May 21, 2018 By Chris Rosen 2 min read

Effective immediately, IBM Cloud Container Service is renamed to IBM Cloud Kubernetes Service.

Our new name highlights IBM’s strategic investment in Kubernetes within our managed container service, running on IBM Cloud. Also, Kubernetes in our updated name reflects that IBM is a founder of CNCF Conformance Testing.  

As one of the first fully managed and mature Kubernetes offerings in the cloud, IBM Cloud Kubernetes Service has been generally available since May 2017. You can learn more in our docs or landing page. In the meantime, you’ll still see some references to “IBM Cloud Container Service” in user interfaces, documentation, tutorials, patterns, and other collateral. We’ll be working to update those.

New name, same great capabilities

IBM Cloud Kubernetes Service delivers built-in security, isolation, an intuitive user experience, and automated toolchains  to enable rapid delivery of applications, all while leveraging IBM Cloud Services including AI capabilities from Watson. IBM Cloud Kubernetes Service provides native Kubernetes capabilities such as intelligent scheduling, self-healing, horizontal scaling, service discovery and load balancing, automated rollouts and rollbacks, and secret and configuration management. Additionally, IBM is adding capabilities to the IBM Cloud Kubernetes Service including simplified cluster management, ability to design your own cluster, completely native Kubernetes CLI and API, and integrated operational tools or support to bring your own tools to ensure operational consistency with other deployments. Finally you can run your clusters and apps in the specific geographies that are important to you.

Secure to the core

Security is a critical component of IBM Cloud Kubernetes Service. One aspect of security is our cluster isolation. Every Kubernetes cluster is single-tenant and dedicated by default, and we even provide multiple options for worker node compute – shared or dedicated virtual machines and bare metal:

  • The shared model is a standard cloud IaaS, providing a single-tenant virtual machine on multi-tenant hypervisor and hardware, still without any over commitment of those physical resources. 

  • The dedicated compute model is a single-tenant offering including VM, hypervisor, and hardware, providing additional isolation to your workloads.  

  • Announced in March 2018, bare metal worker nodes are available to provide greater isolation and performance for your containerized workloads. Bare metal worker nodes provide support for Trusted Compute, which can verify your worker nodes against tampering.

  • All worker nodes run in your IBM Cloud account ensuring you have full control over the compute, storage, and networks.  

Another aspect of security is handled by Vulnerability Advisor (VA). VA is integrated seamlessly into the IBM Cloud Kubernetes Service, providing not only static image vulnerability scanning but also policy scanning based on ISO 27k, live container scanning, and package security scanning for known malware. The IBM Cloud Container Registry provides image signing, encryption at-rest and in-flight, and image deployment enforcement allowing you to define what can be deployed in your IBM Cloud Kubernetes Service clusters.

For a closer look at the IBM Cloud Kubernetes Service, see our video: “Advantages of Managed Kubernetes”

Discuss with our team

If you have questions or comments, engage our team via Slack by registering here. Join the discussion in the #questions channel on https://ibm-container-service.slack.com.

Learn more about Kubernetes and containers

More from

AI in commerce: Essential use cases for B2B and B2C

9 min read - Four AI in commerce use cases are already transforming the customer journey: modernization and business model expansion; dynamic product experience management (PXM); order intelligence; and payments and security.  By implementing effective solutions for AI in commerce, brands can create seamless, personalized buying experiences that increase customer loyalty, customer engagement, retention and share of wallet across B2B and B2C channels.  Poorly run implementations of traditional or generative AI in commerce—such as models trained on inadequate or inappropriate data—lead to bad experiences…

A new era in BI: Overcoming low adoption to make smart decisions accessible for all

5 min read - Organizations today are both empowered and overwhelmed by data. This paradox lies at the heart of modern business strategy: while there's an unprecedented amount of data available, unlocking actionable insights requires more than access to numbers. The push to enhance productivity, use resources wisely, and boost sustainability through data-driven decision-making is stronger than ever. Yet, the low adoption rates of business intelligence (BI) tools present a significant hurdle. According to Gartner, although the number of employees that use analytics and…

Achieving cloud excellence and efficiency with cloud maturity models

6 min read - Business leaders worldwide are asking their teams the same question: “Are we using the cloud effectively?” This quandary often comes with an accompanying worry: “Are we spending too much money on cloud computing?” Given the statistics—82% of surveyed respondents in a 2023 Statista study cited managing cloud spend as a significant challenge—it’s a legitimate concern. Concerns around security, governance and lack of resources and expertise also top the list of respondents’ concerns. Cloud maturity models are a useful tool for…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters