New Report - State of Container and Kubernetes Security Winter 2020 Download Now
{ .link_text }}

Posts under Kubernetes

EKS vs GKE vs AKS - April 2020 Updates

EKS vs GKE vs AKS - April 2020 Updates

In February, we published an article providing side-by-side comparison between the managed Kubernetes offerings of the three largest cloud providers: Amazon’s Elastic Kubernetes Service (EKS), Azure Kubernetes Service (AKS), and Google Kubernetes Engine (GKE). The Kubernetes ecosystem changes rapidly, as do the feature sets of these managed platforms. This post covers important updates to these services made since our original comparison. Azure Kubernetes Service (AKS) Kubernetes Versions AKS has made Kubernetes 1.

EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud

EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud

Now that Kubernetes has won the container orchestration wars, all the major cloud service providers offer managed Kubernetes services for their customers. Managed Kubernetes services provide and administer the Kubernetes control plane, the set of services that would normally run on Kubernetes master nodes in a cluster created directly on virtual or physical machines. While dozens of vendors have received Certified Kubernetes status from the Cloud Native Computing Federation, which means their Kubernetes offering or implementation offers conformance to a consistent interface, details between offerings can differ.

Guide to Kubernetes Egress Network Policies

Guide to Kubernetes Egress Network Policies

A few months ago, we published a guide to setting up Kubernetes network policies, which focused exclusively on ingress network policies. This follow-up post explains how to enhance your network policies to also control allowed egress. A Brief Recap: What are Network Policies? Network policies are used in Kubernetes to specify how groups of pods are allowed to communicate with each other and with external network endpoints. They can be thought of as the Kubernetes equivalent of a firewall.

Kubernetes Networking Demystified: A Brief Guide

Kubernetes Networking Demystified: A Brief Guide

Kubernetes cluster networking can be more than a bit confusing, even for engineers with hands-on experience working with virtual networks and request routing. In this post, we will present an introduction into the complexities of Kubernetes networking by following the journey of an HTTP request to a service running on a basic Kubernetes cluster. We will use a standard Google Kubernetes Engine (GKE) cluster with two Linux nodes for our examples, with notes on where the details might differ on other platforms.

SOC 2 Compliance in Container and Kubernetes Environments

SOC 2 Compliance in Container and Kubernetes Environments

SOC (System and Organization Controls) 2 is a set of compliance requirements that applies to companies that store, process, or transmit customer data. A broad range of companies, including SaaS providers, may need to comply with SOC 2 to be competitive in the market and keep customer data secure. Public cloud providers such as Amazon Web Services, Google Cloud Platform, and Microsoft Azure are subject to SOC 2 and make their audit reports publicly available.

StackRox + Sumo Logic – No Data Wrestling Needed

StackRox + Sumo Logic – No Data Wrestling Needed

Operationalizing container security by integrating with existing DevOps tooling and workflows has long been a design principle in how we’ve built our StackRox Kubernetes Security Platform. Today we’re excited to announce yet another powerful integration to make our customers’ operational lives better – the StackRox App for Sumo Logic. With this integration, joint customers now get rich StackRox insights about Kubernetes and container security incidents directly in the Sumo Logic Continuous Intelligence Platform.

Now we’re Blushing … Add Two CODiEs to the Awards List!

Now we’re Blushing … Add Two CODiEs to the Awards List!

Wow! We went to the CODiEs awards ceremony last night hoping to come home with a win and came home with two! The StackRox Kubernetes Security Platform won both Best Emerging Technology and Best Network Security Solution! These wins continue a long stream of wins, including Best Emerging Technology from SC Magazine, a Gold Stevie Award, Most Innovative Company in the Cybersecurity Excellence Awards, and a Gold Winner in the Info Security PG Global Excellence Awards – all just this year!

How to Build Production-Ready Kubernetes Clusters and Containers

How to Build Production-Ready Kubernetes Clusters and Containers

Kubernetes is a powerful tool for building highly scalable systems. As a result, many companies have begun, or are planning, to use it to orchestrate production services. Unfortunately, like most powerful technologies, Kubernetes is complex. How do you know you’ve set things up correctly and it’s safe to flip the switch and open the network floodgates to your services? We’ve compiled the following checklist to help you prepare your containers and kube clusters for production traffic.