Container virtualization is not a new invention; in fact, it wasn’t that even 10 years ago when Docker made it socially acceptable on Linux. Much to the chagrin of many administrators, there is still have a long way to go to achieve everything positive claimed by the container vendors. Many system administrators dealing with containers for the first time give up in frustration: It seems you have to learn a new language to find your way around the dictionary of container terms, and each platform has individual concepts that need to be understood. No matter how you spin it, not much is left of the once loudly trumpeted promise of easy container handling on Linux.
That complexity doesn’t have to be the case, claims Portainer, which provides administrators a tool that, according to the manufacturer, keeps them more or less blissfully unaware of the entire container circus. With a simple web-based interface, you tell Portainer which containers to roll out and in what state. According to the advertising material, the program then takes care of the rest autonomously, supporting a variety of solutions from plain vanilla Docker to a deployment with Kubernetes. Support for readymade Kubernetes distributions from the major hyperscalers is explicitly part of the package, which means you no longer have to deal with Kubernetes itself in detail.
These claims are reason enough to take a closer look under the Portainer hood: Is it really the panacea for administrators who need to deliver containers quickly? What are the differences between the available Portainer editions? How easy is the setup? How much does this fun cost? How quickly does it deliver results?
The Basics
Diese Geschichte stammt aus der ADMIN #74: Software-Defined Networking-Ausgabe von ADMIN Network & Security.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent ? Anmelden
Diese Geschichte stammt aus der ADMIN #74: Software-Defined Networking-Ausgabe von ADMIN Network & Security.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent? Anmelden
Manage projects in SMEs with OpenProject Best-Laid Plans
OpenProject supplies sensible, comprehensive project management for SMEs with few financial inputs.
Synchronize passwords in KeePass Digital Safe
Usernames and passwords play an important role in security. In this article, we show you how to set up the KeePass password manager and keep it synchronized across multiple devices.
Test mechanisms for best practices in cloud design Best Clouds
Develop resilient and efficient cloud infrastructures for enterprise applications with the AWS Well-Architected Framework. We show you how to implement the solutions from the framework in practical terms by providing an introduction to the AWS Well-Architected tool with an example.
Six new security features Windows Server 2022 for Shielded
Configure the Secured-core server components to reduce the attack surface of your system with minimal overhead.
Cooperation with Cyn.in Fast Action
Cyn.in open source groupware focuses on connecting employees quickly and easily. We show you how to set up a Cyn.in environment, exchange knowledge, collaborate on projects, and manage processes. By Holger Reibold
Passkeys eliminate the need for password-based authentication Password Overboard!
Passwords are becoming a thing of the past. We look into the basic weaknesses of passwords, explain what passkeys are all about, and assess their practicality.
Best practices when working with Docker images Shipshape
Whether you are developing containerized applications or running them, observing best practices helps to obtain optimal results.
Monitoring changes in Active Directory with built-in tools Tracking Down Attackers
Monitoring with built-in Windows tools can prevent the worst from happening after an attempted attack.
Discover vulnerabilities with Google Tsunami Before the Wave
Google Tsunami security scanner detects errors that typically signal danger and outputs alerts. We look into how you can get the tool up and running and even write the required plugins yourself.
Containers made simple Fully Automated
The Portainer graphical management interface makes it easy to deploy containers, relieving you of huge amounts of routine work you would normally have to handle with Docker, Podman, or Kubernetes. However, the licensing structure leaves something to be desired.