Estrategia de fortalecimiento para la utilización de kubernetes en el sector privado de la provincia de los ríos

The extreme adoption rate of container technologies, coupled with heightened security concerns, has led to the development of multiple alternative technology runtimes that target security through additional layers of indirection. In a basic apples-to-apples comparison, it manages to deploy three run...

Full description

Saved in:
Bibliographic Details
Main Author: Sellan Reyes, Diana Paulina (author)
Format: bachelorThesis
Published: 2022
Subjects:
Online Access:http://dspace.utb.edu.ec/handle/49000/11672
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The extreme adoption rate of container technologies, coupled with heightened security concerns, has led to the development of multiple alternative technology runtimes that target security through additional layers of indirection. In a basic apples-to-apples comparison, it manages to deploy three runtimes on the same Kubernetes cluster, security-focused Kata and gVisor, as well as the default Kubernetes runC runC. In the present investigation, three real applications are evaluated that allow to demonstrate that runC outperforms the safest alternatives up to 5 times faster in information processing, that gVisor implements containers up to 2 times faster than Kata, but that Kata executes containers up to 1.6 times faster than gVisor. Thus research illustrates that alternative and more secure runtimes can be used plug-and-play in Kubernetes, but with a significant performance penalty. For all these reasons, it is considered that the research is a very useful study both for professionals, which allows them to understand the current state of technology to make the correct decision in the selection, operation and/or design of platforms, as well as for academics to illustrate how these technologies evolved over time.