Case Studies

NIA SaaS DevOps Projects

Public Utilities – Government


  • Offering managed container solutions for public sector by leveraging globally anticipated cloud technology
  • Addressing day-2-Operations, the primary concern post-containerization, through SaaS
  • Enhancing scalability via unified services within the national research container platform PaaS-TA
  • Provide a practical approach to MSA transformation and DevOps adoption for Cloud DX


Kubernetes DevOps System

  • Ready-to-use CI/CD and automated DevOps process tools, including source-to-image and binary-to-image, based on Jenkins

Service Mesh Features

  • Supplying detailed traffic control, observability, traceability, and traffic topology visualization

Cloud-native telemetry

  • Multidimensional monitoring, event, and audit log queries are supported. Includes multi-tenant log query and collection, alerts and alarms

App Store

  • Provide an application store for Helm-based applications and provide application lifecycle management on the Kubernetes platform

Managing Kubernetes Multi-Cluster

  • Deploying applications across numerous clusters and cloud service providers (CSPs), while offering disaster recovery and cross-cluster visibility

Build the KB Wallet platform

Finance – Insurance


  • Enhancing KB Star Bank’s competitiveness by exploring new ventures based on innovative technologies, establishing MSA architecture as a service element, and promoting shared development
  • Build KB Wallet platform to discover new business opportunity areas based on new technologies
  • Platformization of authentication services and acquisition of non-account-based customers by focusing on differentiated services and contents
  • Implementing a platform that provides customer-centric services and flexibly connects with external services
  • Build the latest IT development infrastructure and architecture in compliance with the KB Architecture Design Guide, and Organize CI/CD according to KB agile development methodology


Define and deploy AWS environment resources for MSA services

  • Define and deploy AWS resources (EC2, EKS, API G/W, RDS, ECR, MSK, EFS, S3, Route53, CloudWatch, OpenSearch, CodeDeploy)
  • Build infrastructure and architecture that MSA design is applied
  • Configure LB – API G/W – Istio for MSA s
  • Offer monitoring through Jenifer and EFK setup

Merge with your AWS platform for CI/CD and construction pipelines

  • Integration and pipeline setup with AWS platform and CI/CD utilities pre-loaded in KBOneCloud for deployment (Bitbucket, Jenkins, ArgoCD, SonarQube, Sparrow, Nexus, Harbor)

Rebuilding LINA Life’s digital channels

Finance – Insurance


  • Reconstructing the LainaLife Digital Channel in an AWS Cloud-centric DevOps Environment
  • Establishing a Service Mesh Environment for MSA
  • Constructing Deployment System (STG) and Production System (PRD) Infrastructure with laC
  • Build a CI/CD Pipeline and Deployment Process
  • Build an Infra, Application Monitoring Environment


Infrastructure as Code

  • Offer AWS deployment realm (STG) and production realm (PRD) framework using Terraform

Service Mesh

  • Provide a Service Mesh environment between MSAs through AWS EKS-based Consul


  • Provide CI/CD Pipeline and Deployment Process environment based on AWS EKS and EC2
  • Tool : GitLab, GitLab-Runner, Nexus, Harbor, Sonarqube, Jenkins, ArgoCD


  • Provide Application & AWS Infra Monitoring environment through ELK

Yogiyo STT introduces new AI solution

Information – Communications


  • Configure AIQ Talk infrastructure and upgrade your chatbot cluster by building a new chatbot AI solution
  • Configure MinIO object storage
  • Configure Docker Image registry
  • Nvidia GPU driver upgrade
  • Increase the number of chatbot cluster GPU nodes



  • Boost chatbot cluster performance via Nvidia driver upgrade and additional GPU nodes

Image registory

  • Nexus to Harbor redundancy transition and image migration at the customer site

MinIO object storage

  • Multi-faceted monitoring, event, and audit log queries supported, includes multi-tenant log queries, collection, alerts, and alarms

ElasticSearch cluster for ELK

  • Building an ElasticSearch cluster in the ELK Stack for Logging System and making it accessible to chatbot clusters

Amorepacific DevOps-based SW Lifecycle System Advancement Consulting



  • Develop DevOps systems and automated procedures to modernize SW lifecycle
  • Configure Cloud Native Architecture
  • Establish a containerization environment and secure infrastructure stability and efficiency via Kubernetes
  • Configure test environment and secure automation area
  • Introduce automation of work procedures
  • Improve CI/CD tools and expand IaC


Building DevOps Infrastructure and Architecture

  • Configure and deploy infrastructure based on AWS EKS
  • Configure a Containerization Environment

Design and Build a CI/CD Pipeline

  • Build a CI/CD Pipeline based on AWS EKS
  • Build a CI/CD automation process with Jira
  • Set up a toolchain with GitLab, GitLab-Runner, Nexus, Sonarqube, Jenkins, ArgoCD, and Jira

Infrastructure as Code

  • Deliver a 4-tier Infra environment and organize AWS resources via Terraform


  • Provide a log monitoring environment for each environment with Opensearch

Building the Hyundai Steel Rancher Kubernetes environment



  • Assist in building and configuring a Kubernetes cluster on RKE2, deploy CICD pipelines, AWS ELK, and APIM workloads
  • Build a production RKE2 cluster
  • Configure HA (infrastructure end redundancy)
  • Build CI/CD pipeline and deploy ELK
  • Deploy APIM workload
  • Support for technical deployment of development systems


RKE2 aims to simplify and make more reliable the operation of Kubernetes clusters with the more secure RKE2 than RKE

RKE2, a fully compatible Kubernetes distribution focused on security and compliance for the U.S. federal sector, achieves these goals by

Kubernetes Benchmark

  • Providing defaults and configuration options for clusters to pass the CIS Kubernetes Benchmark v1.6 or v1.23 with minimal operator input

Security Standards

  • FIPS 140-2 compliant

Vulnerability checks

  • Regularly scan components for CVEs using trivy in the build pipeline