Understanding Kubernetes pod evicted and scheduling problems

Pod evicted and scheduling problems are side effects of Kubernetes limits and requests, usually caused by a lack of planning. Beginners tend to think limits are optional, and merely an obstacle for your stuff to run. Why should I set a limit if I can have no limits? I may need all CPU eventually. With this way of thinking Kubernetes wouldn’t have gone far. Fortunately, Kubernetes developers had this in mind, and the quota mechanism is designed to avoid misuse of resources.


StackRox on security for Google Anthos

Today we shared the news that StackRox supports the Anthos platform (download joint solution brief), extending the reach of our hybrid and multicloud security approach. Anthos and the StackRox Kubernetes Security Platform share a lot of common principles in delivering consistency across different environments – enabling both the infrastructure itself as well as the security policies and controls to bridge these worlds makes for a powerful combination.


Why Enterprises should push for Container Adoption in 2020?

Enterprises that have been running their own data centers for a number of years are skeptical of the benefits associated with cloud. One of the considerations for many enterprises is to be able to build modern applications such that the dependency on a particular cloud stack is minimal, or the interfaces that are depending on the specific cloud are abstracted well.

January 2020 Online Meetup: Securing Your Production Grade Kubernetes Clusters Using Rancher

As DevOps teams deploy Kubernetes in production using Rancher, enterprises must focus on the runtime security and compliance requirements of their cloud-native platforms. Starting with Rancher 2.2, we published self-assessment and hardening guides to outline provisioning a cluster to comply with the CIS Kubernetes benchmark. Identifying gaps and pain points in the process, Rancher engineering added additional features to both Rancher and RKE to simplify the process.

Understanding Kubernetes limits and requests by example

How we set Kubernetes limits and requests is essential in optimizing application and cluster performance. One of the challenges of every distributed system designed to share resources between applications, like Kubernetes, is, paradoxically, how to properly share the resources. Applications were typically designed to run standalone in a machine and use all of the resources at hand. It is said that good fences make good neighbors.


Top Kubernetes Tutorials & Resources for All Levels

If you are a developer who uses containers, chances are you and your team have heard about Kubernetes. At its core, Kubernetes is a container operating system for the web, but has grown to be much more. Sure, Kubernetes can manage your containers, network traffic, and bring up a crashed ad, but it has also become a widely adopted platform with a growing community.


Find Security Vulnerabilities in Kubernetes Clusters

Security is one of the most talked-about topics for Kubernetes users. Google “Kubernetes security” and you’ll find a huge number of articles, blogs and more. The reason is simple: you need to align your container and Kubernetes security with your organization’s existing security profile. Kubernetes has some strong security best practices for your cluster—authentication and authorization, encryption in secrets and objects in the etcd database—to name a few.