Securing containers against attacks in multiple deployments and different geolocations requires integrating security into multiple points in the pipeline. Using manual processes to impose the policies is error-prone. Automation is a key to ensure the best…
Cluster API (CAPI) – A Kubernetes subproject to simplify cluster lifecycle management
During this talk we’ll do a walkthrough of Cluster API (cluster-api.sigs.k8s.io), a project of SIG Cluster Lifecycle to bring declarative, Kubernetes-style APIs to cluster creation, configuration, and management. After introducing the project, we’ll do a live…
20,000 upgrades later, lessons from a year of managed Kubernetes upgrades
Upgrading to a new release is one of the most disruptive operations we regularly inflict on our Kubernetes clusters. There are multiple strategies for doing an upgrade, but they all require rescheduling workloads and restarting cluster…
Kubernetes: Zero to hero deployments and management
When IT operators and developers think containers, naturally, the first thought is Kubernetes. The use of Kubernetes managed services has provided teams the ability to bootstrap environments at unprecedented velocity. Removing the necessity to manage cluster…
Decoding the self-healing Kubernetes: step by step
Guest post originally published on the Msys Technology blog by Atul Jadhav Prologue Business application that fails to operate 24/7 would be considered inefficient in the market. The idea is that applications run uninterrupted irrespective of a technical…
Hybrid cloud Kubernetes with Nodeless
Nodeless Kubernetes enables you to stretch a single Kubernetes control plane to schedule pods across heterogenous compute types (on-demand, pre-emptible, Fargate, ACI, etc) on multiple cloud providers (on-prem, AWS, GCP, Azure, etc). The webinar will enumerate…
Securing service mesh with Kubernetes, Consul and Vault
In this session, we’ll look at using HashiCorp tools to help you as your infrastructure continues to grow, helping to manage secrets, and secure communication between applications running in multiple clusters. We will demonstrate how to…
Zero trust services in Kubernetes
In this webinar we will take a look at some of the most important techniques used to create Zero Trust services in a Kubernetes environment. This talk will cover concepts ranging from container image hardening to…
The definitive checklist for delivering reliable Kubernetes-based applications
The shift to a containerized world is transforming everything we’ve ever known about developing and maintaining our applications – particularly when it comes to ensuring code quality. With so many moving pieces, knowing when code in…
How to manage Secrets in Kubernetes environment
Guest post originally published on Medium by Saurabh Gupta, Sr. Developer Advocate at DigitalOcean Introduction: Kubernetes is currently the de-facto standard for container orchestration. As organizations globally are adopting a Container first development approach, a large…