Amazon EKS Anywhere, is a new deployment option for Amazon EKS that enables customers and operators to run open-source Kubernetes clusters on-premises.
Vamsi Chemitiganti
-
-
While the concept is straightforward, Horizontal pod autoscaling requires time and effort to implement. More often than not, applications need to undergo load testing to tune HPA configuration to determine the best scaling and capacity management settings.
-
While the concept is straightforward, Horizontal pod autoscaling requires time and effort to implement. More often than not, applications need to undergo load testing to tune HPA configuration to determine the best scaling and capacity management settings.
-
Cluster autoscaling is typically the easiest autoscaler to configure and to use. However there may be situations where it may not be the best option for an application.
-
This post discusses how to overcome the first limitation of K8s from a 5G standpoint – enabling pods to assume multiple network interfaces.Â
-
To break this out into numbers, a typical CSP will deploy hundreds of thousands of network services as virtual network functions (VNFs) or CNFs. VNFs will run in virtual machines that can optionally be run inside a Kubernetes distribution.
-
Automakers, OEMs and ISVs are now realizing that cars are moving to a cloud native future. While 5G promises huge advances in business models, monetizing car data means investing in connectivity and software applications.
-
So far we have discussed 3GPP standards for 5G NR (New Radio) https://www.vamsitalkstech.com/5g/5g-new-radio-nr-platform-architecture/Â and 5GC (Core)Â https://www.vamsitalkstech.com/5g/5g-core-5gc-platform-architecture/ architecture. While all of the 3GPP releases till Release 15 assume that an…
-
The goals of the 3GPP are to standardize core functions in the SBA to be microservice and cloud-native. When the Telco cloud becomes ‘Cloud-Native’ and Stateless
-
This blog discussed the line of separation from a security standpoint when deploying your application to the cloud. The next post in this series will focus on the fundamental aspects of Kubernetes security.