Principal Infrastructure Engineer at a logistics company with 10,001+ employees
Real User
Top 5
2023-06-27T10:02:59Z
Jun 27, 2023
Basically, the solution is integrated OpenShift. Whenever we are installing OpenShift, everything will be using the orchestration of the deployment ports and will be taken care of by the underlying Kubernetes. It can be applied inside OpenShift.
For use cases, the segmentation use case is the most requested by our customers. Also, monitoring the container's behavior is one of the aspects customers request when it comes to segmentation. The other use case would be monitoring and detecting any abnormal behavior.
Owner/Full Stack Software Engineer at Maraphonic, Inc.
Real User
Top 5
2022-05-11T03:15:34Z
May 11, 2022
For the first step, you create the cluster the same way you specify the hardware underneath. On the cluster, you starting creating projects, which are like virtual spaces. There is a physical cluster where you install Kubernetes. You install it on the data center. Each team creates their own virtual space.
Container Security solutions safeguard containerized applications from threats throughout their lifecycle, covering image scanning, runtime protection, compliance assurance, access control, and integration with CI/CD pipelines.
Red Hat can be utilized for anything, including OpenShift, Kubernetes, dev environments, automation, banking, and many IT industries.
Our use cases are for container monitoring and scanning.
Basically, the solution is integrated OpenShift. Whenever we are installing OpenShift, everything will be using the orchestration of the deployment ports and will be taken care of by the underlying Kubernetes. It can be applied inside OpenShift.
We use the solution to move workloads from monolithic applications to containers.
For use cases, the segmentation use case is the most requested by our customers. Also, monitoring the container's behavior is one of the aspects customers request when it comes to segmentation. The other use case would be monitoring and detecting any abnormal behavior.
For the first step, you create the cluster the same way you specify the hardware underneath. On the cluster, you starting creating projects, which are like virtual spaces. There is a physical cluster where you install Kubernetes. You install it on the data center. Each team creates their own virtual space.