The need to protect Kubernetes in cloud infrastructure.

With the mass adoption of container technologies, none is more significant than Kubernetes, the de facto standard cluster and workload management system for public cloud and on-premises environments.

The long-running Flexera 2022 State of the Cloud survey tracking cloud adoption and usage found that almost three-quarters of enterprises are currently using or planning to use Kubernetes, with comparable adoption rates across on-premises and managed cloud Kubernetes services.

Kubernetes services from the public cloud providers continue to gain traction with customers, and their usage has now surpassed the leading on-premises tools. Enterprises are using or planning to use cloud provider-specific tools this year from Amazon Web Services followed closely by Azure Kubernetes Service (AKS), with Google Kubernetes Engine (GKE) gaining, as well. Kubernetes (the open source distribution) and Docker remain near the top of the list, but their usage continues to diminish, especially amongst larger enterprises in favor of the cloud provider services, although hybrid cloud and on-premises environments are often used.

Kubernetes cloud services leave data and security exposures

Kubernetes cloud services are popular since they mitigate, but do not eliminate, the difficulties of operating a Kubernetes environment. Early Kubernetes adopters often confuse its inherent high-availability features and programmatic configuration interfaces as a suitable substitute for traditional backup and disaster recovery (DR) capabilities. Their faulty reasoning conflates the ability to automatically restart and replace cluster nodes and automate cluster configuration and deployment with the ability to reliably restore containerized applications and their data. While these features are invaluable for the scale-out stateless web applications for which Kubernetes was designed, they do not cover the needs of stateful enterprise applications.

The strengths of Kubernetes — self-healing nodes, automated workload deployment and rollback, auto-scaling, and load balancing — reflect its initial design parameters for stateless web services. In contrast, its weaknesses — lack of inherent data backup and DR capabilities and a multi-layer operational model for security and configuration management — require supplementary tools to make Kubernetes a robust enterprise platform.

Why data protection for Kubernetes is needed

Data protection has not always been a concern for containers as early adopters were usually stateless web applications or lift-and-shift applications, with storage outside the container environment on systems that are already running backup software. However, Kubernetes applications using persistent storage are becoming the norm as enterprises deploy production workloads, not just for application development and testing.

There are several reasons why data protection — which includes backups and storage snapshots — should be integral to the production Kubernetes application environment. These reasons or use cases include:

• Human or programmatic error that can accidentally overwrite application or configuration files.

• Security breaches and ransomware that maliciously deletes or encrypts data.

• Disasters causing large-scale outages to a facility that make it impossible to reconstitute a Kubernetes application at another location without offsite copies of the image, configuration, and application files.

• Application and environment migrations that require the same access to archived application and configuration data as a DR recovery.

• Regulatory compliance often requires the periodic and immutable capture of application data. These data backups should support retention locks to make them immutable to support retention requirements.

Why a cloud-based data protection service

Having cloud-based data protection and disaster recovery service is critical since it aligns with the growing number of cloud-based managed Kubernetes services like Amazon Elastic Kubernetes Service (EKS), AKS, and GKE. As pointed out above, between 60 and 70 percent of enterprises use or plan to use one or more of the cloud container services, for the same reason that SaaS and other managed cloud services are increasingly popular.

Since Kubernetes does not include native data protection features, organizations migrating virtualized workloads or creating new, microservices-based stateful applications must incorporate data protection and security into their Kubernetes architecture. An effective data protection service should have several properties:

• Be infrastructure and service agnostic and able to work with both on-premises software or cloud-managed services.

• Support the latest Kubernetes distributions and the Kubernetes container storage interface (CSI).

• Expose APIs that enable task automation for continuous integration and continuous delivery or CI/CD and integrate with existing infrastructure management systems.

• Enable data migration across different Kubernetes cloud and on-premises environments.

• Be proactive in detecting and alerting of suspicious activity and potential data compromise.

Why a purpose-built cloud data protection service?

The data protection tools provided by the cloud services tools do not capture all of an application’s state or information from dependent resources like databases, and they do not work across on-premises and their competitors’ environments. The open source backup tools like Velero are not designed for multi-cloud operations and require a significant amount of manual configuration to accommodate multi-cloud clusters and data restorations. Although tools like Velero are an adequate solution for one cluster, once a Kubernetes environment spreads to multiple clusters, it is almost impossible to manage. Add in multiple cloud platforms and the complexity becomes untenable.

The existing Kubernetes services and management software and services treat data protection as a separate problem despite it being a necessary part of a cloud-native enterprise architecture. Further, enterprise Kubernetes applications may have data and code-as-infrastructure dependencies that are external to the Kubernetes environment. And because of the growing use of hybrid and multi-cloud environments, a purpose-built data protection product is needed that is cloud- and Kubernetes management platform-agnostic supports multi-cloud and multi-region data storage, supports CI/CD methodologies, and enables data migration across environments.

How smart labels are transforming supply chains

Sharath Muddaiah • 27th January 2025

As e-commerce continues to rise globally, the impact of just-in-time manufacturing and rising consumer expectations mean the need for real-time visibility has never been greater. Smart labels directly address this demand, offering solutions to long-standing challenges like shipment delays, theft, and the lack of traceability. With the smart label market projected to grow from $14.1...

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...