IBM Launches Bluemix Container Service with Kubernetes
March 20, 2017

IBM announced a new container service on Bluemix, its cloud platform, to fuel the speed and simplicity at which developers can build and manage more secure and cognitive apps.

Available on IBM Cloud, this service uses Kubernetes, an open-source container orchestration system leveraging a Docker engine.

Delivered with a user-centric experience, IBM Bluemix Container Service automatically provisions, updates and monitors the containers that developers use to create apps, helping them to more easily build cognitive innovations which weave in real-time security intelligence.

“Building microservices with containers helps developers to do what they do best – invent – by creating and stitching together different services that work in tandem,” said Jason McGee, IBM Fellow, VP, IBM Cloud. “Our service does this in a simple, straightforward way by using Kubernetes to automate critical parts of an app’s environment, while giving developers the ability to build in cognitive intelligence, blockchain and Internet of Things services.”

Vulnerability Advisor, Bluemix’s tool for scanning and flagging security issues within containers, is a critical component of IBM Bluemix Container Service. With this launch, IBM has added a number of features to provide developers with the ability to build security into the foundation of container-based apps running in Kubernetes clusters.

This includes the ability to continuously monitor each container through an integration with the IBM X-Force Exchange, a threat intelligence sharing platform. This platform provides access to volumes of historical and real-time threat data from across the globe – including instant indicators of potential live attacks. Because this intelligence is funneled directly into the new service, each container used is continuously checked for potential malware, breaches or attack vulnerabilities.

The key capabilities of IBM Bluemix Container Service include:

- Fully-managed and highly available Kubernetes clusters to remove the burden of deploying, scaling and managing containers when building apps.

- Completely native Kubernetes APIs, built on Bluemix, for a seamless environment when working from different cloud infrastructures.

- The choice to store and access data across multiple platforms and repositories, without impacting security.

- Flexible isolation and capacity controls to design a container cluster to fit specific needs and budget constraints of an app.

- Built-in security scanning and integration into IBM’s X-Force Exchange, as well as live-scanning and risk analysis capabilities for each container.

- Automatic load balancing within a container cluster to increase app performance.

- A comprehensive view and analysis of each container cluster’s performance metrics to identify possible efficiencies and improvements.

- An open, standardized platform allowing for easy integration with open technologies and easy portability of outside workloads.

- Rapid access to cloud services such as Watson APIs, blockchain, cloud data services, Internet of Things tools and more.

Since the launch of Kubernetes in 2014, IBM has been a contributor to its development, which was built by the open community. By pairing a Docker-powered engine with the simple management capabilities of Kubernetes, Bluemix developers can access a highly usable interface and dashboard to easily write code within a container and quickly deploy it to multiple apps. This clear view also enables developers to see where and when their code is running at any given point in time.

Now available in beta, Bluemix Container Service expands IBM’s commitment to and leadership in open technologies. As a contributor to both Kubernetes and Docker projects for over three years, IBM has helped to create and mature container technology. Bluemix itself is one of the few major cloud platforms built on a container-native foundation, which has enabled developers to build and ship code with containers since its launch in 2014.

The Latest

December 14, 2017

Around one in five business leaders indicating that their software budget had increased 50 percent or more over the past three years to support digital transformation projects. However, the increased software development investment has not translated to greater security budgets or awareness of the security risks insecure software introduces: only 50 percent of business leaders surveyed understand the risk that vulnerable software poses to their business, according to Securing the Digital Economy, a report from Veracode ...

December 13, 2017

Metrics-oriented thinking is key to continuous improvement – and a core tenant of any agile or DevOps philosophy. Metrics are factual and once agreed upon, these facts are used to drive discussions and methods. They also allow for a collaborative effort to execute decisions that contribute towards business outcomes ...

December 11, 2017

The benefits of DevOps are potentially enormous, but simply identifying the benefits is not enough. A faster time to market may be a good customer story, but with no directly measurable monetary return, the value of DevOps can still be questioned at board level. Businesses want more than promises if they are to sign off on financial decisions: they need to know the Return on Investment (ROI) as well, with facts and figures that demonstrate what they will gain ...

December 07, 2017

Modern businesses are migrating to a cloud-based model for hosting sensitive data to reap the benefits of agility and cost savings as well as to keep pace with customer demand. Cloud-Native methodologies such as DevSecOps, continuous delivery, containers and micro-services are essential building blocks in the digital business revolution. However, moving information and technologies from hardware to software poses a security concern – translating to a top challenge for both IT and the C-level, as applications built on top of micro-services and containers in a Cloud-Native environment utilize a wide variety of secrets for their proper functioning ...

December 06, 2017

There was a time in cybersecurity strategy when most IT leaders considered perimeter and endpoint guards like antivirus and authentication controls to be the sum of network protection. But as attacks continue to increase in frequency and sophistication, leaders and DevOps teams have been focusing on the role of backup and disaster recovery in mounting a strong defense ...

December 04, 2017

In this blog I will summarize and share with you some wisdom about the biggest problem – okay, problems – in the field of software testing right now. While this is not an exhaustive list, these four bad habits have emerged as the predominant themes ...

December 01, 2017

The majority of testers – 63 percent – are responsible for both API and UI testing, according to the State of Testing 2017 Survey conducted by SmartBear Software. With the growth of methodologies like Agile and DevOps, testing teams have been shrinking and the line between roles increasingly blending ...

November 29, 2017

Companies today face a digital dilemma. How can they understand and discern if their approach to transforming their company to meet today's digital consumer is the right one? ...

November 27, 2017

It has been argued that Dev and Ops teams should work more closely together for some time. For many, the benefits of a closer relationship are clear, and the debate has moved on from if to how, but for lots of companies there are several types of walls to tear down ...

Share this