The latest News and Information on Containers, Kubernetes, Docker and related technologies.
In Part 1 of this series, you learned the core components of Kubernetes, an open-source container orchestrator for deploying and scaling applications in distributed environments. You also saw how to deploy a simple application to your cluster, then change its replica count to scale it up or down. In this article, you’ll get a deeper look at the networking and monitoring features available with Kubernetes.
This July, the community spirit was profoundly vibrant in the scenic city of Munich, as Kubernetes Community Day (KCD) Munich brought together a meeting of minds and inspired the open-source collaboration we all know and love. The event was a testament to the strength and vitality of the Kubernetes community, which pulsed with an energy of shared intellectual curiosity and passion for all things Kubernetes.
In this blog post, we will explore the concept of Kubernetes topology aware routing and how it can enhance network performance for workloads running in Amazon. We will delve into topology aware routing and discuss its benefits in terms of reducing latency and optimizing network traffic flow. In addition, we’ll show you how to minimize the performance impact of overlay networking, using encapsulation only when necessary for communication across availability zones.
In the dynamic landscape of software development, the terms DevOps and Platform Engineering have garnered attention. Both concepts, although distinct, aim at a shared goal: to build efficient, streamlined systems that simplify code deployment within organizations.
Alfredo García, manager R&D, VMware contributed to this blog post. VMware Application Catalog now includes enterprise support for Sealed Secrets, enabling customers to add an asymmetric cryptography-based protection to their Kubernetes Secrets stored in shared repositories.
This post was written by Talha Khalid, a full-stack developer and data scientist who loves to make the cold and hard topics exciting and easy to understand. No one has any doubt that microservices architecture has already proven to be efficient. However, implementing security, particularly in an immutable infrastructure context, has been quite the challenge.
As enterprise architecture and technology innovation leaders, it's crucial to understand the benefits, limitations and best practices associated with building cloud native apps and modernizing legacy workloads. Gartner recently published a worthwhile read addressing what keeps CTOs up at night while assessing Kubernetes and container adoption.
Each day the news assails us with a jumbled wave of trends, hype, provocative claims, and skirmishes. From news venues around the globe, the D2iQ brain trust is called upon to provide insights and commentary to help make sense of the hot topics and controversies affecting the cloud-native and Kubernetes communities.