Welche fünf Mythen über Kubernetes es gibt und was Unternehmen über den Orchestrator ihrer Container-Anwendungen wissen sollten, zeigt Ralf Baumann, Country Manager bei Veritas, in einem Gastbeitrag. |
Ralf Baumann, country manager at Veritas, reveals in a guest post the five myths about Kubernetes and what enterprises should know about the orchestrator of their container applications. |
---|---|
Die Open-Source-Plattform zur Verwaltung von containerisierten Arbeitslasten und Services Kubernetes wird immer beliebter. So ergab eine Studie von Veritas Technologies, dass 40 Prozent der deutschen Unternehmen ihre geschäftskritischen Anwendungen bereits in Kubernetes-Umgebungen migriert haben. Die strategischen und technologischen Vorteile des Orchestrators sind unbestreitbar, aber es gibt einige Punkte, auf die Unternehmen achten sollten.
„Kubernetes ist eine moderne Plattform, die viele IT-Entscheidungsträger zu Recht begeistert. Allerdings deckt sie bei weitem nicht alle Anforderungen an eine sichere Infrastruktur ab. Das gilt insbesondere für die Verwaltung und den Schutz von Daten“, erklärt Ralf Baumann, Country Manager bei Veritas. Vor der Einführung von Kubernetes sollten sich die Entscheider über die Grenzen im Klaren sein. Veritas räumt mit den fünf hartnäckigsten Mythen rund um Kubernetes auf und gibt Tipps, wie Unternehmen die Umgebung sicher nutzen können:
„Die digitale Transformation hat Unternehmen zu IT-Lösungen getrieben, die eine bessere Effizienz und Skalierbarkeit ihrer IT-Dienste ermöglichen. Die Containerisierung von Anwendungen und die Verwaltung des Betriebs mithilfe von Orchestrierungs-Engines wie Kubernetes können Unternehmen dabei helfen, Innovationen hervorzubringen. Dennoch sollten sie darauf achten, dass Kubernetes richtig konfiguriert und gesichert wird, um das Optimum herauszuholen“, so Baumann abschließend. |
The open source platform for managing containerized workloads and services Kubernetes is growing in popularity. A study by Veritas Technologies found that 40 percent of German companies have already migrated their business-critical applications to Kubernetes environments. The strategic and technological benefits of the orchestrator are undeniable, but there are some points that enterprises should pay attention to.
„Kubernetes is a modern platform that many IT decision makers are rightly excited about. However, it falls far short of covering all the requirements for a secure infrastructure. This is especially true for data management and protection,“ explains Ralf Baumann, Country Manager at Veritas. Before adopting Kubernetes, decision makers should be aware of its limitations.
Veritas dispels the five most persistent myths surrounding Kubernetes and offers tips on how organizations can use the environment securely:
Kubernetes provides security features and mechanisms because it is, to some extent, a secure-by-design platform. However, the default configuration is not necessarily robust. To achieve a good level of security in today’s global cyber threat environment, enterprises need to adopt more complex configurations for Kubernetes.
The actual security level of a deployment depends on the configuration applied and other aspects – such as permission management, network security, container image control and the containers themselves.
Kubernetes is not necessarily easy to configure, and qualified professionals are scarce in the market. Nevertheless, enterprises should proactively configure Kubernetes in a secure manner, because the default state is not enough to protect against increasingly sophisticated cyber attacks.
A successful and secure Kubernetes installation goes hand in hand with setting up maintenance procedures that need to be checked again and again. For example, container images need to be configured securely and checked regularly to prevent vulnerabilities and malware. Since Kubernetes and its ecosystem are largely based on open source elements, continuous supply chain auditing is also important.
Access controls must keep pace with the numerous updates to the platform and container images.
Enterprises should implement regular patching, monitoring and security audits to identify vulnerabilities and gaps in a timely manner and to ensure that the original configuration remains relevant.
The flip side of Kubernetes‘ flexibility is that the environment does not offer standard storage solutions. Again, everything in this area needs to be defined and configured. Before a deployment, therefore, IT must address many questions and make decisions that are more complex than the object-or-block question for storage. Beyond the possible technological alternatives, various micro-strategies must be defined: Data persistence or not, locating data in containers or applications, required volumes, scalability and isolation. The complexity of Kubernetes infrastructures leads to a multitude of requirements that must be anticipated, evaluated and resolved.
Because Kubernetes backups are relatively limited, organizations deploying Kubernetes must also implement solutions to protect against cluster data corruption or loss. One-time or infrequent data backups are not enough to ward off threats such as ransomware. Even with Kubernetes, it is important to perform regular backups and ensure that all common and mission-critical data is secure in this way. Kubernetes does offer features such as replication and restarting pods. However, this does not protect against data loss or corruption of the entire cluster. Because Kubernetes clusters are highly dynamic, they require specialized expertise beyond traditional data protection.
When restoring from backups, various challenges can arise – for example, incompatibilities between configurations or dependencies between resources. It is therefore important to test a restore from backups and ensure that it works efficiently.
„Digital transformation has driven enterprises to IT solutions that enable better efficiency and scalability of their IT services. Containerizing applications and managing operations using orchestration engines like Kubernetes can help enterprises innovate. However, they should make sure Kubernetes is properly configured and secured to get the most out of it,“ Baumann concluded. |

Dr. Jakob Jung ist Chefredakteur Security Storage und Channel Germany. Er ist seit mehr als 20 Jahren im IT-Journalismus tätig. Zu seinen beruflichen Stationen gehören Computer Reseller News, Heise Resale, Informationweek, Techtarget (Storage und Datacenter) sowie ChannelBiz. Darüber hinaus ist er für zahlreiche IT-Publikationen freiberuflich tätig, darunter Computerwoche, Channelpartner, IT-Business, Storage-Insider und ZDnet. Seine Themenschwerpunkte sind Channel, Storage, Security, Datacenter, ERP und CRM.
Dr. Jakob Jung is Editor-in-Chief of Security Storage and Channel Germany. He has been working in IT journalism for more than 20 years. His career includes Computer Reseller News, Heise Resale, Informationweek, Techtarget (storage and data center) and ChannelBiz. He also freelances for numerous IT publications, including Computerwoche, Channelpartner, IT-Business, Storage-Insider and ZDnet. His main topics are channel, storage, security, data center, ERP and CRM.
Kontakt – Contact via Mail: jakob.jung@security-storage-und-channel-germany.de