Hardware Virtualization for Securing Containers

In the previous chapter, we looked at how to create a highly available MicroK8s Kubernetes cluster using the stacked cluster high-availability (HA) topology. We have used the three nodes to install and configure MicroK8s on each of them, as well as simulating node failure to see whether the cluster could withstand component failures and still work normally. We’ve also gone over some best practices for deploying Kubernetes applications on a production-ready cluster. We noticed that MicroK8s’ HA option has also been streamlined and is now activated by default.

Container technologies have dominated the industry in recent years and have become the de facto standard for building modern IT infrastructure. ...

Get IoT Edge Computing with MicroK8s now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.