Building in Reliability to Meet Regulatory Demands The German banking service provider figo is on a mission to reduce complexity and increase reliability and scalability across its infrastructure. To reach these goals, while also addressing the ongoing demands of banking and privacy regulations, figo is converting to a Kubernetes container-based infrastructure. As figo says, “these measures ensure figo API’s future-readiness …
How Kubernetes Networking Works – Under the Hood
How to Understand and Set Up Kubernetes Networking, Including Multiple Networks By Tobias Gurtzick Kubernetes networking is a complex topic, if not even the most complicated topic. This post will give you insight on how kubernetes actually creates networks and also how to setup a network for a kubernetes cluster yourself. This article doesn’t cover how to setup a …
How Kubernetes Networking Works – The Basics
By Gary Duan Kubernetes 101 Before I get into Kubernetes networking, here are the basic concepts to know about in Kubernetes. For those not familiar with Kubernetes, these are the objects and terms used in a Kubernetes deployment. Kubernetes is a container orchestration and management tool for automating the deployment and monitoring of containers. Kubernetes is supported by all major …
Enhancing OpenShift and Kubernetes Container Security for Business Critical Deployments
In this webinar from DevOps.com, Andrew Toth from Red Hat outlines typical threats and security measures to protect container deployments and will share information on built-in security features of OpenShift and Kubernetes. Glen Kosaka from NeuVector then presents how to enhance security for Kubernetes and OpenShift by using advanced Kubernetes container security features to improve visibility and protection in production. An …
How to Enforce DNS-based Egress Container Security Policies in Kubernetes and Openshift
By Gary Duan While more and more applications are moving to a microservices and container-based architecture, there are legacy applications that cannot be containerized. Access to these applications need to be secured with egress container security policies when containers are deployed with Kubernetes or Red Hat OpenShift. These legacy applications include database servers and applications developed with .NET frameworks. The …