Hardware Virtualization for Securing Containers
In the previous chapter, we looked at how to create a highly available MicroK8s Kubernetes cluster using the stacked cluster high-availability (HA) topology. We have used the three nodes to install and configure MicroK8s on each of them, as well as simulating node failure to see whether the cluster could withstand component failures and still work normally. We’ve also gone over some best practices for deploying Kubernetes applications on a production-ready cluster. We noticed that MicroK8s’ HA option has also been streamlined and is now activated by default.
Container technologies have dominated the industry in recent years and have become the de facto standard for building modern IT infrastructure. They are frequently preferred over standard virtual machines (VMs) due to their lightweight design and bare-metal-like performance. However, security and isolation are two of the most common adoption issues (refer to the recent...