Documentation
Event Filtering
Boundary events can be emitted in several formats including cloudevents and hclog, and can be encoded as text and json.
Use case
Visibility into session metrics, events, logs, and traces with the ability to export data to business intelligence and event monitoring tools.
Challenge
Controlling access to dynamic and ephemeral environments and services based on IPs is brittle and operationally complex. This makes it extremely difficult to ensure compliance and governance and that only the right individuals have access to the appropriate systems and data.
Solution
Boundary enables users to audit access based on identity and simplify management by defining controls around logical services. Boundary also integrates with platform and service discovery for dynamic hosts and services.
Boundary is a secure remote access solution that provides an easy way to allow access to applications and critical systems with fine-grained authorizations based on trusted identities across clouds, local data centers, low-trust networks.
Armon Dadgar
CO-FOUNDER & CTO