In order to make Amazon EKS more reliable for users, Amazon is making changes to its version life cycle. For security purposes, it will be deprecating Kubernetes 1.10 on July 22, 2019. Kubernetes 1.13 will be available in EKS a month earlier, in June. In a blog post explaining the decision, Nathan Taber, senior product … continue reading
Veeam Software has announced that it is expanding its orchestration capabilities in the latest release of the Veeam Availability Orchestrator. Version 2 will allow organizations to address a wider range of disaster recovery and data migration use cases. Specific new features include the ability to more easily prove SLA attainment; leverage backup and replica data; … continue reading
The main challenge organizations will face securing their containers is not the technical part, but the cultural and organizational changes. This is according to a recently released report from Snyk that focused heavily on the current state of Docker security. The report revealed that half of the top 10 free certified Docker images have known … continue reading
Chef has announced a number of improvements to its Enterprise Automation Stack (EAS), which it first announced last month after open sourcing all of its software. The new updates will make it easier for customers to deliver and secure infrastructure. “Code is the language of collaboration for the modern, high-performing enterprise. Chef’s Enterprise Automation Stack … continue reading
KubeCon EU is happening this week in Barcelona, and many companies are using the event as an opportunity to release new enhancements to their products. Here are a few of the highlights: CircleCI announces new partnerships CircleCI has announced new partner integrations that will enable users to better manage applications in Kubernetes environments. New partnerships … continue reading
Cloud infrastructure provider Stratoscale has announced the latest version of its platform. Stratoscale V5 adds new components that will word together to combine all aspects of application development, from identity and access management to monitoring and notifications, the company explained. According to Stratoscale, this release brings the company one step closer to its vision for … continue reading
Syncsort has launched a new initiative that will help enterprises shift to Next Wave infrastructures such as cloud and blockchain. Syncsort Invent will have five focuses: hybrid cloud, streaming, AI, blockchain, and data governance. It will initially focus on the intersection of legacy data systems with cloud and blockchain. Its hybrid cloud initiative will focus … continue reading
HashiCorp has made its Rancher2 Terraform provider generally available. According to HashiCorp, the provider is used for interacting with resources supported by Rancher v2. Terraform is the company’s open-source project for cloud infrastructures. Rancher Labs has been working on a Terraform provider for Rancher 2.x ever since releasing version 2 due to the popularity of … continue reading
Despite the fact that remote work can cause security risks, a majority of IT professionals are in favor of employees working remotely. According to research by OpenVPN, 90 percent of IT professionals believe remote workers are a security risk. 92 percent also believe that the benefits of remote work outweigh the risks. Benefits of allowing … continue reading
The Rook project hit a major milestone earlier this month when it released version 1.0. Rook provides storage orchestration for Kubernetes. According to its GitHub page, Rook provides “the platform, framework, and support for a diverse set of storage solutions to natively integrate with cloud-native environments.” Rook makes storage self-managing, self-scaling, and self-healing by automating … continue reading
The ITOps Times Container Security Buyers Guide features: Moving parts mean more complexity Containing App Vulnerabilities “Doomsday” flaw found in RunC underscores potential for critical container vulnerabilities 9 security best practices for Kubernetes you should be following A guide to container security tools … continue reading