SlideShare a Scribd company logo
1 of 32
Simplify Your Way
To Expert Kubernetes
Management
A P R I L 1 5 , 2 0 2 0
Sean Roth
Director, Product Marketing - Cloud
Native Solutions
AGENDA
• A look at ‘Cloud Native’ and the
challenges of the journey
• Kubernetes, the cloud native ecosystem,
and infrastructure
• Simplifying Kubernetes Management:
7 Areas To Focus On
• Q&A
What is a Cloud Native Application?
1. Packaged as lightweight containers
2. Developed with best-of-breed
languages and frameworks
3. Designed as loosely coupled
microservices
4. Centered around APIs for interaction
and collaboration
5. Architected with a clean separation of
stateless and stateful services
6. Isolated from server and operating
system dependencies
7. Deployed on self-service, elastic, cloud
infrastructure
8. Managed through agile DevOps
processes
9. Automated capabilities
10. Subject to defined, policy-driven
resource allocation
Source: The NewStack.io
10 KEY ATTRIBUTES OF CLOUD-NATIVE APPLICATIONS
https://thenewstack.io/10-key-attributes-of-cloud-native-applications/
Challenges Of Going ‘Cloud Native’
• Kubernetes is deep and complex, and evolves fast
with its growing ecosystem of technologies
• Legacy infrastructure isn’t built for Kubernetes
• Cost efficiency: public cloud is not always
cheaper for some workloads at scale
• Compliance: many organizations are subject to
regulation around data locality
• Improved data center efficiency: opportunity to
modernize and get more out of existing
infrastructure investment
• Performance: certain workloads might require
higher IOPS and lower latency than public cloud
can deliver
Why Run Kubernetes On Prem?
Enterprises are taking a
multi-cloud approach to
running cloud-native
applications.
+
Kubernetes
and the
Cloud Native Ecosystem
Kubernetes
“Kubernetes is the
Linux of the cloud.”
--Kelsey Hightower
Staff Developer Advocate Google
What Kubernetes does:
• Assigns containers to machines (scheduling)
• Boots the specified containers through the container runtime
• Deals with upgrades, rollbacks, and the constantly changing
nature of the system
• Responds to failures (container crashes, etc.)
• Creates cluster resources like service discovery, inter VM
networking, cluster ingress/egress, etc.
API
CLI
UI
Kubernetes Under The Hood
• Designed for scalability, availability, security,
and portability
• Optimizes cost of infrastructure
– Workloads distributed across available
resources
• Each component of a Kubernetes cluster
(etcd, API server, nodes) can be configured
for HA
• For apps, Kubernetes ensures HA by means
of replica sets, replication controllers, etc.
• Kubernetes endpoints secured with TLS
• Every operation that manages a process running
on the cluster must be initiated by an
authenticated user
NODE 1
kubelet
api server
scheduler
controllers
NODE 2
kubelet
NODE n
kubelet
Control PlaneUsers
Worker Nodes
Pods: Kubernetes’ Unit Of Execution
• Pods represent processes running on the
Kubernetes cluster
• A pod encapsulates an application’s container(s),
storage resources, unique network IP, and options
• Controllers run pods according to a user-created
pod spec
apiVersion: v1
kind: Pod
metadata:
name: cpu-demo
namespace: cpu-example
spec:
containers:
- name: cpu-demo-ctr
image: test/stress
resources:
limits:
cpu: "1"
requests:
cpu: "0.5"
args:
- -cpus
- "2"
“Infrastructure As Code”
• Carving out CPU and memory
resources uses a simple declarative
model
…easy, right?
apiVersion: v1
kind: Pod
metadata:
name: cpu-demo
namespace: cpu-example
spec:
containers:
- name: cpu-demo-ctr
image: test/stress
resources:
limits:
cpu: "1"
requests:
cpu: "0.5"
args:
- -cpus
- "2"
…But What About:
Persistent storage?
Networking and Load balancing?
Security?
Monitoring and logging?
Application management?
Availability?
Kubernetes And The Cloud Native Ecosystem
Security &
Governance
Databases
Container Orchestration
CI/CD
Container StorageContainer
Networking Observability & Analysis
Proxy, Gateway & Service
Mesh
500+
open-source and
commercial cloud-native
technologies are rapidly
evolving
www.cncf.io
Simplifying Kubernetes
Management:
7 Areas To Focus On
Kubernetes Master Node Upgrade Process
1. Drain the first master node (which incurs downtime, unless two or more master Kubernetes
nodes are running)
2. Upgrade the cluster orchestrator / infra piece (typically kubeadm, but there are others) on that
master node
3. Upgrade the master control plane
4. Upgrade the master kubelet and kubectl
5. Uncordon the upgraded master node
6. Repeat steps 1 through 5 for each of the remaining master nodes
Then, upgrade worker nodes…
…and etcd (Kubernetes key-value store)
Challenge #1: Kubernetes and Cluster Upgrades
Upgrading Host OS
• Upgrading the Host OS is a similar process to upgrading the Kubernetes version
• each node is drained one at a time, upgraded, rebooted, and then un-cordoned
Challenge #1: Kubernetes and Node Upgrades
• Seek out a dedicated Kubernetes management solution
• Upgrades (as well as other undifferentiated heavy-lifting) should be push-
button processes
• Ensure your solution can execute non-disruptive upgrades
Simplifying Kubernetes/Host Upgrades
Challenge #2: Persistent Storage
• Containers are ephemeral, making storage a huge challenge
– Provisioned storage needs to remain connected to pods hosting stateful applications
• CSI is the standard mechanism for exposing block and file storage to
containerized workloads
• Big decisions:
– What type of storage will be used?
– How it will be made accessible to Kubernetes clusters?
– How it will be provisioned and used by applications?
Simplifying Persistent Storage
• Leverage a container storage solution that offers support for file, block, and
object storage classes
• Different applications value different mediums:
– Performance-intensive app?  Block storage
– Multiple Pods need to access the same storage?  file storage with read-write-
many
– Need simple configuration and enormous scale?  object storage
• Automate!
– Automatically install CSI drivers on every Kubernetes cluster, along with the creation
of a default storage class
Challenge #3: Managing Secrets
• Secret: Kubernetes object used to store SSH keys, tokens, passwords, etc. that
are required when containerized applications need to interface with other
systems
– Critical responsibility for Kubernetes admins and security practitioners alike
• Kubernetes provides some basic security capabilities around secrets (encryption,
policies, and whitelist access) but they require enforcement
• CAUTION: Secrets can break applications in production if they change!
Simplifying Secrets Management
• Dedicated secrets management tool is key!
– Should work on individual containers
• Change management capabilities are critical
– automatically push changed secrets to the application containers that rely on them
Challenge #4: Service Discovery
• Networking in Kubernetes is a complex challenge
– A Pod can be scheduled on one cluster node and later be moved to another, so any
internal IPs that this Pod is assigned can change over time
– Another layer of abstraction is required
Simplifying Service Discovery
• Employ a Load Balancer
– Not natively part of Kubernetes functionality
– Provides each Pod a unique IP accessible from outside the cluster
– Either rely on infrastructure provider or a tool like MetalLB
• Leverage Kubernetes Ingress for business-critical applications
– Ingress is also complicated
– Check out a 3rd-party Ingress controller such as Nginx, Traefik, or Istio
Challenge #5: Managing Applications
• Kubernetes applications will likely consist of:
– several services spanning dozens of containers
– Persistent Volumes
– Secrets
– StatefulSets
• Grouping each application into a dedicated namespace for better cluster
management doesn’t scale
• Need to be able to deploy, modify, track changes, and upgrade containerized
applications
Simplifying Application Management
• Leveraging the Helm package manager is a good start
– However, new challenges arise in preventing untracked changes
• Employ Kubernetes operators, especially for production workloads
– They take a long time to build, but it’s worth it!
 Operators will allow IT team members to manage applications and initiate
upgrades without needing expertise in the app
Challenge #6: Monitoring Cluster Health
• Kubernetes is highly dynamic and yields a tremendous amount of activity data
– How do you make sense of the data to identify and remediate issues?
• Deploying any open source monitoring and logging tool doesn’t solve the problem
– Need a separate backend to store, analyze and query logs
Simplifying Health Monitoring
• Deploy a stack to effectively store, search, analyze, and visualize Kubernetes
environment data
– ELK (ElasticSearch, Logstash, Kibana)
– EFK (ElasticSearch, FluentD, Kibana)
• Also, Prometheus is widely used for systems monitoring and alerting
• BE AWARE: Properly configuring, sizing, and utilizing logging stacks is challenging on its
own
• Cluster-level logging, and application logging are generally separate processes
Challenge #7: Scaling the Cluster
• Kubernetes is capable of autoscaling applications, Pods, and clusters
– But how do you figure out the right approach?
Simplifying Scaling
• Automated application (Pod) scaling
– first, ensure enough cluster capacity to support maximum scaling values
• Automated worker node scaling:
– lean on cloud provider or on-prem Ops teams to help
– Be mindful of actual resource limits
All Kubernetes Offerings Aren’t Created Equal
Users should seek:
• A CNCF-certified Kubernetes distribution (conformance enables
interoperability)
• A native Kubernetes user experience (no lock-in)
• Intelligent automation around lifecycle management features
• Easy integration of storage, networking, security, and monitoring
solutions
Join The Academy!
• The Linux Foundation and CNCF offer a certification
program for Kubernetes Admins
• Training develops competency in:
• Application Lifecycle
Management
• Installation, Configuration &
Validation
• Core Concepts
• Networking
• Scheduling
• Security
• Cluster Maintenance
• Logging / Monitoring
• Storage
• Troubleshooting
Nutanix Karbon: Kubernetes Made Simple
Karbon is an enterprise
Kubernetes management
solution that enables
turnkey provisioning,
operations, and lifecycle
management of
Kubernetes.
Simple
• Less than 20 minutes to deploy production-ready Kubernetes clusters
• Public cloud-like operations, on premises
• Automated scaling and upgrades
• Expert technical support covers the entire stack
Complete Solution
• Seamlessly integrates Kubernetes monitoring, logging, and alerting
• Integrated CSI delivers persistent block and file storage
No Lock-in
• Native Kubernetes user experience with standard APIs
Karbon is Kubernetes
Certified.
Q&A

More Related Content

What's hot

ADDO Open Source Observability Tools
ADDO Open Source Observability Tools ADDO Open Source Observability Tools
ADDO Open Source Observability Tools Mickey Boxell
 
Monitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with DatadogMonitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with DatadogDevOps.com
 
Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Eric Smalling
 
ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsJim Bugwadia
 
Redefining cloud native debugging
Redefining cloud native debugging  Redefining cloud native debugging
Redefining cloud native debugging LibbySchulze
 
Dynatrace - Red Hat workshop : Monolith to Microservices
Dynatrace - Red Hat workshop : Monolith to MicroservicesDynatrace - Red Hat workshop : Monolith to Microservices
Dynatrace - Red Hat workshop : Monolith to MicroservicesSteve Caron
 
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...sangam biradar
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringVMware Tanzu
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API SecurityCloudIDSummit
 
Managing Microservices at Scale
Managing Microservices at ScaleManaging Microservices at Scale
Managing Microservices at ScalePerforce
 
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”GlobalLogic Ukraine
 
CyberArk Impact 2017 - REST for the Rest of Us
CyberArk Impact 2017 - REST for the Rest of UsCyberArk Impact 2017 - REST for the Rest of Us
CyberArk Impact 2017 - REST for the Rest of UsJoe Garcia
 
Codemotion Azure Container Apps
Codemotion Azure Container AppsCodemotion Azure Container Apps
Codemotion Azure Container AppsAndrea Tosato
 
Choosing PaaS: Cisco and Open Source Options: an overview
Choosing PaaS:  Cisco and Open Source Options: an overviewChoosing PaaS:  Cisco and Open Source Options: an overview
Choosing PaaS: Cisco and Open Source Options: an overviewCisco DevNet
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDDevOps.com
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataMirantis
 
Choose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesChoose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesYusuf Hadiwinata Sutandar
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesLacework
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldDevOps.com
 

What's hot (20)

ADDO Open Source Observability Tools
ADDO Open Source Observability Tools ADDO Open Source Observability Tools
ADDO Open Source Observability Tools
 
Monitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with DatadogMonitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with Datadog
 
Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!
 
ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply Chains
 
Redefining cloud native debugging
Redefining cloud native debugging  Redefining cloud native debugging
Redefining cloud native debugging
 
Dynatrace - Red Hat workshop : Monolith to Microservices
Dynatrace - Red Hat workshop : Monolith to MicroservicesDynatrace - Red Hat workshop : Monolith to Microservices
Dynatrace - Red Hat workshop : Monolith to Microservices
 
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API Security
 
Managing Microservices at Scale
Managing Microservices at ScaleManaging Microservices at Scale
Managing Microservices at Scale
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
 
CyberArk Impact 2017 - REST for the Rest of Us
CyberArk Impact 2017 - REST for the Rest of UsCyberArk Impact 2017 - REST for the Rest of Us
CyberArk Impact 2017 - REST for the Rest of Us
 
Codemotion Azure Container Apps
Codemotion Azure Container AppsCodemotion Azure Container Apps
Codemotion Azure Container Apps
 
Choosing PaaS: Cisco and Open Source Options: an overview
Choosing PaaS:  Cisco and Open Source Options: an overviewChoosing PaaS:  Cisco and Open Source Options: an overview
Choosing PaaS: Cisco and Open Source Options: an overview
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container Data
 
Choose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesChoose the Right Container Storage for Kubernetes
Choose the Right Container Storage for Kubernetes
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing Kubernetes
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote World
 

Similar to Simplify Your Way To Expert Kubernetes Management

Azure meetup cloud native concepts - may 28th 2018
Azure meetup   cloud native concepts - may 28th 2018Azure meetup   cloud native concepts - may 28th 2018
Azure meetup cloud native concepts - may 28th 2018Jim Bugwadia
 
Why kubernetes matters
Why kubernetes mattersWhy kubernetes matters
Why kubernetes mattersPlatform9
 
Kubernetes solutions
Kubernetes solutionsKubernetes solutions
Kubernetes solutionsEric Cattoir
 
10 tips for Cloud Native Security
10 tips for Cloud Native Security10 tips for Cloud Native Security
10 tips for Cloud Native SecurityKarthik Gaekwad
 
How kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updatedHow kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updatedShikha Srivastava
 
Building Cloud-Native Applications with Kubernetes, Helm and Kubeless
Building Cloud-Native Applications with Kubernetes, Helm and KubelessBuilding Cloud-Native Applications with Kubernetes, Helm and Kubeless
Building Cloud-Native Applications with Kubernetes, Helm and KubelessBitnami
 
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Vietnam Open Infrastructure User Group
 
Modern big data and machine learning in the era of cloud, docker and kubernetes
Modern big data and machine learning in the era of cloud, docker and kubernetesModern big data and machine learning in the era of cloud, docker and kubernetes
Modern big data and machine learning in the era of cloud, docker and kubernetesSlim Baltagi
 
Application Deployment and Management at Scale with 1&1 by Matt Baldwin
Application Deployment and Management at Scale with 1&1 by Matt BaldwinApplication Deployment and Management at Scale with 1&1 by Matt Baldwin
Application Deployment and Management at Scale with 1&1 by Matt BaldwinDocker, Inc.
 
Build your own private Cloud environment
Build your own private Cloud environmentBuild your own private Cloud environment
Build your own private Cloud environmentNico Meisenzahl
 
DNUG46 - Build your own private Cloud environment
DNUG46 - Build your own private Cloud environmentDNUG46 - Build your own private Cloud environment
DNUG46 - Build your own private Cloud environmentpanagenda
 
Application Deployment and Management at Scale at 1&1
Application Deployment and Management at Scale at 1&1Application Deployment and Management at Scale at 1&1
Application Deployment and Management at Scale at 1&1Matt Baldwin
 
oci-container-engine-oke-100.pdf
oci-container-engine-oke-100.pdfoci-container-engine-oke-100.pdf
oci-container-engine-oke-100.pdfNandiniSinghal16
 
Centralizing Kubernetes and Container Operations
Centralizing Kubernetes and Container OperationsCentralizing Kubernetes and Container Operations
Centralizing Kubernetes and Container OperationsKublr
 
DEVNET-1183 OpenShift + Kubernetes + Docker
DEVNET-1183	OpenShift + Kubernetes + DockerDEVNET-1183	OpenShift + Kubernetes + Docker
DEVNET-1183 OpenShift + Kubernetes + DockerCisco DevNet
 
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + DockerAPPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + DockerSteven Pousty
 
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKSMigrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKSWeaveworks
 
Moving a Monolith to Kubernetes
Moving a Monolith to KubernetesMoving a Monolith to Kubernetes
Moving a Monolith to KubernetesM. Scott Ford
 
Kubernetes-Presentation-Syed-Murtaza-Hassan
Kubernetes-Presentation-Syed-Murtaza-HassanKubernetes-Presentation-Syed-Murtaza-Hassan
Kubernetes-Presentation-Syed-Murtaza-HassanSyed Murtaza Hassan
 

Similar to Simplify Your Way To Expert Kubernetes Management (20)

Azure meetup cloud native concepts - may 28th 2018
Azure meetup   cloud native concepts - may 28th 2018Azure meetup   cloud native concepts - may 28th 2018
Azure meetup cloud native concepts - may 28th 2018
 
Why kubernetes matters
Why kubernetes mattersWhy kubernetes matters
Why kubernetes matters
 
Kubernetes solutions
Kubernetes solutionsKubernetes solutions
Kubernetes solutions
 
10 tips for Cloud Native Security
10 tips for Cloud Native Security10 tips for Cloud Native Security
10 tips for Cloud Native Security
 
How kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updatedHow kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updated
 
Building Cloud-Native Applications with Kubernetes, Helm and Kubeless
Building Cloud-Native Applications with Kubernetes, Helm and KubelessBuilding Cloud-Native Applications with Kubernetes, Helm and Kubeless
Building Cloud-Native Applications with Kubernetes, Helm and Kubeless
 
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
 
Kubernetes Security
Kubernetes SecurityKubernetes Security
Kubernetes Security
 
Modern big data and machine learning in the era of cloud, docker and kubernetes
Modern big data and machine learning in the era of cloud, docker and kubernetesModern big data and machine learning in the era of cloud, docker and kubernetes
Modern big data and machine learning in the era of cloud, docker and kubernetes
 
Application Deployment and Management at Scale with 1&1 by Matt Baldwin
Application Deployment and Management at Scale with 1&1 by Matt BaldwinApplication Deployment and Management at Scale with 1&1 by Matt Baldwin
Application Deployment and Management at Scale with 1&1 by Matt Baldwin
 
Build your own private Cloud environment
Build your own private Cloud environmentBuild your own private Cloud environment
Build your own private Cloud environment
 
DNUG46 - Build your own private Cloud environment
DNUG46 - Build your own private Cloud environmentDNUG46 - Build your own private Cloud environment
DNUG46 - Build your own private Cloud environment
 
Application Deployment and Management at Scale at 1&1
Application Deployment and Management at Scale at 1&1Application Deployment and Management at Scale at 1&1
Application Deployment and Management at Scale at 1&1
 
oci-container-engine-oke-100.pdf
oci-container-engine-oke-100.pdfoci-container-engine-oke-100.pdf
oci-container-engine-oke-100.pdf
 
Centralizing Kubernetes and Container Operations
Centralizing Kubernetes and Container OperationsCentralizing Kubernetes and Container Operations
Centralizing Kubernetes and Container Operations
 
DEVNET-1183 OpenShift + Kubernetes + Docker
DEVNET-1183	OpenShift + Kubernetes + DockerDEVNET-1183	OpenShift + Kubernetes + Docker
DEVNET-1183 OpenShift + Kubernetes + Docker
 
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + DockerAPPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
 
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKSMigrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
 
Moving a Monolith to Kubernetes
Moving a Monolith to KubernetesMoving a Monolith to Kubernetes
Moving a Monolith to Kubernetes
 
Kubernetes-Presentation-Syed-Murtaza-Hassan
Kubernetes-Presentation-Syed-Murtaza-HassanKubernetes-Presentation-Syed-Murtaza-Hassan
Kubernetes-Presentation-Syed-Murtaza-Hassan
 

More from DevOps.com

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudDevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and PredictionsDevOps.com
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionDevOps.com
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureDevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportDevOps.com
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogDevOps.com
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureDevOps.com
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?DevOps.com
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...DevOps.com
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
 

More from DevOps.com (20)

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Simplify Your Way To Expert Kubernetes Management

  • 1. Simplify Your Way To Expert Kubernetes Management A P R I L 1 5 , 2 0 2 0
  • 2. Sean Roth Director, Product Marketing - Cloud Native Solutions AGENDA • A look at ‘Cloud Native’ and the challenges of the journey • Kubernetes, the cloud native ecosystem, and infrastructure • Simplifying Kubernetes Management: 7 Areas To Focus On • Q&A
  • 3. What is a Cloud Native Application? 1. Packaged as lightweight containers 2. Developed with best-of-breed languages and frameworks 3. Designed as loosely coupled microservices 4. Centered around APIs for interaction and collaboration 5. Architected with a clean separation of stateless and stateful services 6. Isolated from server and operating system dependencies 7. Deployed on self-service, elastic, cloud infrastructure 8. Managed through agile DevOps processes 9. Automated capabilities 10. Subject to defined, policy-driven resource allocation Source: The NewStack.io 10 KEY ATTRIBUTES OF CLOUD-NATIVE APPLICATIONS https://thenewstack.io/10-key-attributes-of-cloud-native-applications/
  • 4. Challenges Of Going ‘Cloud Native’ • Kubernetes is deep and complex, and evolves fast with its growing ecosystem of technologies • Legacy infrastructure isn’t built for Kubernetes
  • 5. • Cost efficiency: public cloud is not always cheaper for some workloads at scale • Compliance: many organizations are subject to regulation around data locality • Improved data center efficiency: opportunity to modernize and get more out of existing infrastructure investment • Performance: certain workloads might require higher IOPS and lower latency than public cloud can deliver Why Run Kubernetes On Prem? Enterprises are taking a multi-cloud approach to running cloud-native applications. +
  • 7. Kubernetes “Kubernetes is the Linux of the cloud.” --Kelsey Hightower Staff Developer Advocate Google What Kubernetes does: • Assigns containers to machines (scheduling) • Boots the specified containers through the container runtime • Deals with upgrades, rollbacks, and the constantly changing nature of the system • Responds to failures (container crashes, etc.) • Creates cluster resources like service discovery, inter VM networking, cluster ingress/egress, etc.
  • 8. API CLI UI Kubernetes Under The Hood • Designed for scalability, availability, security, and portability • Optimizes cost of infrastructure – Workloads distributed across available resources • Each component of a Kubernetes cluster (etcd, API server, nodes) can be configured for HA • For apps, Kubernetes ensures HA by means of replica sets, replication controllers, etc. • Kubernetes endpoints secured with TLS • Every operation that manages a process running on the cluster must be initiated by an authenticated user NODE 1 kubelet api server scheduler controllers NODE 2 kubelet NODE n kubelet Control PlaneUsers Worker Nodes
  • 9. Pods: Kubernetes’ Unit Of Execution • Pods represent processes running on the Kubernetes cluster • A pod encapsulates an application’s container(s), storage resources, unique network IP, and options • Controllers run pods according to a user-created pod spec apiVersion: v1 kind: Pod metadata: name: cpu-demo namespace: cpu-example spec: containers: - name: cpu-demo-ctr image: test/stress resources: limits: cpu: "1" requests: cpu: "0.5" args: - -cpus - "2"
  • 10. “Infrastructure As Code” • Carving out CPU and memory resources uses a simple declarative model …easy, right? apiVersion: v1 kind: Pod metadata: name: cpu-demo namespace: cpu-example spec: containers: - name: cpu-demo-ctr image: test/stress resources: limits: cpu: "1" requests: cpu: "0.5" args: - -cpus - "2"
  • 11. …But What About: Persistent storage? Networking and Load balancing? Security? Monitoring and logging? Application management? Availability?
  • 12. Kubernetes And The Cloud Native Ecosystem Security & Governance Databases Container Orchestration CI/CD Container StorageContainer Networking Observability & Analysis Proxy, Gateway & Service Mesh 500+ open-source and commercial cloud-native technologies are rapidly evolving www.cncf.io
  • 14. Kubernetes Master Node Upgrade Process 1. Drain the first master node (which incurs downtime, unless two or more master Kubernetes nodes are running) 2. Upgrade the cluster orchestrator / infra piece (typically kubeadm, but there are others) on that master node 3. Upgrade the master control plane 4. Upgrade the master kubelet and kubectl 5. Uncordon the upgraded master node 6. Repeat steps 1 through 5 for each of the remaining master nodes Then, upgrade worker nodes… …and etcd (Kubernetes key-value store) Challenge #1: Kubernetes and Cluster Upgrades
  • 15. Upgrading Host OS • Upgrading the Host OS is a similar process to upgrading the Kubernetes version • each node is drained one at a time, upgraded, rebooted, and then un-cordoned Challenge #1: Kubernetes and Node Upgrades
  • 16. • Seek out a dedicated Kubernetes management solution • Upgrades (as well as other undifferentiated heavy-lifting) should be push- button processes • Ensure your solution can execute non-disruptive upgrades Simplifying Kubernetes/Host Upgrades
  • 17. Challenge #2: Persistent Storage • Containers are ephemeral, making storage a huge challenge – Provisioned storage needs to remain connected to pods hosting stateful applications • CSI is the standard mechanism for exposing block and file storage to containerized workloads • Big decisions: – What type of storage will be used? – How it will be made accessible to Kubernetes clusters? – How it will be provisioned and used by applications?
  • 18. Simplifying Persistent Storage • Leverage a container storage solution that offers support for file, block, and object storage classes • Different applications value different mediums: – Performance-intensive app?  Block storage – Multiple Pods need to access the same storage?  file storage with read-write- many – Need simple configuration and enormous scale?  object storage • Automate! – Automatically install CSI drivers on every Kubernetes cluster, along with the creation of a default storage class
  • 19. Challenge #3: Managing Secrets • Secret: Kubernetes object used to store SSH keys, tokens, passwords, etc. that are required when containerized applications need to interface with other systems – Critical responsibility for Kubernetes admins and security practitioners alike • Kubernetes provides some basic security capabilities around secrets (encryption, policies, and whitelist access) but they require enforcement • CAUTION: Secrets can break applications in production if they change!
  • 20. Simplifying Secrets Management • Dedicated secrets management tool is key! – Should work on individual containers • Change management capabilities are critical – automatically push changed secrets to the application containers that rely on them
  • 21. Challenge #4: Service Discovery • Networking in Kubernetes is a complex challenge – A Pod can be scheduled on one cluster node and later be moved to another, so any internal IPs that this Pod is assigned can change over time – Another layer of abstraction is required
  • 22. Simplifying Service Discovery • Employ a Load Balancer – Not natively part of Kubernetes functionality – Provides each Pod a unique IP accessible from outside the cluster – Either rely on infrastructure provider or a tool like MetalLB • Leverage Kubernetes Ingress for business-critical applications – Ingress is also complicated – Check out a 3rd-party Ingress controller such as Nginx, Traefik, or Istio
  • 23. Challenge #5: Managing Applications • Kubernetes applications will likely consist of: – several services spanning dozens of containers – Persistent Volumes – Secrets – StatefulSets • Grouping each application into a dedicated namespace for better cluster management doesn’t scale • Need to be able to deploy, modify, track changes, and upgrade containerized applications
  • 24. Simplifying Application Management • Leveraging the Helm package manager is a good start – However, new challenges arise in preventing untracked changes • Employ Kubernetes operators, especially for production workloads – They take a long time to build, but it’s worth it!  Operators will allow IT team members to manage applications and initiate upgrades without needing expertise in the app
  • 25. Challenge #6: Monitoring Cluster Health • Kubernetes is highly dynamic and yields a tremendous amount of activity data – How do you make sense of the data to identify and remediate issues? • Deploying any open source monitoring and logging tool doesn’t solve the problem – Need a separate backend to store, analyze and query logs
  • 26. Simplifying Health Monitoring • Deploy a stack to effectively store, search, analyze, and visualize Kubernetes environment data – ELK (ElasticSearch, Logstash, Kibana) – EFK (ElasticSearch, FluentD, Kibana) • Also, Prometheus is widely used for systems monitoring and alerting • BE AWARE: Properly configuring, sizing, and utilizing logging stacks is challenging on its own • Cluster-level logging, and application logging are generally separate processes
  • 27. Challenge #7: Scaling the Cluster • Kubernetes is capable of autoscaling applications, Pods, and clusters – But how do you figure out the right approach?
  • 28. Simplifying Scaling • Automated application (Pod) scaling – first, ensure enough cluster capacity to support maximum scaling values • Automated worker node scaling: – lean on cloud provider or on-prem Ops teams to help – Be mindful of actual resource limits
  • 29. All Kubernetes Offerings Aren’t Created Equal Users should seek: • A CNCF-certified Kubernetes distribution (conformance enables interoperability) • A native Kubernetes user experience (no lock-in) • Intelligent automation around lifecycle management features • Easy integration of storage, networking, security, and monitoring solutions
  • 30. Join The Academy! • The Linux Foundation and CNCF offer a certification program for Kubernetes Admins • Training develops competency in: • Application Lifecycle Management • Installation, Configuration & Validation • Core Concepts • Networking • Scheduling • Security • Cluster Maintenance • Logging / Monitoring • Storage • Troubleshooting
  • 31. Nutanix Karbon: Kubernetes Made Simple Karbon is an enterprise Kubernetes management solution that enables turnkey provisioning, operations, and lifecycle management of Kubernetes. Simple • Less than 20 minutes to deploy production-ready Kubernetes clusters • Public cloud-like operations, on premises • Automated scaling and upgrades • Expert technical support covers the entire stack Complete Solution • Seamlessly integrates Kubernetes monitoring, logging, and alerting • Integrated CSI delivers persistent block and file storage No Lock-in • Native Kubernetes user experience with standard APIs Karbon is Kubernetes Certified.
  • 32. Q&A