MicroK8s Gets Powerful Add-ons

We are excited to announce new Cilium and Helm add-ons, coming to MicroK8s! These add-ons add even more power to your Kubernetes environment built on MicroK8s. The Cilium CNI plugin brings enhanced networking features, including Kubernetes NetworkPolicy support, to MicroK8s. You’ll also get direct CLI access to Cilium within MicroK8s using the microk8s.cilium wrapper. If […]

Declarative vs Imperative: DevOps done right

Deciding whether to automate workloads, while designing your ICT infrastructure, is trivial. It’s 2019 and automation is everywhere around. However, deciding which DevOps paradigm to choose and which tool to use, may not be that obvious. In order to assist you with the ‘declarative vs imperative’ decision-making process, this blog briefly introduces existing DevOps paradigms, […]

The post Declarative vs Imperative: DevOps done right appeared first on Ubuntu Blog.

Declarative vs Imperative: DevOps done right

Deciding whether to automate workloads, while designing your ICT infrastructure, is trivial. It’s 2019 and automation is everywhere around. However, deciding which DevOps paradigm to choose and which tool to use, may not be that obvious. In order to assist you with the ‘declarative vs imperative’ decision-making process, this blog briefly introduces existing DevOps paradigms, […]

The post Declarative vs Imperative: DevOps done right appeared first on Ubuntu Blog.

Charmed Kubernetes update for upstream API server vulnerability

An upstream Kubernetes vulnerability (CVE-2019-11247) has been identified where the API server mistakenly allows access to a cluster-scoped custom resource, if the request is made as if the resource were namespaced. Authorisations for the resource accessed in this manner are enforced using roles and role bindings within the namespace. This means that a user with […]

The post Charmed Kubernetes update for upstream API server vulnerability appeared first on Ubuntu Blog.

Charmed Kubernetes update for upstream API server vulnerability

An upstream Kubernetes vulnerability (CVE-2019-11247) has been identified where the API server mistakenly allows access to a cluster-scoped custom resource, if the request is made as if the resource were namespaced. Authorisations for the resource accessed in this manner are enforced using roles and role bindings within the namespace. This means that a user with […]

The post Charmed Kubernetes update for upstream API server vulnerability appeared first on Ubuntu Blog.

Monitoring at the edge with MicroK8s

One of the benefits of the internet of things is the feedback loop created between operators and connected devices. Instrumented devices communicate sensor data to operators, who monitor the data, take actions and elicit further control decisions. To leverage the benefit of such control feedback loops in IoT deployments, it is therefore necessary to have […]

The post Monitoring at the edge with MicroK8s appeared first on Ubuntu Blog.