Operations | Monitoring | ITSM | DevOps | Cloud

%term

What Your Kubernetes Security Checklist Might Be Missing

New technologies often require changes in security practices. What is remarkable about containers and Kubernetes, is that they also provide the potential for enhancing and improve existing security practices. In this post, I will share a model that we use at Nirmata to help customers understand security concerns and plan Kubernetes implementations that are secure.

Key metrics for Amazon EKS monitoring

Amazon Elastic Container Service for Kubernetes, or Amazon EKS, is a hosted Kubernetes platform that is managed by AWS. Put another way, EKS is Kubernetes-as-a-service, with AWS hosting and managing the infrastructure needed to make your cluster highly available across multiple availability zones. EKS is distinct from Amazon Elastic Container Service (ECS), which is Amazon’s proprietary container orchestration service for running and managing Docker containers.

Tools for collecting Amazon EKS metrics

In Part 1 of this series, we looked at key metrics for tracking the performance and health of your EKS cluster. Recall that these EKS metrics fall into three general categories: Kubernetes cluster state metrics, resource metrics (at the node and container level), and AWS service metrics. In this post, we will go over methods for accessing these categories of metrics, broken down by where they are generated.

Monitoring your EKS cluster with Datadog

In this post, we’ll explore how Datadog’s integrations with Kubernetes, Docker, and AWS will let you track the full range of EKS metrics, as well as logs and performance data from your cluster and applications. Datadog gives you comprehensive coverage of your dynamic infrastructure and applications with features like Autodiscovery to track services across containers; sophisticated graphing and alerting options; and full support for AWS services.