Operations | Monitoring | ITSM | DevOps | Cloud

May 2019

Complexity as the Enemy of Security

In an ideal scenario, security would be baked into the development process from the very beginning. Security teams would primarily exist to verify that best practices have been followed at every step in the process. In practice, security is an enormous challenge for most organizations. This challenge is compounded by the increasingly complex and fast-paced nature of modern service-oriented architectures, such as Kubernetes.

Docker and Kubernetes in high security environments

Container orchestration and cloud-native computing has gained lots of traction the recent years. The adoption has increased to such level that even enterprises in finance, banking and the public sector are interested. Compared to other businesses they differ by having extensive requirements on information security and IT security. One important aspect is how containers could be used in production environments while maintaining system separation between applications.

Key Features to Consider When Evaluating an Enterprise Kubernetes Solution

Digital transformation across industries is driving the need for IT to enable cloud-native applications. This has led enterprises to adopt Kubernetes as the most effective way to support cloud-native, container-based architectures, and to modernize their applications and IT infrastructure. Organizations of all sizes are looking to take advantage of Kubernetes – for both greenfield applications and for re-architecting and modernizing legacy applications.

Running Istio on Kubernetes in Production. Part I.

What is Istio? Istio is a service mesh technology adding an abstraction layer to the network. It intercepts all or part of the traffic in a k8s cluster and executes a set of operations on it. Which operations are supported? For example, setting up smart routing or implementing a circuit breaker approach, setting up “canary deployment”. Moreover, Istio makes possible imposing a limit on external interactions and controlling all routes between the cluster and an external network.

Five Things Your APM Platform Should do for Your Container Application Deployments.

One of the chief complexities in running large scale containerized applications is the need for continuous systems/application monitoring. Containers are very different from traditional VMs and the 3 tier applications that run on them. Monitoring that needs to ensure that SLAs promised to the business are being met as well as an ability to forecast usage trends while identifying problem areas such as bugs, capacity challenges, slowing performance, and any potential downtime.

Tigera Secure Enterprise Edition 2.4 Enables Firewalls to Secure Dynamic Kubernetes Workloads

We are excited to announce the new security capabilities of Tigera Secure Enterprise Edition 2.4. This release enables enterprise security teams to extend their existing zone-based architectures and easily connect to external resources. The highlights include DNS Policies, Threat Defense, Compliance Dashboard and Reporting, and easier installation options.

Key Kubernetes Concepts

Cloud computing, containerization, and container orchestration are the most important trends in DevOps. Whether you’re a data scientist, software developer, or product manager, it’s good to know Docker and Kubernetes basics. Both technologies help you collaborate with others, deploy your projects, and increase your value to employers. In this article, we’ll cover essential Kubernetes concepts. There are a lot of Kubernetes terms, which can make it intimidating.

Infrastructure Ops in 2019 - An Operating Model For Hybrid Cloud Transformation ..(2/2)

The early adopters have begun to find a great degree of success and it is now time for the more mainstream enterprise to get off the proverbial wall and begin exploring containers and other areas of the cloud-native landscape. However, there is a need to mitigate or manage the risk of adopting new technology as it does introduce a dimension of change that accompanies any transformation.

Infrastructure Ops in 2019 - How Legacy Technology Compounds Technical Debt (1/2)

In today’s software-driven economy, every organization faces an imperative to modernize the way they deliver software in order to adapt and enable the digital era — or perish. Digital transformation across industries is driving the need for IT to enable Cloud-Native applications. This has led enterprises to adopt Kubernetes as the most effective way to support cloud-native architectures and to modernize their applications and IT infrastructure.