SlideShare a Scribd company logo
1 of 1
Preventing Noisy
and Nosy Neighbors
in Multi-tenant Environments with EKS,AKS,or GKE
Noisy and nosy neighbors aren’t exclusive to just your physical living
space. In an enterprise environment, a lack of centralized governance
and federated management of EKS, AKS, or GKE clusters can limit
application scalability and performance. Learn about these multi-
tenancy issues and how to effectively solve them.
Enterprise
A single company that has many
tenants using AKS, EKS, or GKE
and would like to share cluster and
administrative resources.
Tenant
A single application/service team
developing a single workload in a
shared AKS, EKS, or GKE cluster.
Platform Team
Manages AKS, EKS, or GKE clusters
and defines the amount of resources
each tenant team can use.
Who’s Who
in an Enterprise Multi-Tenant Environment
The Impact of Noisy and
Noisy Neighbors
Noisy Neighbor Sharing a cloud cluster
with multiple tenants
Nosy Neighbor Lack of centralized
governance
unable to identify tenants,
configure access to resources,
perform compliance checks.
negatively impacts the
bandwidth and performance
of workloads.
As an enterprise adopts new cloud clusters,it can
introduce all kinds of complexities around visibility,
management,and security.
Reducing the Risk Noisy and Noisy Neighbors
Below are some best practices for platform teams to safely and efficiently
set up multiple multi-tenant clusters in the public cloud.
STEP 1
Categorize Namespaces
STEP 3
Enable RBAC
STEP 2
Determine Cluster Personas
STEP 4
Isolate Namespaces using Network
Categorize namespaces to separate workloads,
tenants, and applications so that updates
and changes are contained within a specific
namespace and doesn’t impact bandwidth or
performance.
Create cluster personas using Roles and
RoleBindings in RBAC to lock out nosy neighbors
and restrict unnecessary network access.
Create a hierarchy of cluster personas that
specifies their responsibilities and account
privileges. This is the first step to enabling Role-
Based Access Control (RBAC) in Kubernetes.
Apply a default network policy to all tenant
namespaces, which blocks access from
unwanted neighbors.
STEP 5
Improve Resource Utilization with
Resource Quotas
Apply resource quotas to each namespace to
control and limit computing resources, such as
CPU and memory, so that neighbors have access
to the shared resources they agreed upon.
DKP with AKS,EKS,
or GKE Clusters
A Winning Combination for Effective Multi-
Cluster and Multi-Tenant Management
For enterprises, using D2iQ Kubernetes Platform (DKP)
with EKS, AKS, or GKE together can simplify Kubernetes
multi-tenancy and reduce the risk of noisy and nosy
neighbors. When combined, they provide centralized
governance and user access controls to enable consistent
multi-cluster, multi-cloud and multi-tenant management.
To learn more about Kubernetes multi-tenancy, download
the ebook,“The Art of Winning: Leveraging Kubernetes in
the Public Cloud to Deliver a Unified DevOps Experience.”
© 2021 D2iQ, Inc. All Rights Reserved.
Download Ebook

More Related Content

Similar to Preventing Noisy and Nosy Neighbors Infographic

ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelHitesh Mohapatra
 
prodops.io k8s presentation
prodops.io k8s presentationprodops.io k8s presentation
prodops.io k8s presentationProdops.io
 
Kubernetes in The Enterprise
Kubernetes in The EnterpriseKubernetes in The Enterprise
Kubernetes in The EnterpriseTyrone Systems
 
How docker & kubernetes can optimize the cost of hosting
How docker & kubernetes can optimize the cost of hostingHow docker & kubernetes can optimize the cost of hosting
How docker & kubernetes can optimize the cost of hosting9 series
 
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationAdoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationMindfire LLC
 
Design of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackDesign of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackYing wei (Joe) Chou
 
CloudByte_CureForNoisyNeighbors
CloudByte_CureForNoisyNeighborsCloudByte_CureForNoisyNeighbors
CloudByte_CureForNoisyNeighborsCloudByte Inc.
 
IaaS Cloud Providers: A comparative analysis
IaaS Cloud Providers: A comparative analysisIaaS Cloud Providers: A comparative analysis
IaaS Cloud Providers: A comparative analysisGraisy Biswal
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeYogeshIJTSRD
 
Building internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOpsBuilding internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOpsWeaveworks
 
CloudLightning - Project Overview
CloudLightning - Project OverviewCloudLightning - Project Overview
CloudLightning - Project OverviewCloudLightning
 
Enterprise Cloud Glossary from Ubuntu
Enterprise Cloud Glossary from UbuntuEnterprise Cloud Glossary from Ubuntu
Enterprise Cloud Glossary from UbuntuSusan Wu
 
Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloudrohit_ainapure
 
Kubernetes From Scratch .pdf
Kubernetes From Scratch .pdfKubernetes From Scratch .pdf
Kubernetes From Scratch .pdfssuser9b44c7
 
Cloud agility-gap-whitepaper 9595
Cloud agility-gap-whitepaper 9595Cloud agility-gap-whitepaper 9595
Cloud agility-gap-whitepaper 9595Accenture
 
How we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on KubernetesHow we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on KubernetesOpsta
 
The New Stack Container Summit Talk
The New Stack Container Summit TalkThe New Stack Container Summit Talk
The New Stack Container Summit TalkThe New Stack
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsVijay Karan
 

Similar to Preventing Noisy and Nosy Neighbors Infographic (20)

ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
 
prodops.io k8s presentation
prodops.io k8s presentationprodops.io k8s presentation
prodops.io k8s presentation
 
Kubernetes in The Enterprise
Kubernetes in The EnterpriseKubernetes in The Enterprise
Kubernetes in The Enterprise
 
Advanced Container Security
Advanced Container Security Advanced Container Security
Advanced Container Security
 
How docker & kubernetes can optimize the cost of hosting
How docker & kubernetes can optimize the cost of hostingHow docker & kubernetes can optimize the cost of hosting
How docker & kubernetes can optimize the cost of hosting
 
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationAdoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
 
Design of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackDesign of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstack
 
CloudByte_CureForNoisyNeighbors
CloudByte_CureForNoisyNeighborsCloudByte_CureForNoisyNeighbors
CloudByte_CureForNoisyNeighbors
 
IaaS Cloud Providers: A comparative analysis
IaaS Cloud Providers: A comparative analysisIaaS Cloud Providers: A comparative analysis
IaaS Cloud Providers: A comparative analysis
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System Uptime
 
Building internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOpsBuilding internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOps
 
CloudLightning - Project Overview
CloudLightning - Project OverviewCloudLightning - Project Overview
CloudLightning - Project Overview
 
Enterprise Cloud Glossary from Ubuntu
Enterprise Cloud Glossary from UbuntuEnterprise Cloud Glossary from Ubuntu
Enterprise Cloud Glossary from Ubuntu
 
Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloud
 
Kubernetes From Scratch .pdf
Kubernetes From Scratch .pdfKubernetes From Scratch .pdf
Kubernetes From Scratch .pdf
 
Cloud1 Computing 01
Cloud1 Computing 01Cloud1 Computing 01
Cloud1 Computing 01
 
Cloud agility-gap-whitepaper 9595
Cloud agility-gap-whitepaper 9595Cloud agility-gap-whitepaper 9595
Cloud agility-gap-whitepaper 9595
 
How we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on KubernetesHow we can do Multi-Tenancy on Kubernetes
How we can do Multi-Tenancy on Kubernetes
 
The New Stack Container Summit Talk
The New Stack Container Summit TalkThe New Stack Container Summit Talk
The New Stack Container Summit Talk
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
 

More from Alex Hisaka

Kubernetes Cheatsheet
Kubernetes CheatsheetKubernetes Cheatsheet
Kubernetes CheatsheetAlex Hisaka
 
The D2iQ Guide to Steering a Successful Kubernetes Ship
The D2iQ Guide to Steering a Successful Kubernetes ShipThe D2iQ Guide to Steering a Successful Kubernetes Ship
The D2iQ Guide to Steering a Successful Kubernetes ShipAlex Hisaka
 
How to Maximize LinkedIn's Value with Sales Navigator
How to Maximize LinkedIn's Value with Sales NavigatorHow to Maximize LinkedIn's Value with Sales Navigator
How to Maximize LinkedIn's Value with Sales NavigatorAlex Hisaka
 
The Executive Playbook
The Executive PlaybookThe Executive Playbook
The Executive PlaybookAlex Hisaka
 
How Uncertainty Can Be An Opportunity For Growth
How Uncertainty Can Be An Opportunity For GrowthHow Uncertainty Can Be An Opportunity For Growth
How Uncertainty Can Be An Opportunity For GrowthAlex Hisaka
 
How Personalized Selling Unlocks Competitive Advantage
How Personalized Selling Unlocks Competitive AdvantageHow Personalized Selling Unlocks Competitive Advantage
How Personalized Selling Unlocks Competitive AdvantageAlex Hisaka
 

More from Alex Hisaka (6)

Kubernetes Cheatsheet
Kubernetes CheatsheetKubernetes Cheatsheet
Kubernetes Cheatsheet
 
The D2iQ Guide to Steering a Successful Kubernetes Ship
The D2iQ Guide to Steering a Successful Kubernetes ShipThe D2iQ Guide to Steering a Successful Kubernetes Ship
The D2iQ Guide to Steering a Successful Kubernetes Ship
 
How to Maximize LinkedIn's Value with Sales Navigator
How to Maximize LinkedIn's Value with Sales NavigatorHow to Maximize LinkedIn's Value with Sales Navigator
How to Maximize LinkedIn's Value with Sales Navigator
 
The Executive Playbook
The Executive PlaybookThe Executive Playbook
The Executive Playbook
 
How Uncertainty Can Be An Opportunity For Growth
How Uncertainty Can Be An Opportunity For GrowthHow Uncertainty Can Be An Opportunity For Growth
How Uncertainty Can Be An Opportunity For Growth
 
How Personalized Selling Unlocks Competitive Advantage
How Personalized Selling Unlocks Competitive AdvantageHow Personalized Selling Unlocks Competitive Advantage
How Personalized Selling Unlocks Competitive Advantage
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Preventing Noisy and Nosy Neighbors Infographic

  • 1. Preventing Noisy and Nosy Neighbors in Multi-tenant Environments with EKS,AKS,or GKE Noisy and nosy neighbors aren’t exclusive to just your physical living space. In an enterprise environment, a lack of centralized governance and federated management of EKS, AKS, or GKE clusters can limit application scalability and performance. Learn about these multi- tenancy issues and how to effectively solve them. Enterprise A single company that has many tenants using AKS, EKS, or GKE and would like to share cluster and administrative resources. Tenant A single application/service team developing a single workload in a shared AKS, EKS, or GKE cluster. Platform Team Manages AKS, EKS, or GKE clusters and defines the amount of resources each tenant team can use. Who’s Who in an Enterprise Multi-Tenant Environment The Impact of Noisy and Noisy Neighbors Noisy Neighbor Sharing a cloud cluster with multiple tenants Nosy Neighbor Lack of centralized governance unable to identify tenants, configure access to resources, perform compliance checks. negatively impacts the bandwidth and performance of workloads. As an enterprise adopts new cloud clusters,it can introduce all kinds of complexities around visibility, management,and security. Reducing the Risk Noisy and Noisy Neighbors Below are some best practices for platform teams to safely and efficiently set up multiple multi-tenant clusters in the public cloud. STEP 1 Categorize Namespaces STEP 3 Enable RBAC STEP 2 Determine Cluster Personas STEP 4 Isolate Namespaces using Network Categorize namespaces to separate workloads, tenants, and applications so that updates and changes are contained within a specific namespace and doesn’t impact bandwidth or performance. Create cluster personas using Roles and RoleBindings in RBAC to lock out nosy neighbors and restrict unnecessary network access. Create a hierarchy of cluster personas that specifies their responsibilities and account privileges. This is the first step to enabling Role- Based Access Control (RBAC) in Kubernetes. Apply a default network policy to all tenant namespaces, which blocks access from unwanted neighbors. STEP 5 Improve Resource Utilization with Resource Quotas Apply resource quotas to each namespace to control and limit computing resources, such as CPU and memory, so that neighbors have access to the shared resources they agreed upon. DKP with AKS,EKS, or GKE Clusters A Winning Combination for Effective Multi- Cluster and Multi-Tenant Management For enterprises, using D2iQ Kubernetes Platform (DKP) with EKS, AKS, or GKE together can simplify Kubernetes multi-tenancy and reduce the risk of noisy and nosy neighbors. When combined, they provide centralized governance and user access controls to enable consistent multi-cluster, multi-cloud and multi-tenant management. To learn more about Kubernetes multi-tenancy, download the ebook,“The Art of Winning: Leveraging Kubernetes in the Public Cloud to Deliver a Unified DevOps Experience.” © 2021 D2iQ, Inc. All Rights Reserved. Download Ebook