Changes between Version 8 and Version 9 of K8sFutures2019


Ignore:
Timestamp:
Feb 6, 2019, 4:36:53 PM (5 years ago)
Author:
darkblueb
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • K8sFutures2019

    v8 v9  
    4343
    4444
     45**Container Technology Details**
     46
     47A spirited and deeply technical presentation was given by senior RedHat engineer Dan Walsh [1]. The featured twitter channel was **#nobigfatdaemons**.  A tour of Github / containers [2] related material included skopeo, image, podman, storage, CRI-O, conmon, and buildah. A core concept of the presentation was that containers need not be monoliths, and that building containers should be a flexible process with a choice of toolchains. There is a preference from a security perspective of making containers that can run read-only, with any storage needs specifically built with finite (traceable) bounds. Eliminating the "base-image" concept is worthwhile. A useful idea in the presentation was that the execution of containers can be for different purposes, with different security obligations for each of:  building;  run to experiment and explore; run in production.  A demonstration of alternative runtimes for containers was shown, emphasizing the Docker container definition, but flexibly reducing the privileges required for any given container to run.
     48
     49Many other topics and technology chains were presented during the course of the day. Without listing exhaustively, it could be said that there are numerous, relevant technology projects over the years from RedHat and others, but that evolution and market-forces are causing each to re-justify itself with respect to K8s and Docker in this presentation.  Intel Corporation was a sponsor of this event, and occasional references to Intel were uniformly positive and without critical or controversial content.
     50
     51Some threat-models were discussed in light of container orchestration, and specific workflow recommendations were offered, many of which look quite similar to secure network models of past years, but with containers and K8s specific details added. There is no question that container models with networked workflows, can be executed with greater resource efficiency and other desirable properties in a cloud platform execution environment. 
     52
     53Many participants in the audience were not English language native speakers. There is global interest in these architectures. International FOSS organizations like **OSGeo** can also benefit from a good understanding of emerging standards and practices, while at the same time supporting core FOSS values and independence, on several levels.
     54
     55Thanks to RedHat and Intel for sponsoring this informative event.
     56
     57 
    4558
    4659[0] https://en.wikipedia.org/wiki/Kubernetes
     60[1] https://people.redhat.com/dwalsh/
     61[2] https://github.com/containers
    4762
    4863