Microsoft Expands Azure Services Portfolio for Containers - Container Journal

2022-06-15 14:24:58 By : Ms. Amanda Xu

At the Microsoft Build 2022 conference, Microsoft today announced that Azure Container Apps, a serverless computing framework based on Kubernetes, is now generally available.

At the same time, Microsoft revealed it has extended Azure Kubernetes Services (AKS) by adding support for an open source Draft 2 tool that provides a revamped Draft Azure command line interface (CLI) in addition to an Azure portal, Visual Studio Code extensions and the ability to generate a GitHub Actions workflow file that can be used to build and deploy applications on any Kubernetes cluster. There is also now a web application routing add-in that exposes web applications deployed on Kubernetes to the internet and an add-in to the Kubernetes-based Event-Driven Autoscaler (KEDA) that makes it easier to scale container applications.

Microsoft CEO Satya Nadella told conference attendees that Azure Container Apps makes it possible to build microservices-based cloud-native applications with no Kubernetes experience required.

Microsoft also announced it has added a landing zone accelerator that provides best practices and automated reference implementations to Azure Arc, a control plane for managing Kubernetes clusters. In addition, a Business Critical service tier for Azure Arc-enabled SQL Managed Instance improves business continuity, adds continuous security to deliver rolling patches and improves overall performance.

Nadella also described how IT teams will be able to take advantage of the artificial intelligence (AI) capabilities of the Microsoft Azure Cloud to infuse cloud-native applications with AI inference capabilities. Those capabilities can be deployed at the network edge to create what Microsoft describes as a hybrid loop to integrate AI models trained in the cloud with inference engines running anywhere.

In general, microservices are now the default approach for building any cloud application, says Nadella. Developers can choose between Azure Container Apps to take advantage of a serverless computing framework built on top of KEDA, the distributed application runtime (Dapr) and Envoy proxy software running on a distribution of Kubernetes hosted on Linux servers. Or, they can opt to rely on the managed AKS service that Microsoft provides to retain more operational control, he says. On either platform, Microsoft is making it clear that most new cloud applications will be based on a microservices architecture.

Microsoft, of course, is hoping that as many of those applications as possible will be built on the Azure cloud. The shift to microservices represents a significant opportunity to regain ground lost to Amazon Web Services in the first era of the cloud. As organizations shift toward replacing legacy approaches based on monolithic architectures, it creates an opportunity for Microsoft to make the case that organizations should switch to Azure.

It’s not clear just how many—or to what degree—developers will employ Azure to build microservices-based applications, but as it becomes simpler to construct them the total number of developers building those types of applications will undoubtedly increase in the months and years ahead. The challenge then becomes how to manage all the dependencies that will inevitably arise as more applications start to share access to microservices across what has become a highly distributed computing environment.

Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld.

Mike Vizard has 1340 posts and counting. See all posts by Mike Vizard

Prometheus was developed in 2012 in response to the growing need for cloud-native monitoring services. Its efficient data store and ease of use have made it the de facto open source metrics monitoring solution. By storing data locally on disk, Prometheus is great for short-term use cases. However, when storing and querying against longer-term (and […] The post Four Signs It’s Time to Level up Prometheus appeared first on DevOps.com. [...]

Site reliability engineering (SRE) is on track to replace IT service management (ITSM) as the optimal approach for ensuring production systems purr. Value stream management (VSM) is emerging as the best way to accelerate the flow of outcomes that enhance customer experience. Together, they eliminate waste and toil and automate processes for greater visibility, control […] The post The New ITOps: Combining SRE and VSM to Power Production appeared first on DevOps.com. [...]

In this panel discussion moderated by the hosts of Techstrong TV, we’ll get answers to that question from a variety of perspectives, including quality champions who have risen through the ranks to drive positive change and DevOps leaders who have experienced the profound impact of a quality-centric approach firsthand. The post Creating Positive Digital Experiences Through Testing appeared first on DevOps.com. [...]

IT innovation is happening at a record pace. With today’s complexities, you need deep insights into your IT environment—more than traditional monitoring tools can provide.  Enter modern observability, a critical application. Observability moves beyond monitoring to help teams understand what is actually happening in the system by bringing together and correlating information from all layers […] The post Research Report: Observability at the Speed of Innovation 2022 appeared first on DevOps.com. [...]

This webinar will teach you how to make Argo more effective by applying intelligent automation to deployment verifications. This can further enhance software delivery practices when combined with advanced deployment strategies such as blue-green, canary and progressive deployments with Argo Rollouts. This session will highlight how you can leverage intelligent automation to perform reliable risk […] The post Automating Deployment Verifications for Kubernetes Applications appeared first on DevOps.com. [...]

During this livestream, cybersecurity expert and president and CEO at BetterCyber Luciana Obregon will break down how you can lower RTO and RPO and create a reliable data recovery workflow. Modern backup data infrastructure must be immutable, isolated (air-gapped), scanned for and cleansed of malware and must be directly mounted (instant recovery). The post Finding the Ransomware Threat INSIDE Your Backups appeared first on Security Boulevard. [...]

Cybersecurity resilience is a priority for enterprises that have ramped up digital transformation and distributed workforces in the past few years. However, differences of opinion about the urgency of application security solutions can be detrimental to enterprises. According to the latest World Economic Forum research, “While 92% of business executives agree that cybersecurity resilience is.. The post Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines appeared first on Security Boulevard. [...]

Join the CISO Talk Master Class live conversation. Part 6 brings all the elements into a cohesive, integrated strategy: continuous security strategy, leveraging frameworks, effective response strategies, growing next-gen security experts and communications that win and combat confusion. Join hosts Mitch Ashley and Mat Newfield and an elite panel of cybersecurity experts as they bring.. The post CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together appeared first on Security Boulevard. [...]

When artificial intelligence (AI) first arrived on the cybersecurity scene, there was understandably a lot of skepticism. Grandiose claims about the ability of AI platforms to eliminate the need for security analysts have given way to more rational assertions that focus on the role machine learning algorithms will play in augmenting the skills—and easing the.. The post AI and ML in Security appeared first on Security Boulevard. [...]

Even if you have a secure, compliant, correctly configured and continuously monitored cloud infrastructure, there are still major risks associated with your cloud-deployed apps. Secure cloud infrastructure does not mean secure applications, and solutions like cloud security posture management (CSPM) do not go deep enough into the application layer to ensure you are secure. There.. The post Why Cloud-Native Applications and APIs Are at Risk appeared first on Security Boulevard. [...]