March 31, 2019 By jason-mcalpin < 1 min read

All traffic between the worker nodes and the master can now be completely enabled on the private network.

The private service endpoint is now generally available to enable all traffic between the worker nodes and the master to be on the private network, without the need for a gateway appliance device. In addition to this increased security, inbound and outbound traffic on the private network is unlimited and not charged. Optionally, you can still keep a public service endpoint for secure access to your Kubernetes master over the internet. Users can choose if the worker nodes and master nodes are accessible via public VLAN, private VLAN, or both, providing complete control and isolation to their Kubernetes clusters. The IBM Cloud Container Registry also supports private service endpoints and clusters will automatically download images over the private network.

Learn more:

Blog: Introducing Private Service Endpoints in IBM Cloud Kubernetes Service

More from Announcements

Enabling customers to streamline document management with IBM watsonx.ai

2 min read - At Accusoft, our mission is to help organizations solve their most complex content workflow challenges by helping them adopt content processing, conversion and automation solutions. We accomplish this through our flagship product, PrizmDoc, which enables developers to enhance their applications with in-browser document viewing and collaboration functionality.  Over the past several years, we’ve been closely monitoring the evolving role of artificial intelligence (AI) in delivering cutting-edge solutions to our customers. Unlike many competitors who hastily incorporate AI  to check a…

Success and recognition of IBM offerings in G2 Summer Reports  

2 min read - IBM offerings were featured in over 1,365 unique G2 reports, earning over 230 Leader badges across various categories.   This recognition is important to showcase our leading products and also to provide the unbiased validation our buyers seek. According to the 2024 G2 Software Buyer Behavior Report, “When researching software, buyers are most likely to trust information from people with similar roles and challenges, and they value transparency above other factors.”  With over 90 million visitors each year and hosting more than 2.6…

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters