Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Containers, Kubernetes, Docker and related technologies.

Sysdig 2020 Container Security Snapshot: Key image scanning and configuration insights

Today, we are excited to share our Sysdig 2020 Container Security Snapshot, which provides a sneak peak into our upcoming 2020 Container Usage Report As containers and Kubernetes adoption continue to increase, cloud teams are realizing they need to adopt a new workflow that embeds security into their DevOps processes. Secure DevOps, a variation of DevSecOps, embeds security and monitoring throughout the application lifecycle, from development through production.

Introducing Kubernetes Enrichment Early Access

With more engineering teams adopting Kubernetes as their container orchestration platform, new challenges emerge in giving your entire team visibility into Kubernetes for monitoring, debugging, and deployment. We’ve heard consistent feedback from developers and infrastructure teams about the observability gaps that exist between underlying Kubernetes infrastructure and deployed services.

Installing the HAProxy Kubernetes Ingress Controller using Helm

Helm, the Kubernetes package manager, revamps the way teams manage their Kubernetes resources and allows them to deploy applications in a consistent and reliable way. It is a valuable tool in a continuous delivery pipeline, with support for quick updates and rollbacks. At HAProxy Technologies, we offer Helm as the preferred method for installing the HAProxy Kubernetes Ingress Controller, and we’ll show you how to customize that installation to fit your use case.

Kubernetes Cost Optimization: Getting Visibility into Cost Per Pod, Cluster, and Namespace

How much does your Kubernetes service cost to operate? This seems like a simple question, right? It’s one thing to say how much your Kubernetes cluster itself costs to operate — that, after all, is a group of real servers, associated with a specific number.

August 2020 Online Meetup - Rancher 2.5 Preview - EKS Lifecycle Management

Hosted cloud provider Kubernetes services like EKS alleviate the operational burden of Kubernetes. The cluster operator is still responsible for upgrades and all the day 2 operations for the applications running on the cluster. In this meetup we'll discuss how Rancher can help manage the lifecycle of EKS clusters, and will walk through importing existing and provisioning new EKS clusters through Rancher. We will also look at how to deploy Rancher logging and monitoring onto the cluster to handle day 2 operations on the cluster.

How to Implement Network Policy in Amazon EKS to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Amazon EKS solution to this security concern is Network Policy that lets developers control network access to their services. Amazon EKS comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

Creating Memorable Gaming Experiences with Kubernetes

If you’re a gamer, you probably know how immersed you can get in your favorite game. Or if you’re the parent or partner of a gamer, you probably know what it’s like to try to get the attention of someone who is in “gaming mode.” Creating worlds and enriching players’ lives is in Ubisoft’s DNA.

10 Helm Tutorials to Start your Kubernetes Journey

The growth of Kubernetes has been stellar and K8s applications have grown in importance and complexity. Today, even configuring a single application can require creating many interdependent K8s sources that each depend on writing a detailed YAML manifest file. With this in mind, Helm as a package manager for Kubernetes is a major way users can make their K8s configurations reusable.

KMC - How Helm 3 and Helm Charts Create Reproducible Security

Helm 3 is developing a set of best practices that help make Kubernetes applications more secure. As a recent graduate from incubation to full-fledged project of the Cloud Native Computing Foundation, Helm has been developing its own ecosystem and is working towards mature tooling. Join Rancher and JFrog as they provide more details into updates in Helm 3 and how Helm Charts create reproducible security in the Kubernetes ecosystem.

Enforcing Enterprise Security Controls in Kubernetes using Calico Enterprise

Hybrid cloud infrastructures run critical business resources and are subject to some of the strictest network security controls. Irrespective of the industry and resource types, these controls broadly fall into three categories. Workloads (pods) running on Kubernetes are ephemeral in nature, and IP-based controls are no longer effective. The challenge is to enforce the organizational security controls on the workloads and Kubernetes nodes themselves.