SlideShare a Scribd company logo
1 of 32
Simplify Your Way
To Expert Kubernetes
Management
A P R I L 1 5 , 2 0 2 0
Sean Roth
Director, Product Marketing - Cloud
Native Solutions
AGENDA
• A look at ‘Cloud Native’ and the
challenges of the journey
• Kubernetes, the cloud native ecosystem,
and infrastructure
• Simplifying Kubernetes Management:
7 Areas To Focus On
• Q&A
What is a Cloud Native Application?
1. Packaged as lightweight containers
2. Developed with best-of-breed
languages and frameworks
3. Designed as loosely coupled
microservices
4. Centered around APIs for interaction
and collaboration
5. Architected with a clean separation of
stateless and stateful services
6. Isolated from server and operating
system dependencies
7. Deployed on self-service, elastic, cloud
infrastructure
8. Managed through agile DevOps
processes
9. Automated capabilities
10. Subject to defined, policy-driven
resource allocation
Source: The NewStack.io
10 KEY ATTRIBUTES OF CLOUD-NATIVE APPLICATIONS
https://thenewstack.io/10-key-attributes-of-cloud-native-applications/
Challenges Of Going ‘Cloud Native’
• Kubernetes is deep and complex, and evolves fast
with its growing ecosystem of technologies
• Legacy infrastructure isn’t built for Kubernetes
• Cost efficiency: public cloud is not always
cheaper for some workloads at scale
• Compliance: many organizations are subject to
regulation around data locality
• Improved data center efficiency: opportunity to
modernize and get more out of existing
infrastructure investment
• Performance: certain workloads might require
higher IOPS and lower latency than public cloud
can deliver
Why Run Kubernetes On Prem?
Enterprises are taking a
multi-cloud approach to
running cloud-native
applications.
+
Kubernetes
and the
Cloud Native Ecosystem
Kubernetes
“Kubernetes is the
Linux of the cloud.”
--Kelsey Hightower
Staff Developer Advocate Google
What Kubernetes does:
• Assigns containers to machines (scheduling)
• Boots the specified containers through the container runtime
• Deals with upgrades, rollbacks, and the constantly changing
nature of the system
• Responds to failures (container crashes, etc.)
• Creates cluster resources like service discovery, inter VM
networking, cluster ingress/egress, etc.
API
CLI
UI
Kubernetes Under The Hood
• Designed for scalability, availability, security,
and portability
• Optimizes cost of infrastructure
– Workloads distributed across available
resources
• Each component of a Kubernetes cluster
(etcd, API server, nodes) can be configured
for HA
• For apps, Kubernetes ensures HA by means
of replica sets, replication controllers, etc.
• Kubernetes endpoints secured with TLS
• Every operation that manages a process running
on the cluster must be initiated by an
authenticated user
NODE 1
kubelet
api server
scheduler
controllers
NODE 2
kubelet
NODE n
kubelet
Control PlaneUsers
Worker Nodes
Pods: Kubernetes’ Unit Of Execution
• Pods represent processes running on the
Kubernetes cluster
• A pod encapsulates an application’s container(s),
storage resources, unique network IP, and options
• Controllers run pods according to a user-created
pod spec
apiVersion: v1
kind: Pod
metadata:
name: cpu-demo
namespace: cpu-example
spec:
containers:
- name: cpu-demo-ctr
image: test/stress
resources:
limits:
cpu: "1"
requests:
cpu: "0.5"
args:
- -cpus
- "2"
“Infrastructure As Code”
• Carving out CPU and memory
resources uses a simple declarative
model
…easy, right?
apiVersion: v1
kind: Pod
metadata:
name: cpu-demo
namespace: cpu-example
spec:
containers:
- name: cpu-demo-ctr
image: test/stress
resources:
limits:
cpu: "1"
requests:
cpu: "0.5"
args:
- -cpus
- "2"
…But What About:
Persistent storage?
Networking and Load balancing?
Security?
Monitoring and logging?
Application management?
Availability?
Kubernetes And The Cloud Native Ecosystem
Security &
Governance
Databases
Container Orchestration
CI/CD
Container StorageContainer
Networking Observability & Analysis
Proxy, Gateway & Service
Mesh
500+
open-source and
commercial cloud-native
technologies are rapidly
evolving
www.cncf.io
Simplifying Kubernetes
Management:
7 Areas To Focus On
Kubernetes Master Node Upgrade Process
1. Drain the first master node (which incurs downtime, unless two or more master Kubernetes
nodes are running)
2. Upgrade the cluster orchestrator / infra piece (typically kubeadm, but there are others) on that
master node
3. Upgrade the master control plane
4. Upgrade the master kubelet and kubectl
5. Uncordon the upgraded master node
6. Repeat steps 1 through 5 for each of the remaining master nodes
Then, upgrade worker nodes…
…and etcd (Kubernetes key-value store)
Challenge #1: Kubernetes and Cluster Upgrades
Upgrading Host OS
• Upgrading the Host OS is a similar process to upgrading the Kubernetes version
• each node is drained one at a time, upgraded, rebooted, and then un-cordoned
Challenge #1: Kubernetes and Node Upgrades
• Seek out a dedicated Kubernetes management solution
• Upgrades (as well as other undifferentiated heavy-lifting) should be push-
button processes
• Ensure your solution can execute non-disruptive upgrades
Simplifying Kubernetes/Host Upgrades
Challenge #2: Persistent Storage
• Containers are ephemeral, making storage a huge challenge
– Provisioned storage needs to remain connected to pods hosting stateful applications
• CSI is the standard mechanism for exposing block and file storage to
containerized workloads
• Big decisions:
– What type of storage will be used?
– How it will be made accessible to Kubernetes clusters?
– How it will be provisioned and used by applications?
Simplifying Persistent Storage
• Leverage a container storage solution that offers support for file, block, and
object storage classes
• Different applications value different mediums:
– Performance-intensive app?  Block storage
– Multiple Pods need to access the same storage?  file storage with read-write-
many
– Need simple configuration and enormous scale?  object storage
• Automate!
– Automatically install CSI drivers on every Kubernetes cluster, along with the creation
of a default storage class
Challenge #3: Managing Secrets
• Secret: Kubernetes object used to store SSH keys, tokens, passwords, etc. that
are required when containerized applications need to interface with other
systems
– Critical responsibility for Kubernetes admins and security practitioners alike
• Kubernetes provides some basic security capabilities around secrets (encryption,
policies, and whitelist access) but they require enforcement
• CAUTION: Secrets can break applications in production if they change!
Simplifying Secrets Management
• Dedicated secrets management tool is key!
– Should work on individual containers
• Change management capabilities are critical
– automatically push changed secrets to the application containers that rely on them
Challenge #4: Service Discovery
• Networking in Kubernetes is a complex challenge
– A Pod can be scheduled on one cluster node and later be moved to another, so any
internal IPs that this Pod is assigned can change over time
– Another layer of abstraction is required
Simplifying Service Discovery
• Employ a Load Balancer
– Not natively part of Kubernetes functionality
– Provides each Pod a unique IP accessible from outside the cluster
– Either rely on infrastructure provider or a tool like MetalLB
• Leverage Kubernetes Ingress for business-critical applications
– Ingress is also complicated
– Check out a 3rd-party Ingress controller such as Nginx, Traefik, or Istio
Challenge #5: Managing Applications
• Kubernetes applications will likely consist of:
– several services spanning dozens of containers
– Persistent Volumes
– Secrets
– StatefulSets
• Grouping each application into a dedicated namespace for better cluster
management doesn’t scale
• Need to be able to deploy, modify, track changes, and upgrade containerized
applications
Simplifying Application Management
• Leveraging the Helm package manager is a good start
– However, new challenges arise in preventing untracked changes
• Employ Kubernetes operators, especially for production workloads
– They take a long time to build, but it’s worth it!
 Operators will allow IT team members to manage applications and initiate
upgrades without needing expertise in the app
Challenge #6: Monitoring Cluster Health
• Kubernetes is highly dynamic and yields a tremendous amount of activity data
– How do you make sense of the data to identify and remediate issues?
• Deploying any open source monitoring and logging tool doesn’t solve the problem
– Need a separate backend to store, analyze and query logs
Simplifying Health Monitoring
• Deploy a stack to effectively store, search, analyze, and visualize Kubernetes
environment data
– ELK (ElasticSearch, Logstash, Kibana)
– EFK (ElasticSearch, FluentD, Kibana)
• Also, Prometheus is widely used for systems monitoring and alerting
• BE AWARE: Properly configuring, sizing, and utilizing logging stacks is challenging on its
own
• Cluster-level logging, and application logging are generally separate processes
Challenge #7: Scaling the Cluster
• Kubernetes is capable of autoscaling applications, Pods, and clusters
– But how do you figure out the right approach?
Simplifying Scaling
• Automated application (Pod) scaling
– first, ensure enough cluster capacity to support maximum scaling values
• Automated worker node scaling:
– lean on cloud provider or on-prem Ops teams to help
– Be mindful of actual resource limits
All Kubernetes Offerings Aren’t Created Equal
Users should seek:
• A CNCF-certified Kubernetes distribution (conformance enables
interoperability)
• A native Kubernetes user experience (no lock-in)
• Intelligent automation around lifecycle management features
• Easy integration of storage, networking, security, and monitoring
solutions
Join The Academy!
• The Linux Foundation and CNCF offer a certification
program for Kubernetes Admins
• Training develops competency in:
• Application Lifecycle
Management
• Installation, Configuration &
Validation
• Core Concepts
• Networking
• Scheduling
• Security
• Cluster Maintenance
• Logging / Monitoring
• Storage
• Troubleshooting
Nutanix Karbon: Kubernetes Made Simple
Karbon is an enterprise
Kubernetes management
solution that enables
turnkey provisioning,
operations, and lifecycle
management of
Kubernetes.
Simple
• Less than 20 minutes to deploy production-ready Kubernetes clusters
• Public cloud-like operations, on premises
• Automated scaling and upgrades
• Expert technical support covers the entire stack
Complete Solution
• Seamlessly integrates Kubernetes monitoring, logging, and alerting
• Integrated CSI delivers persistent block and file storage
No Lock-in
• Native Kubernetes user experience with standard APIs
Karbon is Kubernetes
Certified.
Q&A

More Related Content

What's hot

ADDO Open Source Observability Tools
ADDO Open Source Observability Tools ADDO Open Source Observability Tools
ADDO Open Source Observability Tools Mickey Boxell
 
Monitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with DatadogMonitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with DatadogDevOps.com
 
Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Eric Smalling
 
ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsJim Bugwadia
 
Redefining cloud native debugging
Redefining cloud native debugging  Redefining cloud native debugging
Redefining cloud native debugging LibbySchulze
 
Dynatrace - Red Hat workshop : Monolith to Microservices
Dynatrace - Red Hat workshop : Monolith to MicroservicesDynatrace - Red Hat workshop : Monolith to Microservices
Dynatrace - Red Hat workshop : Monolith to MicroservicesSteve Caron
 
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...sangam biradar
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringVMware Tanzu
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API SecurityCloudIDSummit
 
Managing Microservices at Scale
Managing Microservices at ScaleManaging Microservices at Scale
Managing Microservices at ScalePerforce
 
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”GlobalLogic Ukraine
 
CyberArk Impact 2017 - REST for the Rest of Us
CyberArk Impact 2017 - REST for the Rest of UsCyberArk Impact 2017 - REST for the Rest of Us
CyberArk Impact 2017 - REST for the Rest of UsJoe Garcia
 
Codemotion Azure Container Apps
Codemotion Azure Container AppsCodemotion Azure Container Apps
Codemotion Azure Container AppsAndrea Tosato
 
Choosing PaaS: Cisco and Open Source Options: an overview
Choosing PaaS:  Cisco and Open Source Options: an overviewChoosing PaaS:  Cisco and Open Source Options: an overview
Choosing PaaS: Cisco and Open Source Options: an overviewCisco DevNet
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDDevOps.com
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataMirantis
 
Choose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesChoose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesYusuf Hadiwinata Sutandar
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesLacework
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldDevOps.com
 

What's hot (20)

ADDO Open Source Observability Tools
ADDO Open Source Observability Tools ADDO Open Source Observability Tools
ADDO Open Source Observability Tools
 
Monitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with DatadogMonitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with Datadog
 
Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!
 
ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply Chains
 
Redefining cloud native debugging
Redefining cloud native debugging  Redefining cloud native debugging
Redefining cloud native debugging
 
Dynatrace - Red Hat workshop : Monolith to Microservices
Dynatrace - Red Hat workshop : Monolith to MicroservicesDynatrace - Red Hat workshop : Monolith to Microservices
Dynatrace - Red Hat workshop : Monolith to Microservices
 
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
Rabncher Meetup India , Lightweight Kubernetes Development with K3s, k3os and...
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API Security
 
Managing Microservices at Scale
Managing Microservices at ScaleManaging Microservices at Scale
Managing Microservices at Scale
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
 
CyberArk Impact 2017 - REST for the Rest of Us
CyberArk Impact 2017 - REST for the Rest of UsCyberArk Impact 2017 - REST for the Rest of Us
CyberArk Impact 2017 - REST for the Rest of Us
 
Codemotion Azure Container Apps
Codemotion Azure Container AppsCodemotion Azure Container Apps
Codemotion Azure Container Apps
 
Choosing PaaS: Cisco and Open Source Options: an overview
Choosing PaaS:  Cisco and Open Source Options: an overviewChoosing PaaS:  Cisco and Open Source Options: an overview
Choosing PaaS: Cisco and Open Source Options: an overview
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container Data
 
Choose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesChoose the Right Container Storage for Kubernetes
Choose the Right Container Storage for Kubernetes
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing Kubernetes
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote World
 

Similar to Simplify Your Way to Expert Kubernetes Management in 40 Characters

Azure meetup cloud native concepts - may 28th 2018
Azure meetup   cloud native concepts - may 28th 2018Azure meetup   cloud native concepts - may 28th 2018
Azure meetup cloud native concepts - may 28th 2018Jim Bugwadia
 
Why kubernetes matters
Why kubernetes mattersWhy kubernetes matters
Why kubernetes mattersPlatform9
 
Kubernetes solutions
Kubernetes solutionsKubernetes solutions
Kubernetes solutionsEric Cattoir
 
10 tips for Cloud Native Security
10 tips for Cloud Native Security10 tips for Cloud Native Security
10 tips for Cloud Native SecurityKarthik Gaekwad
 
How kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updatedHow kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updatedShikha Srivastava
 
Building Cloud-Native Applications with Kubernetes, Helm and Kubeless
Building Cloud-Native Applications with Kubernetes, Helm and KubelessBuilding Cloud-Native Applications with Kubernetes, Helm and Kubeless
Building Cloud-Native Applications with Kubernetes, Helm and KubelessBitnami
 
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Vietnam Open Infrastructure User Group
 
Modern big data and machine learning in the era of cloud, docker and kubernetes
Modern big data and machine learning in the era of cloud, docker and kubernetesModern big data and machine learning in the era of cloud, docker and kubernetes
Modern big data and machine learning in the era of cloud, docker and kubernetesSlim Baltagi
 
Application Deployment and Management at Scale with 1&1 by Matt Baldwin
Application Deployment and Management at Scale with 1&1 by Matt BaldwinApplication Deployment and Management at Scale with 1&1 by Matt Baldwin
Application Deployment and Management at Scale with 1&1 by Matt BaldwinDocker, Inc.
 
Build your own private Cloud environment
Build your own private Cloud environmentBuild your own private Cloud environment
Build your own private Cloud environmentNico Meisenzahl
 
DNUG46 - Build your own private Cloud environment
DNUG46 - Build your own private Cloud environmentDNUG46 - Build your own private Cloud environment
DNUG46 - Build your own private Cloud environmentpanagenda
 
Application Deployment and Management at Scale at 1&1
Application Deployment and Management at Scale at 1&1Application Deployment and Management at Scale at 1&1
Application Deployment and Management at Scale at 1&1Matt Baldwin
 
oci-container-engine-oke-100.pdf
oci-container-engine-oke-100.pdfoci-container-engine-oke-100.pdf
oci-container-engine-oke-100.pdfNandiniSinghal16
 
Centralizing Kubernetes and Container Operations
Centralizing Kubernetes and Container OperationsCentralizing Kubernetes and Container Operations
Centralizing Kubernetes and Container OperationsKublr
 
DEVNET-1183 OpenShift + Kubernetes + Docker
DEVNET-1183	OpenShift + Kubernetes + DockerDEVNET-1183	OpenShift + Kubernetes + Docker
DEVNET-1183 OpenShift + Kubernetes + DockerCisco DevNet
 
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + DockerAPPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + DockerSteven Pousty
 
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKSMigrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKSWeaveworks
 
Moving a Monolith to Kubernetes
Moving a Monolith to KubernetesMoving a Monolith to Kubernetes
Moving a Monolith to KubernetesM. Scott Ford
 
Kubernetes-Presentation-Syed-Murtaza-Hassan
Kubernetes-Presentation-Syed-Murtaza-HassanKubernetes-Presentation-Syed-Murtaza-Hassan
Kubernetes-Presentation-Syed-Murtaza-HassanSyed Murtaza Hassan
 

Similar to Simplify Your Way to Expert Kubernetes Management in 40 Characters (20)

Azure meetup cloud native concepts - may 28th 2018
Azure meetup   cloud native concepts - may 28th 2018Azure meetup   cloud native concepts - may 28th 2018
Azure meetup cloud native concepts - may 28th 2018
 
Why kubernetes matters
Why kubernetes mattersWhy kubernetes matters
Why kubernetes matters
 
Kubernetes solutions
Kubernetes solutionsKubernetes solutions
Kubernetes solutions
 
10 tips for Cloud Native Security
10 tips for Cloud Native Security10 tips for Cloud Native Security
10 tips for Cloud Native Security
 
How kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updatedHow kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updated
 
Building Cloud-Native Applications with Kubernetes, Helm and Kubeless
Building Cloud-Native Applications with Kubernetes, Helm and KubelessBuilding Cloud-Native Applications with Kubernetes, Helm and Kubeless
Building Cloud-Native Applications with Kubernetes, Helm and Kubeless
 
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
Room 2 - 6 - Đinh Tuấn Phong - Migrate opensource database to Kubernetes easi...
 
Kubernetes Security
Kubernetes SecurityKubernetes Security
Kubernetes Security
 
Modern big data and machine learning in the era of cloud, docker and kubernetes
Modern big data and machine learning in the era of cloud, docker and kubernetesModern big data and machine learning in the era of cloud, docker and kubernetes
Modern big data and machine learning in the era of cloud, docker and kubernetes
 
Application Deployment and Management at Scale with 1&1 by Matt Baldwin
Application Deployment and Management at Scale with 1&1 by Matt BaldwinApplication Deployment and Management at Scale with 1&1 by Matt Baldwin
Application Deployment and Management at Scale with 1&1 by Matt Baldwin
 
Build your own private Cloud environment
Build your own private Cloud environmentBuild your own private Cloud environment
Build your own private Cloud environment
 
DNUG46 - Build your own private Cloud environment
DNUG46 - Build your own private Cloud environmentDNUG46 - Build your own private Cloud environment
DNUG46 - Build your own private Cloud environment
 
Application Deployment and Management at Scale at 1&1
Application Deployment and Management at Scale at 1&1Application Deployment and Management at Scale at 1&1
Application Deployment and Management at Scale at 1&1
 
oci-container-engine-oke-100.pdf
oci-container-engine-oke-100.pdfoci-container-engine-oke-100.pdf
oci-container-engine-oke-100.pdf
 
Centralizing Kubernetes and Container Operations
Centralizing Kubernetes and Container OperationsCentralizing Kubernetes and Container Operations
Centralizing Kubernetes and Container Operations
 
DEVNET-1183 OpenShift + Kubernetes + Docker
DEVNET-1183	OpenShift + Kubernetes + DockerDEVNET-1183	OpenShift + Kubernetes + Docker
DEVNET-1183 OpenShift + Kubernetes + Docker
 
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + DockerAPPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
APPLICATIONS AND CONTAINERS AT SCALE: OpenShift + Kubernetes + Docker
 
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKSMigrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKS
 
Moving a Monolith to Kubernetes
Moving a Monolith to KubernetesMoving a Monolith to Kubernetes
Moving a Monolith to Kubernetes
 
Kubernetes-Presentation-Syed-Murtaza-Hassan
Kubernetes-Presentation-Syed-Murtaza-HassanKubernetes-Presentation-Syed-Murtaza-Hassan
Kubernetes-Presentation-Syed-Murtaza-Hassan
 

More from DevOps.com

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudDevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and PredictionsDevOps.com
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionDevOps.com
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureDevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportDevOps.com
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogDevOps.com
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureDevOps.com
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?DevOps.com
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...DevOps.com
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
 

More from DevOps.com (20)

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Simplify Your Way to Expert Kubernetes Management in 40 Characters

  • 1. Simplify Your Way To Expert Kubernetes Management A P R I L 1 5 , 2 0 2 0
  • 2. Sean Roth Director, Product Marketing - Cloud Native Solutions AGENDA • A look at ‘Cloud Native’ and the challenges of the journey • Kubernetes, the cloud native ecosystem, and infrastructure • Simplifying Kubernetes Management: 7 Areas To Focus On • Q&A
  • 3. What is a Cloud Native Application? 1. Packaged as lightweight containers 2. Developed with best-of-breed languages and frameworks 3. Designed as loosely coupled microservices 4. Centered around APIs for interaction and collaboration 5. Architected with a clean separation of stateless and stateful services 6. Isolated from server and operating system dependencies 7. Deployed on self-service, elastic, cloud infrastructure 8. Managed through agile DevOps processes 9. Automated capabilities 10. Subject to defined, policy-driven resource allocation Source: The NewStack.io 10 KEY ATTRIBUTES OF CLOUD-NATIVE APPLICATIONS https://thenewstack.io/10-key-attributes-of-cloud-native-applications/
  • 4. Challenges Of Going ‘Cloud Native’ • Kubernetes is deep and complex, and evolves fast with its growing ecosystem of technologies • Legacy infrastructure isn’t built for Kubernetes
  • 5. • Cost efficiency: public cloud is not always cheaper for some workloads at scale • Compliance: many organizations are subject to regulation around data locality • Improved data center efficiency: opportunity to modernize and get more out of existing infrastructure investment • Performance: certain workloads might require higher IOPS and lower latency than public cloud can deliver Why Run Kubernetes On Prem? Enterprises are taking a multi-cloud approach to running cloud-native applications. +
  • 7. Kubernetes “Kubernetes is the Linux of the cloud.” --Kelsey Hightower Staff Developer Advocate Google What Kubernetes does: • Assigns containers to machines (scheduling) • Boots the specified containers through the container runtime • Deals with upgrades, rollbacks, and the constantly changing nature of the system • Responds to failures (container crashes, etc.) • Creates cluster resources like service discovery, inter VM networking, cluster ingress/egress, etc.
  • 8. API CLI UI Kubernetes Under The Hood • Designed for scalability, availability, security, and portability • Optimizes cost of infrastructure – Workloads distributed across available resources • Each component of a Kubernetes cluster (etcd, API server, nodes) can be configured for HA • For apps, Kubernetes ensures HA by means of replica sets, replication controllers, etc. • Kubernetes endpoints secured with TLS • Every operation that manages a process running on the cluster must be initiated by an authenticated user NODE 1 kubelet api server scheduler controllers NODE 2 kubelet NODE n kubelet Control PlaneUsers Worker Nodes
  • 9. Pods: Kubernetes’ Unit Of Execution • Pods represent processes running on the Kubernetes cluster • A pod encapsulates an application’s container(s), storage resources, unique network IP, and options • Controllers run pods according to a user-created pod spec apiVersion: v1 kind: Pod metadata: name: cpu-demo namespace: cpu-example spec: containers: - name: cpu-demo-ctr image: test/stress resources: limits: cpu: "1" requests: cpu: "0.5" args: - -cpus - "2"
  • 10. “Infrastructure As Code” • Carving out CPU and memory resources uses a simple declarative model …easy, right? apiVersion: v1 kind: Pod metadata: name: cpu-demo namespace: cpu-example spec: containers: - name: cpu-demo-ctr image: test/stress resources: limits: cpu: "1" requests: cpu: "0.5" args: - -cpus - "2"
  • 11. …But What About: Persistent storage? Networking and Load balancing? Security? Monitoring and logging? Application management? Availability?
  • 12. Kubernetes And The Cloud Native Ecosystem Security & Governance Databases Container Orchestration CI/CD Container StorageContainer Networking Observability & Analysis Proxy, Gateway & Service Mesh 500+ open-source and commercial cloud-native technologies are rapidly evolving www.cncf.io
  • 14. Kubernetes Master Node Upgrade Process 1. Drain the first master node (which incurs downtime, unless two or more master Kubernetes nodes are running) 2. Upgrade the cluster orchestrator / infra piece (typically kubeadm, but there are others) on that master node 3. Upgrade the master control plane 4. Upgrade the master kubelet and kubectl 5. Uncordon the upgraded master node 6. Repeat steps 1 through 5 for each of the remaining master nodes Then, upgrade worker nodes… …and etcd (Kubernetes key-value store) Challenge #1: Kubernetes and Cluster Upgrades
  • 15. Upgrading Host OS • Upgrading the Host OS is a similar process to upgrading the Kubernetes version • each node is drained one at a time, upgraded, rebooted, and then un-cordoned Challenge #1: Kubernetes and Node Upgrades
  • 16. • Seek out a dedicated Kubernetes management solution • Upgrades (as well as other undifferentiated heavy-lifting) should be push- button processes • Ensure your solution can execute non-disruptive upgrades Simplifying Kubernetes/Host Upgrades
  • 17. Challenge #2: Persistent Storage • Containers are ephemeral, making storage a huge challenge – Provisioned storage needs to remain connected to pods hosting stateful applications • CSI is the standard mechanism for exposing block and file storage to containerized workloads • Big decisions: – What type of storage will be used? – How it will be made accessible to Kubernetes clusters? – How it will be provisioned and used by applications?
  • 18. Simplifying Persistent Storage • Leverage a container storage solution that offers support for file, block, and object storage classes • Different applications value different mediums: – Performance-intensive app?  Block storage – Multiple Pods need to access the same storage?  file storage with read-write- many – Need simple configuration and enormous scale?  object storage • Automate! – Automatically install CSI drivers on every Kubernetes cluster, along with the creation of a default storage class
  • 19. Challenge #3: Managing Secrets • Secret: Kubernetes object used to store SSH keys, tokens, passwords, etc. that are required when containerized applications need to interface with other systems – Critical responsibility for Kubernetes admins and security practitioners alike • Kubernetes provides some basic security capabilities around secrets (encryption, policies, and whitelist access) but they require enforcement • CAUTION: Secrets can break applications in production if they change!
  • 20. Simplifying Secrets Management • Dedicated secrets management tool is key! – Should work on individual containers • Change management capabilities are critical – automatically push changed secrets to the application containers that rely on them
  • 21. Challenge #4: Service Discovery • Networking in Kubernetes is a complex challenge – A Pod can be scheduled on one cluster node and later be moved to another, so any internal IPs that this Pod is assigned can change over time – Another layer of abstraction is required
  • 22. Simplifying Service Discovery • Employ a Load Balancer – Not natively part of Kubernetes functionality – Provides each Pod a unique IP accessible from outside the cluster – Either rely on infrastructure provider or a tool like MetalLB • Leverage Kubernetes Ingress for business-critical applications – Ingress is also complicated – Check out a 3rd-party Ingress controller such as Nginx, Traefik, or Istio
  • 23. Challenge #5: Managing Applications • Kubernetes applications will likely consist of: – several services spanning dozens of containers – Persistent Volumes – Secrets – StatefulSets • Grouping each application into a dedicated namespace for better cluster management doesn’t scale • Need to be able to deploy, modify, track changes, and upgrade containerized applications
  • 24. Simplifying Application Management • Leveraging the Helm package manager is a good start – However, new challenges arise in preventing untracked changes • Employ Kubernetes operators, especially for production workloads – They take a long time to build, but it’s worth it!  Operators will allow IT team members to manage applications and initiate upgrades without needing expertise in the app
  • 25. Challenge #6: Monitoring Cluster Health • Kubernetes is highly dynamic and yields a tremendous amount of activity data – How do you make sense of the data to identify and remediate issues? • Deploying any open source monitoring and logging tool doesn’t solve the problem – Need a separate backend to store, analyze and query logs
  • 26. Simplifying Health Monitoring • Deploy a stack to effectively store, search, analyze, and visualize Kubernetes environment data – ELK (ElasticSearch, Logstash, Kibana) – EFK (ElasticSearch, FluentD, Kibana) • Also, Prometheus is widely used for systems monitoring and alerting • BE AWARE: Properly configuring, sizing, and utilizing logging stacks is challenging on its own • Cluster-level logging, and application logging are generally separate processes
  • 27. Challenge #7: Scaling the Cluster • Kubernetes is capable of autoscaling applications, Pods, and clusters – But how do you figure out the right approach?
  • 28. Simplifying Scaling • Automated application (Pod) scaling – first, ensure enough cluster capacity to support maximum scaling values • Automated worker node scaling: – lean on cloud provider or on-prem Ops teams to help – Be mindful of actual resource limits
  • 29. All Kubernetes Offerings Aren’t Created Equal Users should seek: • A CNCF-certified Kubernetes distribution (conformance enables interoperability) • A native Kubernetes user experience (no lock-in) • Intelligent automation around lifecycle management features • Easy integration of storage, networking, security, and monitoring solutions
  • 30. Join The Academy! • The Linux Foundation and CNCF offer a certification program for Kubernetes Admins • Training develops competency in: • Application Lifecycle Management • Installation, Configuration & Validation • Core Concepts • Networking • Scheduling • Security • Cluster Maintenance • Logging / Monitoring • Storage • Troubleshooting
  • 31. Nutanix Karbon: Kubernetes Made Simple Karbon is an enterprise Kubernetes management solution that enables turnkey provisioning, operations, and lifecycle management of Kubernetes. Simple • Less than 20 minutes to deploy production-ready Kubernetes clusters • Public cloud-like operations, on premises • Automated scaling and upgrades • Expert technical support covers the entire stack Complete Solution • Seamlessly integrates Kubernetes monitoring, logging, and alerting • Integrated CSI delivers persistent block and file storage No Lock-in • Native Kubernetes user experience with standard APIs Karbon is Kubernetes Certified.
  • 32. Q&A