What is managed Kubernetes?

There’s no denying the steep learning curve when getting started with Kubernetes. However, you can get started quick by using a managed Kubernetes service. In this video, I’ll overview the following advantages when using Kubernetes as a Service from your favorite cloud provider:

  • Ease of creating and connecting to a new cluster
  • Streamlined use of open-source projects and connecting familiar cloud services
  • Integrated security every step of the way

Thanks for watching! Be sure to drop a comment on the video if you have any questions or feedback.

Learn more about Kubernetes and containers

Video Transcript

What is managed Kubernetes?

Hi everyone, my name is Sai Vennam with the IBM Cloud team. Today, we want to talk about managed Kubernetes.

Kubernetes is an open source platform allowing you to run your containerized workloads. Managed Kubernetes, on the other hand, is a service provided by cloud providers and comes with a number of advantages. 

Managed Kubernetes, on the other hand, is a service provided by cloud providers and comes with a number of advantages.

Advantages of using a managed Kubernetes service

For one, it’s very easy to spin up new Kubernetes clusters from scratch and add additional compute power in response to load. In addition, allows you to integrate with cutting edge open source capabilities, as well as familiar cloud provider services. Finally, you get peace of mind with security across the board.

Spinning up a Kubernetes cluster on IBM Cloud Kubernetes Service

Let’s go to an example of spinning up a Kubernetes cluster on IBM Cloud Kubernetes Service. First, we’ll choose the name for the cluster as well as the region that we want to spin it up in.

We can drill in deeper and choose the exact data center that we want our cluster to live in. In addition, we can also choose a multi-zone cluster. This allows us to spread our Kubernetes cluster across multiple data centers in the same region. This gives us high availability if anything went wrong with one of the data centers.

Next, we can choose the flavor for the compute power for this Kubernetes cluster. We can stick virtual compute or even bare metal.

Bare metal allows you to get dedicated access to the entire machine, allowing you to avoid that noisy neighbor issue.

Next, you can even define GPUs for your compute power in case you had something like machine learning or image or video processing—they can take advantage of GPUs.

Finally, scrolling down to the bottom, we can choose a number of worker nodes that we want to spin up and go ahead and create that cluster.

In a few minutes, your Kubernetes cluster will be provisioned and ready to use.

Kubernetes, open source, and the Cloud Native Computing Foundation

Kubernetes is an open source platform and is a part of the Cloud Native Computing Foundation.

To ensure portability of your workloads across any Kubernetes service provider, the CNCF provides conformance testing. This enables you to avoid vendor lock-in and even allows you to do multicloud deployments of your Kubernetes-based applications.

Managed Istio and Knative on IBM Cloud Kubernetes Service

Here at IBM, we’re strong proponents of open standards, as well as projects in the open source community. These include those in the CNCF, as well as projects like Istio and Knative. In fact, you can try managed Istio and managed Knative today on IBM Cloud Kubernetes Service.

Outside of those managed offerings, we also offer tutorials and documentation to integrate with cutting edge open source capabilities, as well as IBM tooling and offerings.

IBM Cloud Kubernetes Service and security

Finally, let’s talk about security. Security is something that should be integrated into every stage of your DevOps workflow. With IBM Cloud Kubernetes Service, we’ll make sure you’re protected every step of the way.

First, we have trusted private registries that scan your images for any vulnerabilities.

Second, we will make sure that those images are scanned as they’re being placed into a Kubernetes cluster.

Behind the scenes, we’re always making sure that any vulnerabilities in the technology stack that powers your cluster are caught right away.

More from Cloud

Clients can strengthen defenses for their data with IBM Storage Defender, now generally available

2 min read - We are excited to inform our clients and partners that IBM Storage Defender, part of our IBM Storage for Data Resilience portfolio, is now generally available. Enterprise clients worldwide continue to grapple with a threat landscape that is constantly evolving. Bad actors are moving faster than ever and are causing more lasting damage to data. According to an IBM report, cyberattacks like ransomware that used to take months to fully deploy can now take as little as four days. Cybercriminals…

2 min read

Integrating data center support: Lower costs and decrease downtime with your support strategy

3 min read - As organizations and their data centers embrace hybrid cloud deployments, they have a rapidly growing number of vendors and workloads in their IT environments. The proliferation of these vendors leads to numerous issues and challenges that overburden IT staff, impede clients’ core business innovations and development, and complicate the support and operation of these environments.  Couple that with the CIO’s priorities to improve IT environment availability, security and privacy posture, performance, and the TCO, and you now have a challenge…

3 min read

Using advanced scan settings in the IBM Cloud Security and Compliance Center

5 min read - Customers and users want the ability to schedule scans at the timing of their choice and receive alerts when issues arise, and we’re happy to make a few announcements in this area today: Scan frequency: Until recently, the IBM Cloud® Security and Compliance Center would scan resources every 24 hours, by default, on all of the attachments in an account. With this release, users can continue to run daily scans—which is the recommended option—but they also have the option for…

5 min read

Modernizing child support enforcement with IBM and AWS

7 min read - With 68% of child support enforcement (CSE) systems aging, most state agencies are currently modernizing them or preparing to modernize. More than 20% of families and children are supported by these systems, and with the current constituents of these systems becoming more consumer technology-centric, the use of antiquated technology systems is archaic and unsustainable. At this point, families expect state agencies to have a modern, efficient child support system. The following are some factors driving these states to pursue modernization:…

7 min read