Monday, March 20, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

Kubernetes is the key to cloud, but cost containment is critical

Researcher by Researcher
March 15, 2023
in Networking
0
Kubernetes is the key to cloud, but cost containment is critical
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


What’s driving the growth of open source container orchestrator Kubernetes? A study by Pepperdata shows how companies are using K8s and the challenges they face in getting a handle on cloud costs.

The Kubernetes wheel.
Image: LuckyStep/Adobe Stock

With the rush to cloud enterprise comes increasing use of Kubernetes to get applications up and running on the web. A recent study by big data monitoring firm Pepperdata looked at both the growth of Kubernetes use and how companies are addressing it from cost and revenue fronts.

Pepperdata’s The state of Kubernetes 2023 report found that, on average, organizations deploy between three and 10 Kubernetes clusters. It also revealed that the use of the open-source container orchestration system is expanding to data ingestion, cleansing, and analytics, databases, and artificial intelligence and machine learning.

Related articles

Azure Monitor’s Change Analysis helps you troubleshoot problems quickly

Azure Monitor’s Change Analysis helps you troubleshoot problems quickly

March 18, 2023
New Hiatus malware campaign targets routers

New Hiatus malware campaign targets routers

March 14, 2023

SEE: Hiring Kit: Cloud Engineer (TechRepublic Premium)

Pepperdata, in its survey of 800 C-level execs and DevOps professionals working in financial services, healthcare, technology and advertising, asked:

  • How many K8s clusters organizations run.
  • Which workload types do they deploy on K8s containers.
  • Challenges encountered by enterprises as they adopt Kubernetes.
  • How enterprises measure the ROI of their K8s deployments.
  • Where companies stand in their FinOps journey.

Jump to:

Kubernetes: Deployment beyond microservices is driving broader use

As Kubernetes reaches maturity and becomes an industry standard for container orchestration, its uses are also broadening beyond its core application as a mothership for microservices. The study found that:

  • 30% of executives reported having three to five K8s deployments.
  • 38% reported six to 10 clusters.
  • Almost 15% said they had between 11 and 25 clusters.
  • 4% reported having deployed more than 25 clusters.

In terms of how enterprises are deploying Kubernetes for specific workloads, Pepperdata found:

  • 61% of surveyed companies are using Kubernetes to deploy data ingestion, cleansing, and analytics through software like Apache Spark.
  • 59% are using Kubernetes for deploying databases or data cache via platforms like PostgreSQL, MongoDB and Redis.
  • 58% reported using Kubernetes on web servers like NGINX.
  • 54% said they are deploying AI/ML software, such as Python, TensorFlow and PyTorch on Kubernetes.
  • 48% said they are using Kubernetes for programming languages like Node.js and Java.
  • 42% reported using Kubernetes for logging and monitoring through programs like Elastic and Splunk.
  • 35% said they are deploying application servers with Kubernetes.

Microservices are still a good proxy for Kubernetes deployment

Cloud: Must-read coverage

Pepperdata’s study suggests that organizations will be adopting Kubernetes in greater numbers, given their plans to deploy microservices like NGINX. Forty-four percent of respondents said they plan to do so this year, while 36% said they have microservices deployed already and only 20% saying they had no plans to do so.

Also, the majority of those polled said Kubernetes provides them a strong foundational architecture for microservices, and that it enables applications to be deployed more rapidly and supports platform consistency across development, testing, staging and production clusters.

Looking at Kubernetes with an eye on ROI

Pepperdata discovered that among those polled, cost to deploy was the leading metric for measuring Kubernetes’ ROI, with findings suggesting that almost 44% of the organizations are looking at ways to implement cloud cost reduction.

After cost, top-line growth (54%), resource usage (49%), followed by deployment frequency (48%), developer productivity (46%), infrastructure utilization (35%) and IT staff productivity savings (25%) were key ROI metrics. Firms reported they expect Kubernetes to increase ROI by lowering administration and operations burden, accelerating deployment times and making resource management more efficient.

Cost surprises are a key challenge for K8s

When Pepperdata surveyed IT leaders about the challenges they faced in adopting Kubernetes:

  • 57% said significant or unexpected spending on computation, storage networking infrastructures and cloud-based IaaS.
  • 56% cited the learning curve for employees to be able to upskill for operations and security in Kubernetes environments.
  • 52% pointed to limited support for stateful apps (such as applications that save client data).
  • 50% said lack of visibility into Kubernetes’ spending.

Organizations are walking toward cloud cost reduction

In its FinOps performance study, the FinOps Foundation among other things defines the levels of familiarity with FinOps from crawl to walk to run. In Pepperdata’s study, most respondents self-identified at the walk stage.

The study said that nearly all respondents were familiar with cloud cost optimization, while 32% characterized themselves as “crawling.” The majority (43%) said they are “walking,” meaning they have the ability to implement cloud cost reduction recommendations today. Seventeen percent self-reported as “running,” meaning they are actively reducing costs through autonomous procedures. Six percent said they have not started.

Interestingly, more than 98% of respondents indicated familiarity with FinOps and saw themselves somewhere on the continuum of implementing best practices for cloud cost remediation. In addition, more than 17% of respondents identified themselves in the run stage, with the ability to remediate cloud costs autonomously.



Source link

Tags: cloudcontainmentcostcriticalKeyKubernetes
Share76Tweet47

Related Posts

Azure Monitor’s Change Analysis helps you troubleshoot problems quickly

Azure Monitor’s Change Analysis helps you troubleshoot problems quickly

March 18, 2023
0

Azure Monitor's Change Analysis helps you troubleshoot problems quickly. Image: PhotoGranary/Adobe Stock Change management is key to running a mature...

New Hiatus malware campaign targets routers

New Hiatus malware campaign targets routers

March 14, 2023
0

A new malware dubbed HiatusRAT infects routers to spy on its targets, mostly in Europe and in the U.S. Learn...

EU network providers push Big Tech to help pay for infrastructure

EU network providers push Big Tech to help pay for infrastructure

March 14, 2023
0

Telecom and EU representatives at MWC 2023 increased pressure on American Big Tech companies to help with future-proofing expenses. Image:...

IBM and Nokia announce plans for a private 5G service at MWC 2023

IBM and Nokia announce plans for a private 5G service at MWC 2023

March 9, 2023
0

Communications service providers will be able to operate and observe private 5G environments in a unified management stack. Image: sutadimages/Adobe...

LastPass releases new security incident disclosure and recommendations

LastPass releases new security incident disclosure and recommendations

March 5, 2023
0

Image: Tada Images/Adobe Stock LastPass was hacked twice last year by the same actor; one incident was reported in late...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023
What’s the Best Way to Sack People?

What’s the Best Way to Sack People?

March 20, 2023
Biden administration sees dangers in cloud, but users must protect perimeters

Biden administration sees dangers in cloud, but users must protect perimeters

March 19, 2023

Recent Posts

undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023
What’s the Best Way to Sack People?

What’s the Best Way to Sack People?

March 20, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved