Reach Us

Secured Scaling of Kubernetes Cluster

ABOUT THE CLIENT

The essence of digital farming lies in creating value from data. Digital Farming means to go beyond the mere presence and availability of data and create actionable intelligence and meaningful added value from such data. This client which is based out of Europe is a global leader in the field of Digital Farming. This client had a huge infrastructure which had a combination of legacy and modern applications. The main point of concern for them was to #secure the cluster, with regard to #scaling procedures in order to avoid the excessive traffic which is associated with the solution on the utilization of CPU and the memory. The other thing to be looked into was to ensure the reduction of latency as the teams were spread across various geographical locations.

THE SOLUTION

CloudifyOps analyzed the application of the customer and gave them solutions on how to host the landscape and to successfully migrate their applications to the cloud. The client had further asked CloudifyOps to manage their cloud infrastructure such that their day- to -day challenges are overcome. The other solution provided by CloudifyOps were:

  • Initiating cluster-autoscaler for kubernetes cluster so that the cluster is working without breaking down
  • Implementation of KubeBench for checking Kubernetes configuration against the CIS Benchmark for K8s.
  • Handling of spot instances to be allowed in order to reduce the cost of k8s setup.

BENEFITS DELIVERED

  • With the incorporation of cluster autoscaler, it was ensured that the entire cluster never goes down due to insufficient memory to handle pods. Along with the help of an autoscaler we made sure that sufficient space is provided in order for its optimal running.
  • Due to enabling the cluster to handle spot instances we got the cost of cluster operations reduced upto 60%.
  • The combination of adding a layer of security to your cluster along with user authentication, permissions and secure data made kube-bench the most valuable in the identification of vulnerable configurations.
Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from - Youtube
Vimeo
Consent to display content from - Vimeo
Google Maps
Consent to display content from - Google
Spotify
Consent to display content from - Spotify
Sound Cloud
Consent to display content from - Sound
Contact Us