Kubernetes in the context of on-premises edge and network edge computing
For cloud-native edge computing applications there is a need for facilitating data processing at the edge of the network to stay at proximity to the source of events with characteristics of ultra-low latency and high bandwidth…
SearchITOperations: “KubeCon 2020 preview: Session guide for fine-tuning Kubernetes”
The Cloud Native Computing Foundation hosts KubeCon + CloudNativeCon North America, taking place online November 17-20. CNCF manages the open source Kubernetes project, and offers Kubernetes training and certifications, in addition to KubeCon. Expert Kubernetes users…
SearchITOperations: “KubeCon 2020 preview: Session guide for Kubernetes professionals”
Some of your applications are containerized, running in production on Kubernetes or a supported distribution thereof. You’re reaping the benefits of a consistent application environment from development to test and production. What’s next? KubeCon + CloudNativeCon…
SearchITOperations: “KubeCon 2020 preview: Session guide for Kubernetes beginners”
While Kubernetes is a relatively young technology, reaching version 1.0 in 2015, many IT organizations run large production workloads with mature Kubernetes and container deployments. For these advanced adopters, the information shared at KubeCon + CloudNativeCon…
SearchITOperations: “KubeCon 2020 preview: Session guide for Kubernetes beginners”
With more than a dozen technical tracks and hundreds of sessions, KubeCon + CloudNativeCon can prove daunting to a Kubernetes beginner. But as a low-cost virtual event in 2020, the conference presents a unique opportunity for…
Debugging Kubernetes Applications on the Fly
Guest post originally published on Rookout’s blog by Josh Hendrick, Senior Solutions Engineer at Rookout Over the recent years, software development organizations have seen a major shift in where they build and run their applications. Teams…
Hack my mis-configured Kubernetes – privileged pods
Guest post by Or Kamara, Engineering Team Lead at Snyk The ease of use of Kubernetes can create some big security holes when introducing changes without understanding their effects. The purpose of this hands-on tutorial is…
MicroK8s HA under the hood: Kubernetes with Dqlite
High availability (HA) is the cornerstone of any production-grade Kubernetes. MicroK8s, already popular for IoT and developer workstations, can, as of release 1.19, withstand the loss of any node and still provide reliable services for production…
The abc’s of Kubernetes security
As more mainstream IT organizations adopt Kubernetes and cloud-native application architectures, they often identify as one of their main concerns the ability to do so securely. (Interestingly, this almost precisely matches concerns about adopting virtual machine…
Container Journal: “CNCF Graduates Rook to Automate Kubernetes Storage Tasks”
The Cloud Native Computing Foundation (CNCF) has graduated Rook, an open source storage orchestrator for Kubernetes clusters, at a time when the number of stateful applications being built and deployed using containers is starting to increase….