with us and love discovering and encouraging other talents in the personal lives of our team members. We understand the importance of people being proud of their lives both inside and outside the company.
Autonomy
We trust that our people will do an excellent job from start to finish with minimal supervision. Therefore, everyone on our team has a great deal of responsibility in their workload.
Unlock your cloud native potential
From cost optimization to cloud migration and the adoption of open-source tools, we make Kubernetes operation simple, reliable, and more secure.
Unlock your cloud native potential
From cost optimization to cloud migration and the adoption of open-source tools, we make Kubernetes operation simple, reliable, and more secure.
Unlock your cloud native potential
From cost optimization to cloud migration and the adoption of open-source tools, we make Kubernetes operation simple, reliable, and more secure.
Opportunities
Copyright © Getup
Opportunities
Copyright © Getup
Opportunities
Copyright © Getup