For research into deep learning algorithms that automatically acquire new skills, OpenAI operates some of the largest Kubernetes clusters worldwide, with up to 36,000 CPU cores. We look at some practical experience with the container management system.
Despite the abundance of tools that test code and help improve the effectiveness of a continuous integration pipeline, automated security testing is much more difficult to get right than it might appear.
Add extra security to your SSH service, securely copy files to and from remote computers, and configure passwordless SSH for automation scripting.
Use Microsoft SQL Server diagnostic tools to troubleshoot bottlenecks and other performance problems.
Even in the best environments, a little housekeeping is necessary.
A natural consequence of software-defined storage and software-defined data centers is the software-defined wide area network, or the Internet connections between locations and cloud services.
VMware's NSX for vSphere platform adds security to microsegmentation, allowing security components to analyze traffic within the hypervisor.
Virtualization solutions isolate their VM systems far more effectively than a container host isolates its guests. However, implementation weaknesses in the hypervisor and configuration errors can lead to residual risk, as we show, using KVM as an example.
Any OpenStack installation that hosts services and VMs for several customers poses a challenge for the security-conscious admin. Hardening the overall system can turn the porous walls into a fortress – but you'll need more than a little mortar.
Although developers appreciate Docker's ease of use and flexibility, many admins are worried about vulnerabilities. We look at various approaches to securing container images and the price to be paid.