Continental Innovates with Rancher and Kubernetes
Introduction Kubernetes solves the problem of orchestrating containerized applications at scale by replacing the manual processes involved in their deployment, operation, and scaling with automation. While this enables us to run containers in production with great resiliency and comparably low operational overhead, the Kubernetes control plane and the container runtime layer have also increased the complexity of the IT infrastructure stack.
In order to reliably run Kubernetes in production, it is therefore essential to ensure that any existing monitoring strategy targeted at traditional application deployments is enhanced to provide the visibility required to operate and troubleshoot these additional container layers.
Introduction Kubernetes clusters can manage large numbers of unrelated workloads concurrently and organizations often choose to deploy projects created by separate teams to shared clusters. Even with relatively light use, the number of deployed objects can quickly become unmanageable, slowing down operational responsiveness and increasing the chance of dangerous mistakes.
Kubernetes uses a concept called namespaces to help address the complexity of organizing objects within a cluster. Namespaces allow you to group objects together so you can filter and control them as a unit.
Introduction Kubernetes is all about managing your container infrastructure. After learning the basics of what Kubernetes can do, it’s important to know all the building blocks that will help you run your containers in the best manner possible. So let’s discuss “workloads” and some of the Kubernetes components that surround this concept.
So what exactly is a workload? In Kubernetes, there is no object, component, and any kind of construct called a “workload”.
Introduction Kubernetes has become increasingly popular as a reliable platform for running and managing applications. Kubernetes is a distributed systems platform and follows a client-server architecture. The master nodes function as the server side of Kubernetes, while the worker nodes connect to the master and run as clients.
Because of this division, Kubernetes components can be logically split up into these two categories:
Master components: These components run on the master nodes of the cluster and form the control plane.
This is the third of a series of three articles focusing on Kubernetes security: the outside attack, the inside attack, and dealing with resource consumption or noisy neighbors.
Containers have become incredibly common in modern development workflows and production environments. But what exactly are they and why are they getting so much attention? In this article, we will talk about what containers are, how they differ from related technologies, and what primary advantages they provide for the individuals and teams who adopt them.
Containerized applications have the ability to rapidly transform IT environments by enabling faster development, predictable deployments, and more flexible architectures. In spite of these advantages, it can still be difficult to communicate the value of containers to businesses. In this guide, we address some of these challenges to help make a case for container adoption within your organization.
Big data is category of data management, processing, and storage that is primarily defined by its scale. Conventional data processing techniques and tooling are often not suitable for the volume, velocity, and variety of data generated by some modern environments, so new paradigms had to be developed. In this article, we introduce big data concepts and discuss why and how they can be useful.
When evaluating application and system architecture, it is important to understand your options and their implications. In recent years, highly distributed systems have become popular, in part due to an influx of sophisticated tooling and an evolution in system management practices. In this guide, we will discuss some of the historical contexts from which distributed systems emerged and offer some general advice on what to keep in mind when designing these applications.
Microservices are an alternative to monolithic application architecture that can help businesses adapt to modern deployment environments and increase their development velocity. In this article, we'll discuss the differences between these two approaches and the reasons organizations might want to consider microservices.
This article covers Kubernetes security solutions that have an eye toward keeping clusters safe from unauthorized inside access. Second in a series of articles on Kubernetes security. Read more here.
This is the first of a series of three articles focusing on Kubernetes security: the outside attack, the inside attack, and dealing with resource consumption or noisy neighbors.
In this article, we differentiate between Rancher and related components like RKE and custom clusters. We talk about what each piece is responsible for and how they work together to enable better cluster management.
In this article, we explore Kubernetes namespaces as a way to organize and manage objects within a cluster.
Monitoring a Kubernetes cluster allows engineers to observe its resource utilization and take action when something goes wrong. This article explores what you should be monitoring and how to go about it with Rancher, Prometheus, and Grafana.
Thoughts on Kubernetes design choices, complexity, and usability
In our introduction to container security, we discuss the issues surrounding this new technology and what you can do to address them. Read more at Rancher.
When you try to to create persistent storage in Kubernetes, the first two concepts you will likely encounter are Kubernetes PV, and PVC.
In this Kubernetes tutorial we explore the many benefits of containers for an application and how to orchestrate their lifecycles. Read more at Rancher.
Learn about Rancher management plane architecture where every API resource is represented as a CustomResourceDefinition(CRD) and every functional routine runs as Kubernetes controller
This article series focuses on what metrics, tools, and best practices engineering teams need to know in order to successfully manage workloads on Kubernetes clusters at scale. If you're building a distributed system, releasing new features, and avoiding regression - this article is for you.
Learn different ways of load balancing traffic to your kuberentes workload with Rancher
The shiny new tool at KubeCon Europe in May 2018 is gVisor, gVisor a sandboxed container runtime authored by Google, that acts as a user-space kernel. Read about gVisor, what it is and how to use it.
Rancher 2.0 builds on top of a strong base in Kubernetes authentication and authorization. Explore the benefits we provide to organizations, admins and users.
Rancher 1.6 and Rancher 2.0 have slightly different terms and concepts underpinning the container orchestration engine. Learn the fundamental differences between Cattle and Kubernetes. For anyone who has used Cattle or is new to Kubernetes, this article is for you. Get a container orchestrator Cattle to Kubernetes glossary cheatsheet as well.