Unleashing the Full Potential of Containerization for DevOps - Part 2
September 21, 2017

Ruslan Synytsky
Jelastic

There are many options when it comes to container orchestration platforms and services. Figuring out which one is best for a particular organization’s needs and applications can be a challenge. Which platform for containerization you choose can significantly influence your business success, so the selection process should be carefully considered.

Start with Unleashing the Full Potential of Containerization for DevOps - Part 1

Expertise

Successful adoption of containers is not a trivial task. Managing them requires a different process and knowledge base, compared with virtual machines. The difference is significant, and many tricks and best practices with VM lifecycle management cannot be applied to containers. Ops teams need to educate themselves on this to avoid costly missteps.

The traditional operations skill set is obsolete when it comes to efficient containerization in the cloud. Cloud providers now mainly deliver management of infrastructure hardware and networks, and Ops teams are requested to make software deployment automation by scripting and using container-oriented tools.

Systems integrators and consulting companies can provide their expertise and maximize the benefits of containers. But if you want an in-house team to manage the whole process, it's time to start building your own expertise –  hire experienced DevOps professionals, learn best practices, and create a new knowledge base.

Investing Time and Effort

Don't expect to get containerized structure instantly. Some up-front time must be invested, especially if your architecture needs to be restructured to run microservices. To migrate from VMs for example, monolith applications should be decomposed into small logical pieces distributed among a set of interconnected containers. This requires specific knowledge to accomplish successfully.

In addition, for large organizations, it can be vital to select a solution that handles heterogeneous types of workloads using VMs and containers within one platform, because enterprise-wide container adoption can be a gradual process.

Security Concerns

Containerized environments are extremely dynamic, with the ability to change much more quickly than environments in VMs. This agility is a huge container benefit, but it can also be a challenge to achieve the appropriate level of security, while simultaneously enabling the required quick and easy access for developers.

A set of security risks should be considered with containerization:

■ Basic container technology doesn't easily deal with interservice authentication, network configurations, partitions, and other concerns regarding network security when calling internal components inside a microservice application.

■ Using publicly available container templates packaged by untrusted or unknown third parties is risky. Vulnerabilities can be intentionally or unintentionally added to this type of container.

Traditional security approaches should be complemented with continuously enhancing strategies to keep pace with today's dynamic IT environment. A key point here is that a wide choice of tools and orchestration platforms continues to evolve. They offer certified, proven templates, help to secure containers and ease the configuration process.

The IT market now offers a wide choice of solutions for container orchestration, making adoption easier, but skilled hands are required so the benefits can be fully leveraged and unexpected consequences avoided.

Ruslan Synytsky is CEO and Co-Founder of Jelastic

The Latest

September 18, 2018

To celebrate IT Professionals Day 2018 (this year on September 18), the SolarWinds IT Pro Day 2018: A World Powered by Tech Pros survey explores a "Tech PROactive" world where technology professionals have the time, resources, and ability to use their technology prowess to do absolutely anything ...

September 17, 2018

The role of DevOps in capitalizing on the benefits of hybrid cloud has become increasingly important, with developers and IT operations now working together closer than ever to continuously plan, develop, deliver, integrate, test, and deploy new applications and services in the hybrid cloud ...

September 13, 2018

"Our research provides compelling evidence that smart investments in technology, process, and culture drive profit, quality, and customer outcomes that are important for organizations to stay competitive and relevant -- both today and as we look to the future," said Dr. Nicole Forsgren, co-founder and CEO of DevOps Research and Assessment (DORA), referring to the organization's latest report Accelerate: State of DevOps 2018: Strategies for a New Economy ...

September 12, 2018

This next blog examines the security component of step four of the Twelve-Factor methodology — backing services. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

September 10, 2018

When thinking about security automation, a common concern from security teams is that they don't have the coding capabilities needed to create, implement, and maintain it. So, what are teams to do when internal resources are tight and there isn't budget to hire an outside consultant or "unicorn?" ...

September 06, 2018

In evaluating 316 million incidents, it is clear that attacks against the application are growing in volume and sophistication, and as such, continue to be a major threat to business, according to Security Report for Web Applications (Q2 2018) from tCell ...

September 04, 2018

There's a welcome insight in the 2018 Accelerate State of DevOps Report from DORA, because for the first time it calls out database development as a key technical practice which can drive high performance in DevOps ...

August 29, 2018

While everyone is convinced about the benefits of containers, to really know if you're making progress, you need to measure container performance using KPIs.These KPIs should shed light on how a DevOps team is faring in terms of important parameters like speed, quality, availability, and efficiency. Let's look at the specific KPIs to track for each of these broad categories ...

August 27, 2018

Protego Labs recently discovered that 98 percent of functions in serverless applications are at risk, with 16 percent considered "serious" ...

August 23, 2018

After another record year of breaches, The 2018 DevSecOps Community Survey found that 3 in 10 respondents suspected or verified breaches stemming from vulnerabilities in open source components — a 55% increase over 2017, and 121% increase since 2014 ...

Share this