Intelligent CIO North America Issue 22 | Page 76

t cht lk

t cht lk

later , it seems , a large proportion of all companies have virtualized a high number of workloads . number of containers , the complexity grows and the overview is lost .
Kubernetes is now acting as a management platform for containers and interestingly , established and regulated industries like banking and financial services show greater interest and are early adopters of this technology , while other industries are still observing and evaluating the pros and cons .
The latter first look at what this is all about , whether it can be incorporated into their networks and be useful at all to gain an advantage in the market . On the side , however , these entrepreneurs are busy with other trends that they need to take a closer look at , such as cloud Infrastructure-as-a-Service .
To keep this effort small and as clear as possible , a central administration point must be set up – and this is where Kubernetes comes into play .
The software keeps an eye on everything and ensures , for example , that payloads are distributed dynamically and sensibly to the containers to guarantee the availability of a service and ensure that it can meet all requirements .
Kubernetes is thus an orchestration for Docker and accordingly , a connection between the two is not only possible but desirable .
Compatible with the runtime environments ?
Of course , the question immediately arises as to whether Kubernetes and the virtualization software are compatible . First , let ’ s set the record straight about exactly what we are talking about : Kubernetes is an orchestration system for containers ; Docker for example , is for now the most common container runtime .
The containers created in Docker can each exist and be worked on separately . Developers can manage them individually and do not necessarily need a higher-level solution to manage them . But with the
New security vulnerabilities in sight ?
Kubernetes does not change the threat landscape . It does not close security gaps but requires the same Modern Data Protection as any other type of data . Formerly , we just saved everything , then with virtualization we selected what to protect and how often .
Today , we move forward with containers that sometimes only last for minutes or hours , other than virtual machines that can have a lifetime of months . Kubernetes . io provides in-depth documentation that focuses on the ' Four Cs ' of cloud-native security : Code ; Container ; Cluster ; Cloud / Corporate Data Center .
76 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com