Operations | Monitoring | ITSM | DevOps | Cloud

Containers

The latest News and Information on Containers, Kubernetes, Docker and related technologies.

Elevate Kubernetes Security with Zero Trust

The theme of this year’s Rocky Mountain Cyberspace Symposium was " Post-Pandemic Zero Trust." In General Dynamics Information Technology’s 2022 report, “ Agency Guide to Zero Trust Maturity,” 63% of respondents from federal civilian and defense agencies said they believed their agencies would achieve specific zero trust security goals by the end of fiscal 2024.

How Delivery Hero uses Kubecost and Datadog to manage Kubernetes costs in the cloud

As the world’s leading local delivery platform, Delivery Hero brings groceries and household goods to customers in more than 70 countries. Their technology stack comprises over 200 services across 20 Kubernetes clusters running on Amazon EKS. This cloud-based, containerized infrastructure enabled them to scale their operation to support increasing demand as the volume of orders placed on their platform doubled during the pandemic.

Managing Rancher Kubernetes Engine (RKE/2) with the D2iQ Kubernetes Platform (DKP)

This video describes how to use the D2iQ Kubernetes Platform (DKP) to manage an existing CNCF-conformant cluster created with Rancher Kubernetes Engine (RKE or RKE2). Getting to Kubernetes is a first step. Getting Kubernetes into production is quite another! You've got a few clusters in place already, and they may even be in production, but what you need now is some way to manage them all from the same place. DKP can help! You can use DKP to manage existing clusters as well as new clusters you create with DKP itself.

Managing Open-Source K3s with the D2iQ Kubernetes Platform (DKP)

This video describes how to use D2iQ Kubernetes Platform (DKP) to manage an existing CNCF-conformant Kubernetes cluster created with K3s, a small footprint version of Kubernetes (sometimes abbreviated "K8s"). Getting to Kubernetes is a first step. Getting Kubernetes into production is quite another! You've got a few clusters in place already, and they may even be in production, but what you need now is some way to manage them all from the same place. DKP can help!

Monitoring with Custom Metrics

By kickstarting a monitoring project with Prometheus, you might realize that you get an initial set of out-of-the-box metrics with just Node Exporter and Kube State Metrics. But, this will only get you so far since you will just be performing black box monitoring. How can you go to the next level and observe what’s beyond? They are an essential part of the day-to-day monitoring of cloud-native systems, as they provide an additional dimension to the business and app level.

Epinio Meets s3gw

Since the very first version, Epinio has made use of an internal S3 endpoint to store the user’s projects in the form of aggregated tarballs. Those objects are then downloaded and staged by the internal engine’s pipeline and, finally, they are deployed into the Kubernetes cluster as consumable applications. Epinio makes use of S3 as an internal private service. In this scenario, S3 can be thought of as an internal ephemeral cache with the purpose of storing temporary objects.

Kubernemlig's Multi-Cluster DNS Setup

Are you ready for a geeky deep-dive into the world of multi-cluster DNS setups? Buckle up, because we're about to embark on a journey through the magical realm of domain name resolution! A multi-cluster DNS setup is like the ultimate TARDIS for your servers. Just like how the TARDIS can transport the Doctor to any location in time and space, a multi-cluster DNS setup allows users to access multiple clusters of servers from anywhere in the world, using a single, convenient domain name.

Moving Fast and Cutting Costs in a Billion-Dollar Organization: Containers in the Automotive Industry

One may say that competitive dynamics in the automotive space are constantly changing, and they would not be wrong in the slightest. As retailers face the daily battlefield of getting their customers’ attention with the right mix of products at the right price and on the right platform, their technology infrastructure must be lean and efficient while achieving those goals—and that is no easy feat.

Sponsored Post

Reducing Security Incidents: Implementing Docker Image Security Scanner

Are you utilizing Docker to deploy your applications? If so, you're not alone. The use of Docker has skyrocketed in popularity in recent years. While it offers numerous benefits, it also introduces new security risks that need to be addressed. But, why is reducing security incidents so important? Simple - the cost of a security breach can be devastating. From lost customer trust to financial losses, the consequences of a security incident can be severe. That's why it's crucial to take steps to prevent them from occurring in the first place. Enter Docker image security scanners.

How Livecycle Makes Qovery Preview Environments 10x More Valuable

Hey there, We were thrilled to see Livecycle.io's recent article on "Why Qovery Preview Environments Are So Valuable to Development Teams"! We truly believe in the power of our preview environments, and we're excited to share this summary with you. So, if you're interested in learning more about what Livecycle.io is and how they can make our preview environments event better, keep reading.