The Rise of Containers: Comparing Amazon ECS and Google Kubernetes

Explore different tools & platforms for hassle-free and easy management of K8s clusters, here in this blog. Read further to know more!

The Rise of Containers

Today, it wouldn’t be wrong to consider containers and microservice-based architectures as key threads in the fabric of next-gen tools and technologies to modernize enterprise applications. The basic concept behind the approach is to replace traditional, monolithic app development with a Microservices architecture supported by the cloud, API-based services, CI/CD pipelines, and cloud-native storage.

But how easy is the adoption of these advanced tools? Do you have the basic foundation and setup for adopting containers and is your container strategy sustainable for the long haul? These are some of the many challenges that organizations face while adopting containers.

Continue reading “The Rise of Containers: Comparing Amazon ECS and Google Kubernetes”

What are Helm Charts?

Helm is a stalwart element in the Kubernetes ecosystem. It is a package manager for Kubernetes that helps in application deployment by packaging all resources that are needed for a seamless Kubernetes deployment.
Here, we talk about what are helm charts and what benefits they offer.

Helm Charts in Kubernetes

A Helm chart is a collection of YAML template files that are organized into a specific directory structure. Helm Charts are similar to DEB and RPM files. Since they are text-based, helm charts are versionable and simple to maintain using SCM tools.

Continue reading “What are Helm Charts?”

Enable Support to Provision GP3 Volumes in Storage Class

No matter where organizations are in their cloud journey, cloud cost optimization remains an essential and top-priority concern. As organizations align increasing workloads to the cloud in terms of size there is a high possibility to lose sight of the overall cloud environment and the costs associated with it. Therefore, it’s essential to optimize cloud costs so as to maximise return over investment (ROI). With the same concern we were working towards reducing the cost of provisioned storage for one our clients. This post covers a particularly interesting issue around the same.

Continue reading “Enable Support to Provision GP3 Volumes in Storage Class”

A Comparison Between Various Container Orchestration Services! (ECS vs Kubernetes)

Container adoption is significantly increasing across various modern use cases, but it’s not a simple plug-and-play. Adopting containers becomes highly complicated, especially when it comes to executing them at scale as most enterprises have only limited skills and capabilities.

Many leading companies believe that Kubernetes is the first step to building scalable modern applications and they are adopting K8s to overcome container adoption barriers.

Spotify is one of these. Leveraging Kubernetes benefits, Spotify has observed significant cost-saving values as described in this case study. It has seen 2-3x CPU utilization by using the orchestration capabilities of K8s, resulting in better spend optimization.

Continue reading “A Comparison Between Various Container Orchestration Services! (ECS vs Kubernetes)”

Challenges of Kubernetes & How to Solve it!

For many of us, Kubernetes is the solution for some of the never-ending microservices application delivery problems, but Kubernetes setup and management comes with its own set of challenges. According to a report, there are 9 key Kubernetes challenges. In this blog, I’m focusing on the two primary challenges, which are Security & Networking.

Why is Security becoming such a Big Challenge for Organizations?

It’s mainly because Kubernetes is very complex and highly vulnerable if not monitored properly. As we implement Kubernetes for container orchestration, more and more containers are deployed and due to its distributed nature, hence it gets difficult to investigate which container might have vulnerabilities. Hence as a result the organization will start to feel the threat of outsiders breaching in.

One of the best examples of this situation: In 2018 Tesla’s Kubernetes admin console (which was not password protected) was breached by Hackers and mining of cryptocurrencies was done by Tesla’s cloud resources on amazon web services (AWS).

Continue reading “Challenges of Kubernetes & How to Solve it!”