The numbers on the adoption of Kubernetes vary from report to report, but there can be no argument that the trust organizations have with Kubernetes is increasing year to year…
News recently broke of a serious security vulnerability found in Windows Containers. This security flaw has been exposed in the wild by a newly discovered malware named ‘Siloscape’. The vulnerability enables…
Introduction In previous blogs, we have introduced Kubernetes and Microservices and discussed its impact on Network Operations. We also looked at the ways services can be published and how Kemp Ingress Controller can be used…
Due to the recent Microsoft Vulnerabilities this post explains how Kemp LoadMaster provides mitigation and protection against such attacks.
Introduction In our previous blogs we explained Kubernetes, the challenges it brings for Network administrators and described the different mechanisms for exposing Kubernetes services for user access. It is clear there are a number of…
Introduction Following on from last weeks Kuberntes introduction, this week we look at the impact of Kubernetes on network Administrators. Lately, there is massive interest in the move to microservice…
Introduction With the recent addition of the Kemp Ingress Controller for Kubernetes (available now in LoadMaster firmware 7.2.53), what better time to look at the role Kubernetes plays in delivering…
Kemp 360Kemp 360Load Balancer
Kemp 360 Vision monitors and detects and alerts changes in your applications’ metrics. Find out how you can become aware of changes before the server fails, preventing any downtime and preserving the application experience of all your Active Directory users.
This blog post details how Kemp 360 Vision enables proactive monitoring of your application experience across a complex network where it builds seamlessly into your daily workload.
The common reasons for SSH vulnerability that you need to know to prevent an attack.
If you have deployed a load balancer you are on the road to full application availability as a result of application redundancy. This is great, but in order to fully…
Introduction In our previous blogs, we introduced Kubernetes, explained the challenges it brings for Network administrators, particularly exposing Kubernetes services for access. We also looked in detail at the Ingress Controller and its functionality in controlling…
Introduction Catch up on last weeks post on the Impact of Kubernetes on Network Administrators here. Container based microservice applications, provide benefits to the development and operation of applications and…
As an Application Delivery Manager, you know how common updates and patches are, especially given the increasing ubiquity of cloud-based applications. This post brings you through the early detection of issues using Kemp 360 vision.
The cost of dealing with DDoS attacks can be high, this post will explain the damage they cause and how you can prevent them.