Posted in devops
Posts Tagged ‘access’
VMware, in collaboration with sister company Pivotal, announced this week the general availability of the Kubernetes instance developed by the two companies. Paul Dul, vice president of product management for cloud native applications at VMware, says the Pivotal Container Service (PKS) is much more than a curated instance of Kubernetes.
Many people believe that workloads in the cloud always perform better because public clouds have access to an almost unlimited amount of resources. Although you can provision the resources you needand even use serverless computing so the allocation of resources is done for youthe fact is that having the right amount of resources is only half the battle.
Sylabscame out of stealth today to provide support for container software designed specifically for high-performance computing (HPC) environments that are being employed to process scientific applications based on, forco example, machine and deep learning algorithms. Company CEO Greg Kurtzer says the open source Singularity container he developed for HPC environments is unique in that it is based on a single file (SIF) that encapsulates the runtime environment.
Provisioning a Kubernetes cluster has become a lot easier in recent months, but the daily management of the platform still can be challenging. To make it simpler to manage a Kubernetes cluster, Canonical has teamed up with Rancher Labs to deliver a Cloud Native Platform due out in early 2018.
The OpenStack Foundation announced this week that it is leading an effort to combine two existing open source projects to create a Kata class of containers that can be deployed on a lightweight version of the Kernel-based virtual machine. OpenStack Foundation COO Mark Collier says Kata Containers enable each container to have access to its own kernel to provide the same level of isolation that containers enjoy on existing virtual machines, without having to execute any extra code that traditional virtual machines require to support entire operating systems.
As the number of stateful applications being developed using Docker containers increases, a battle has broken out among storage vendors anxious to grab a share of an emerging class of workloads. The latest vendor to extend the reach of its storage software by adding support for both containers and Kubernetes is IBM.
While the term cloud used to be the main topic of discussion in the technology industry, cloud-native is taking its placeand with it, cloud-native security. There are many elements to keep in mind as more organizations begin to build their IT and security in the cloud, but here are five key observations to consider as your organization seeks to understand the different elements.
For those responsible for container security within their organizations, clashing is now much more than just a fashion faux pas: The recently discovered Linux Stack Clash vulnerability (CVE-2010-2240) is a serious threat that attackers can exploit to gain root privileges within a container. Worse, if the exploit is applied in the hosts user space, it represents a critical danger in which an attacker could compromise running containers (or the Docker daemon itself).
More evidence emerged today that Kubernetes is rapidly evolving into a platform on which some of the largest enterprise applications will be deployed. SAP announced that Vora 2.0, a big data analytics platform based on a distribution of the Apache Spark in-memory computing framework, has been redesigned to run on Kubernetes.