Unleashing the Full Potential of Containerization for DevOps - Part 2
September 21, 2017

Ruslan Synytsky
Jelastic

There are many options when it comes to container orchestration platforms and services. Figuring out which one is best for a particular organization’s needs and applications can be a challenge. Which platform for containerization you choose can significantly influence your business success, so the selection process should be carefully considered.

Start with Unleashing the Full Potential of Containerization for DevOps - Part 1

Expertise

Successful adoption of containers is not a trivial task. Managing them requires a different process and knowledge base, compared with virtual machines. The difference is significant, and many tricks and best practices with VM lifecycle management cannot be applied to containers. Ops teams need to educate themselves on this to avoid costly missteps.

The traditional operations skill set is obsolete when it comes to efficient containerization in the cloud. Cloud providers now mainly deliver management of infrastructure hardware and networks, and Ops teams are requested to make software deployment automation by scripting and using container-oriented tools.

Systems integrators and consulting companies can provide their expertise and maximize the benefits of containers. But if you want an in-house team to manage the whole process, it's time to start building your own expertise –  hire experienced DevOps professionals, learn best practices, and create a new knowledge base.

Investing Time and Effort

Don't expect to get containerized structure instantly. Some up-front time must be invested, especially if your architecture needs to be restructured to run microservices. To migrate from VMs for example, monolith applications should be decomposed into small logical pieces distributed among a set of interconnected containers. This requires specific knowledge to accomplish successfully.

In addition, for large organizations, it can be vital to select a solution that handles heterogeneous types of workloads using VMs and containers within one platform, because enterprise-wide container adoption can be a gradual process.

Security Concerns

Containerized environments are extremely dynamic, with the ability to change much more quickly than environments in VMs. This agility is a huge container benefit, but it can also be a challenge to achieve the appropriate level of security, while simultaneously enabling the required quick and easy access for developers.

A set of security risks should be considered with containerization:

■ Basic container technology doesn't easily deal with interservice authentication, network configurations, partitions, and other concerns regarding network security when calling internal components inside a microservice application.

■ Using publicly available container templates packaged by untrusted or unknown third parties is risky. Vulnerabilities can be intentionally or unintentionally added to this type of container.

Traditional security approaches should be complemented with continuously enhancing strategies to keep pace with today's dynamic IT environment. A key point here is that a wide choice of tools and orchestration platforms continues to evolve. They offer certified, proven templates, help to secure containers and ease the configuration process.

The IT market now offers a wide choice of solutions for container orchestration, making adoption easier, but skilled hands are required so the benefits can be fully leveraged and unexpected consequences avoided.

Ruslan Synytsky is CEO and Co-Founder of Jelastic

The Latest

July 17, 2018

In my first blog in this series, I highlighted some of the main challenges teams face with trying to scale mainframe DevOps. To get past these hurdles, the key is to develop an incremental approach that enables teams to capture value along each step of the journey ...

July 16, 2018

The key to mainframe DevOps success is in quickly identifying and removing major bottlenecks in the application delivery lifecycle. Major challenges include collaboration between mainframe and distributed teams, lack of visibility into the impact of software changes, and limited resource flexibility with scaling out necessary testing initiatives. Now let's take a closer look at some of these key challenges and how IT departments can address them ...

July 11, 2018

How much are organizations investing in the shift to cloud native, how much is it getting them? ...

July 10, 2018

In the shift to cloud native, many organizations have adopted a configuration-as-code approach. This helps drive up application deployment velocity by letting developers and DevOps teams reconfigure their deployments as their needs arise. Other organizations, particularly the more regulated ones, still have security people owning these tools, but that creates increased pressure on the security organization to keep up. How much are organizations investing in this process, and how much is it getting them? ...

June 28, 2018

More than a third of companies that use serverless functions are not employing any application security best practices and are not using any tools or standard security methodologies to secure them, according to the State of Serverless Security survey, conducted by PureSec ...

June 27, 2018

The popularity of social media platforms and applications is spurring enterprises to adopt "social business" models to better engage with employees and customers and improve collaboration, according to a new study published by ISG ...

June 25, 2018

The previous chapter in this WhiteHat Security series discussed Codebase as the first step of the Twelve-Factor App and defined a security best practice approach for ensuring a secure source control system. Considering the importance of applying security in a modern DevOps world, this next chapter examines the security component of step two of the Twelve-Factor methodology. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

June 21, 2018

DevSecOps is quickly gaining support and traction, within and beyond information security teams. In fact, 70% of respondents believe their culture can embrace the change needed to fuse Security and DevOps, according to a new survey of 80 security professionals by Aqua Security ...

June 20, 2018

The larger the company size, the higher the proportion of low IT performers, according to the State of DevOps: Market Segmentation Report from Puppet, based on the 2017 State of DevOps Survey data ...

June 18, 2018

An overwhelming 83 percent of respondents have concerns about deploying traditional firewalls in the cloud, according to Firewalls and the Cloud, a survey conducted by Barracuda Networks...

Share this