I have a lot to be thankful for
In a previous post, What is Container Orchestration?, I explained container orchestration using some examples based on Docker Swarm. While Docker Swarm is undeniably easier to both use and explain, Kubernetes is by far the most prevalent container orchestrator today. So, I’m going to go through the same examples from that previous post but, this time, use Kubernetes. One of the great things about Docker Enterprise is it supports both Swarm and Kubernetes so I didn’t have to change my infrastructure at all.
Helm has been widely publicized as the package manager for Kubernetes. We’ve seen the need over and over for Helm. Unfortunately, Helm 2 requires Tiller and Tiller opens a lot of security questions. In particular, in a multi-user, multi-organization, and/or multi-tenant cluster, securing the Tiller service account (or accounts) was difficult and problematic. As a …
Managing a Kubernetes cluster with one user is easy. Once you go beyond one user, you need to start using Role-Based Access Control (RBAC). But, once you get beyond a couple of users and/or teams and a few namespaces for them, it quickly becomes difficult to keep track of who can do what and where. And, as time goes on and more and more people have a hand in setting up your RBAC, it can get even more confusing. You can and should have your RBAC resource definitions in source control but it’s not easy to read and is hard to visualize. Enter the open source who-can kubectl plugin from the folks at Aqua Security. It gives you the ability to show who (subjects) can do what (verbs) to what (resources) and where (namespaces).
Docker Enterprise Edition uses several default network address CIDR ranges by default. Learn how you can customize those CIDR ranges to avoid conflicts with your existing networks.
How you can automatically scale Worker Nodes in your AWS Docker Enterprise cluster.
Ingress control is provided out-of-the-box with Docker Enterprise in the form of UCP Interlock. This tutorial will walk you have to setup multiple ingress controllers across three environments all in the same cluster.
Why did one of my normally stable Kubernetes nodes suddenly decide it was constantly rebooting and changing its CPU count? The answer involves how it was cloned as a template for new nodes.
How you can apply Kubernetes NetworkPolicy’s to ensure your enterprise security and network concerns.
Over the last two or three years I’ve given a similar presentation on containers to operations groups at clients, potential clients, conferences and meetups. Generally, they’re just getting started with containers and are wondering what orchestration is and how it impacts them. In this post, I will talk about what container orchestration is and provide several videos with simple examples of what it means.