Containers

The latest News and Information on Containers, Kubernetes, Docker and related technologies.

What is Rancher?

This video provides a short introduction to Rancher, the world’s most widely deployed Kubernetes management platform. With Rancher, IT organizations can deploy, manage and secure any Kubernetes deployment regardless of where it is running. Best of all, Rancher is intuitive to use, and built to support DevOps teams, as they use containers to automate operations and move to continuous delivery. Rancher is 100% free and open source.

Kublr, enterprise-grade Kubernetes -- an overview (short demo)

Centrally deploy, run, and manage Kubernetes clusters across all of your environments with a comprehensive container orchestration platform that finally delivers on the Kubernetes promise. Optimized for large enterprises, Kublr is designed to provide multi-cluster deployments and observability. We made it easy, so your team can focus on what really matters: innovation and value generation.
canonical

MicroK8s HA tech preview is now available

High availability (HA) for MicroK8s, the lightweight Kubernetes, is now available as a tech preview for Linux, Windows and macOS. The Kubernetes control plane can now be distributed across multiple nodes, bringing resiliency to the cluster while maintaining a low footprint using Dqlite, the distributed SQL engine as the Kubernetes datastore.

alcide

New Kubernetes Node Vulnerability (CVE-2020-8558) bypasses localhost boundary

New Kubernetes Node Vulnerability (CVE-2020-8558) bypasses localhost boundary A security issue was discovered in kube-proxy which allows adjacent nodes/hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace (host network). This breaks security assumptions made by services listening on localhost.

logz.io

Chaos Engineering for a More Secure Kubernetes

Netflix, Amazon, Google, Facebook, and a host of other companies have adopted chaos engineering, which encourages designing systems to proactively ward off potential issues through testing and the anticipation of failure. When it comes to container orchestration tools like Kubernetes, chaos engineering is a vital tactic for enhancing security.

sysdig

Monitoring Kubernetes in Production

Monitoring Kubernetes, both the infrastructure platform and the running workloads, is on everyone’s checklist as we evolve beyond day zero and into production. Traditional monitoring tools and processes aren’t adequate, as they do not provide visibility into dynamic container environments. Given this, what tools can you use to monitor Kubernetes and your applications?

sysdig

Best practices for alerting on Kubernetes

A step by step cookbook on best practices for alerting on Kubernetes platform and orchestration, including PromQL alerts examples. If you are new to Kubernetes and monitoring, we recommend that you first read Monitoring Kubernetes in production, in which we cover monitoring fundamentals and open-source tools. Interested in Kubernetes monitoring?

rancher

Create Reproducible Security in Kubernetes with Helm 3 and Helm Charts

With the growing popularity of containerized applications, organizations and startups at all levels need to manage their Kubernetes deployments more safely at scale. Today, there is an expanding list of tools and services that can help do this. One of these services is the package manager known as Helm.

Kublr, enterprise-grade Kubernetes -- an overview (short demo)

Centrally deploy, run, and manage Kubernetes clusters across all of your environments with a comprehensive container orchestration platform that finally delivers on the Kubernetes promise. Optimized for large enterprises, Kublr is designed to provide multi-cluster deployments and observability. We made it easy, so your team can focus on what really matters: innovation and value generation.
tigera

Now GA: Data-in-Transit Encryption in Calico v3.15

We’re excited to announce that the latest release of Calico includes encryption for data-in-transit. Calico is the open source networking and network security solution for containers, virtual machines, and host-based workloads, offering connectivity and security for container workloads. One of Calico’s best-known security features is its implementation of Kubernetes Network Policy, providing a way to secure container workloads by restricting traffic to and from trusted sources.