SDxCentral
Join Log In
SD-WAN 5G Edge 1 IoT SDN NFV Containers Cloud Security AI Data Center Storage APM/NPM Open Source

Log In to SDxCentral

Log in with your email? Forgot your password?
  • Newsletters
  • eBriefs
  • Podcasts
  • Webinars
  • Videos
  • Directory
  • White Papers
  • Resources
  • Use Cases
  • Support

Join SDxCentral and get information tailored to your particular interests everyday.

Join
Sponsored:
Dell EMC Citrix Riverbed

Monitoring > Monitoring Definitions > Understanding the Kubernetes Monitoring Process

Understanding the Kubernetes Monitoring Process

Kubernetes is a container orchestration product that’s surging in popularity because of the way it simplifies container deployment. The benefits of Kubernetes include auto-scaling abilities, load balancing, remote storage, and its known and stable API.

Kubernetes is an open source container orchestrator, which was started initially by Google but is now hosted by the Cloud Native Computing Foundation (CNCF). Kubernetes delivers container orchestration across several physical and virtual environments, such as computers or the cloud. Kubernetes deploys abstraction at the pod and service levels.

The simplification of container deployment through Kubernetes, however, increases the complexity of performance management. Performance management delivers insight into computing performance and any roadblocks interrupting that performance for end users. It’s a crucial toolset for enterprises to have in place. Enterprises typically use more than ten performance management tools to keep a pulse on their services. The most common of performance management tools include application performance management (APM), network performance management (NPM), and unified performance management (UPM), which is a converged solution of APM and NPM.

Kubernetes Monitoring

Source: Kubernetes

The Intricacy of Kubernetes Monitoring

It’s common to monitor both the host and its applications. When it comes to Kubernetes monitoring, there are two additional items that need visibility: the pods and the container cluster itself. A pod is a minuscule unit consisting of one or a group of containers that share the same storage and rule set for running the containers. The contents of the pod are co-located, co-scheduled, and operate in a shared context. The overall intent of a pod is to “simplify application deployment and management by providing a higher-level abstraction than the set of their constituent applications.”

Kubernetes monitoring can become complex because Kubernetes automatically schedules containers’ runtime.  Labels are the solution. IT administrators attach labels to pods to distinguish pod attributes that are pertinent to users. Kubernetes said that labels “are absolutely crucial for monitoring since all metrics and events will be sliced and diced using labels across the different layers of your infrastructure.” Attaching performance metrics to labels provides the insight needed to monitor performance within the pod. Another monitoring tool for pods is service discovery, which detects a change in pod and container configuration. Overall, it’s imperative to check the health of both pod deployment and currently running pods.

The collection of metrics required to maintain a robust Kubernetes performance also needs to focus on resource utilization. Optimal resource utilization covers a variety of checks, including CPU and memory, container health, disk usage, NPM, and APM.

Third-Party Kubernetes Monitoring

Kubernetes offers performance management products for its product, including Heapster, which is a cluster-wide aggregator, and cAdvisor, an open source container resource and performance analysis agent. With its rising fame, multiple third-party vendors created other Kubernetes monitoring solutions. We rounded up a few of them here, but more solutions exist in the marketplace.

  • Datadog
  • Sysdig
  • Dynatrace
  • Wavefront by VMware

Related Definitions

containers-basics
Container Basics and an Update
Software Defined Everything Pt. 7: Infrastructure Form Factors & Delivery ModelsHow Does Container Networking Work? DefinedWhat are Containers (like Docker Linux Containers or Software Containers)?What is Docker Container? Pt. 1: The Docker Open Source ProjectWhat is an OpenDaylight Controller? AKA: OpenDaylight Platform
SDxCentral Daily News

Join your Peers! Subscribe to SDxCentral's Newsletter

Subscribe to Get the Daily News!

Related Definitions

  • Container Basics and an Update
  • SD-WAN Essentials: A Guide For Getting Started
  • Intent-Based Networking Vendors Debate the Term
  • Considerations for an Intent-Based Networking Architecture
  • 5 Benefits of Intent-Based Networking
  • Considerations for an Effective Multi-Cloud Strategy
  • Citrix Cloud Leverages SD-WAN for the Multi-Cloud
  • What are the Multi-Cloud Trends
  • What is a Multi-Cloud and Why Use It?
  • What is the Lumina SDN Controller?
  • The Microsoft Cloud Storage Market Strategy
  • Rackspace Multi-Cloud Security Strategy
  • Five Security Aspects of Cloud Computing
  • Six Security Disadvantages of Cloud Computing
  • Cloud Computing Security Architecture for IaaS, SaaS, and PaaS.
  • The Cloud Security Products that Protect the Cloud
  • 11 Critical Cloud Security Vulnerabilities
  • Secure Cloud Hosting in These Nine Steps
  • Achieving Network Security in Cloud Computing
  • Is Cloud Storage Safe with Encryption?
  • Top Cloud Security Issues and Terms to Know
  • Review The Top Risks of Cloud Computing
  • What is the Cloud Security Alliance?
  • Is the Cloud Safe from Data Hacking and Viruses?
  • Security Tips: How to be Safe in Cloud Computing
  • What is Intent-Based Networking?
  • The Cisco Hyperconverged Platform Acquisition Strategy
  • Nutanix HCI Shifts Attention to SDN and the Multi-Cloud
  • Dell EMC Converged Infrastructure Product Strives for Simplicity
  • HPE’s HCI is a Revenue Generator
  • VMware Converged Storage and Cybersecurity
  • Comcast Business Merges SD-WAN with Gigabit Speed
  • The Advantages of HCI for MEC
  • HCI or HCI Storage? Which Term to Use
  • Vendors Look to HCI to Support IoT
  • How Does HCI Shape the 5G Landscape?
  • How to Develop a Converged Infrastructure Strategy
  • Gartner Analyzes HCI Vendors in its Magic Quadrant Report
  • What Is Converged Infrastructure Management?
  • Understand The Basics of Convergence Architecture
  • HCI Research Highlights Market Trends
  • Software-Defined Storage vs. Hyperconverged Infrastructure
  • What is Converged Storage? — A Definition
  • What is Converged Infrastructure? — Explained
  • HCI Use Cases: Unifying Computing
  • Why is HCI Important? 8 Benefits of Converged Infrastructure
  • The Main Difference Between Converged and Hyperconverged Infrastructures
  • Dynatrace Monitoring Addresses IT Complexity
  • IBM's APM Advice: DevOps
  • Ixia's Performance Management Mission
  • Machine Learning Automates Performance Management
  • New Relic Performance Management Relies on Applied Intelligence
  • The 5G Performance Management Revolution
  • The Edge Performance Management Challenge: Analytics
  • The Cisco ACI Performance Management Options
  • The VMware NSX Performance Management
  • CA Technologies' Performance Management Research
  • Nine Performance Management Use Cases
  • Visibility Architecture's Role in Proactive Monitoring
  • The Performance Management Definition
  • How AI Improves Performance Management Tools
  • The NFV Performance Management Challenges
  • Communication Service Providers' Performance Management Challenge
  • Performance Management & SDN: New Issues Need New Solutions
  • The Major Performance Management Problems
  • Top Performance Management Tools for APM, NPM, and UPM
  • What is Unified Performance Management?
  • Crown Castle Invests in Multi-Access Edge Computing
  • ADVA Optical Addresses MEC Security
  • Vasona Eyes the Edge
  • MEC: Intel Is Involved in MEC Standards and Reference Architecture
  • EdgeConnex's Plans to Extend MEC Globally
  • IoT Spurs Huawei's Focus on Edge Computing
  • Huawei Stresses 5G Collaboration
  • Vapor IO Hones in On Edge Computing
  • Why is Performance Management Important?
  • The Benefits of Performance Management
  • What is the ETSI MEC ISG's Role in Defining MEC?
  • The Facts Behind the Linux Foundation's EdgeX Foundry
  • What is Open Edge Initiative? MEC Research and Tests
  • OpenFog Consortium and ETSI's MEC Collaboration
  • What's the Difference Between MEC and Distributed Cloud?
  • What's the Difference between MEC and Fog Computing?
  • Mobile Edge Computing vs. Multi-Access Edge Computing
  • The Solutions that Brings Forth MEC Virtualization
  • The MEC and AR/VR Upcoming Trends
  • What Is IMT-2020?
  • How vRAN Changes the 5G Game
  • Ericsson 5G Trials for the Foundation of Networked Society
  • What is Hyperconverged Infrastructure — A Definition
  • What is Hyperconverged Data Center? - A Definition
  • Nokia Is at the Forefront of 5G Innovation
  • Exploring Samsung’s Commitment to the 5G Future
  • What is NPM? Then and Now — A Definition
  • Qualcomm Makes 5G a Top Priority
  • What Is the Radio Access Network?
  • How Is the RAN Network Evolving?
  • Edge NFV — A Powerful Duo for Modern Computing
  • The Role of cRAN in 5G Networks
  • Disruption: The MEC, 5G Impact on the Computing Landscape
  • What are the MEC Business Cases?
  • A Driving Force Behind the Edge: IoT
  • The Five API's of Edge Applications
  • What Is 5G Network Slicing?
  • What is Network Slicing?
  • What is Dynamic Network Slicing?
  • The Top Countries Most Likely to Launch 5G First
  • The T-Mobile 5G Plan: It Charts Its Own 5G Waters
  • Sprint Sees a Mid-Band 5G Future
  • What is the Hybrid Cloud and What are the Benefits?
  • What is Private Cloud? A Look at The Benefits
  • A Review of What is a Public Cloud?
  • IoT Security: Threats, Attacks, and Prevention
  • The Top Edge Computing Security Challenges
  • SK Telecom Pushes Ahead With 5G in South Korea
  • Korea Telecom Goes for the 5G Gold
  • What is the Internet of Things? — A Definition
  • What Is 5G NR?
  • China Poised to Lead the World in 5G
  • The Collaborative Efforts in MEC Research
  • Verizon's 5G Urgency: An Ambitious Plan for the 5G Future
  • AT&T's 5G Efforts Focus on mmWave, Faster Broadband
  • NTT 5G Is Thriving Thanks to a Collaborative Spirit
  • How Is 5G Different From 4G?
  • The Birth and Growth of Nokia’s '5G First'
  • The Top 5G Use Cases
  • 10 Edge Products That Enable Edge Computing
  • The Top 5G Vendors Around the Globe
  • In the World of 5G, Virtualization Is Everything
  • The MEC Trials Already Tried and Tested
  • Types of Multi-Access Edge Computing Vendors
  • What Are the Top 5G Security Challenges?
  • How 5G SDN Will Bolster Networks
  • What are the MEC Standards? A Quick Review
  • 5G Standards: What You Need to Know
  • 5G Technology Promises Faster Connections, Lower Latency
  • 5G Trials in the United States — Steps Toward Standardization
  • Four Multi-Access Edge Computing Use Cases
  • Will 5G Replace WiFi?
  • 5G Routers Are Shaping the Future of Connectivity
  • Key Elements for the 5G Network
  • How Will the 5G Network Impact LTE?
  • What Are the Top 5G Business Cases?
  • What Are the Essential 5G Products?
  • The Importance of 5G Research
  • How 5G NFV Will Enable the 5G Future
  • Defining 5G Architecture
  • What Is Viptela’s SD-WAN Approach?
  • What Is VeloCloud’s SD-WAN Approach?
  • Riverbed SD-WAN Offers Different Options
  • What is Verizon’s SD-WAN Approach?
  • Silver Peak’s SD-WAN Solution Targets Enterprises
  • What Is Juniper’s SD-WAN Approach?
  • What Is Cisco’s SD-WAN Approach?
  • What is Citrix’s SD-WAN Product?
  • Versa’s SD-WAN Combines Networking and Security
  • Nuage’s SD-WAN Uses a Single Network Policy Framework
  • What Is CloudGenix’s SD-WAN Approach?
  • What Is AT&T’s SD-WAN Approach?
  • SD-WAN Adoption Is Rapidly Increasing in the SD-WAN Market
  • What Is Edge Computing, Multi-Access Edge Computing (MEC)?
  • SD-WAN vs. MPLS: The Pros and Cons of Both Technologies
  • The Primary Benefits of SD-WAN Technology
  • What Are the Advantages of SD-WAN Open Source?
  • The Essentials of SD-WAN Architecture: Advantages and Options
  • What is the Difference Between SD-WAN and iWAN?
  • What is iWAN and Why Does It Matter?
  • What is SD-WAN as a Service?
  • What is SDN-WAN and Why Does it Matter?
  • What’s the Difference Between Hybrid WAN and SD-WAN
  • What is Hybrid WAN and Why Does it Matter?
  • What is APM? Definition and Characteristics
  • Microservices for vCPE – Definition
  • SD-WAN as a Service Using Orchestration – Definition
  • Service Virtualization and Microservices
  • Microservices Architecture in the Telco Cloud
  • What is 5G? Everything You Need to Know – A Definition
  • What is Software Defined Networking (SDN)? Definition
  • What are DevOps workflow and TOSCA? Definition
  • What Is Lifecycle Service Orchestration (LSO)? Definition
  • How to Use Docker and Why It Works
  • What Are Microservices in NFV? Definition
  • TOSCA vs. Netconf – a Comparison
  • TOSCA Orchestration for Service Providers
  • Why is TOSCA Relevant to NFV? Explanation
  • TOSCA in the Telco Cloud – a Definition
  • What is Ryu Controller?
  • What is Open vSwitch (OVS)?
  • What is the Cisco ONE Controller?
  • What is Cisco onePK?
  • What is an OpenFlow Controller?
  • Data Security Regulations – an Overview
  • What Is a Virtual Network?
  • What Is a Linux Container?
  • How Virtual Network Security Works & Why
  • How to Deliver Data Center Security via Network Virtualization
  • Data Center Networking Explained
  • What Is NFV Infrastructure (NFVI)? Definition
  • What is a VNF Manager (VNFM)? Definition
  • What is Virtualized Infrastructure Manager (VIM)? Definition
  • What is an NFV Orchestrator (NFVO)? Definition
  • What Is an Operations Support System (OSS)? Definition
  • What Is Mirantis OpenStack? How It Works
  • What Is Open Virtual Network (OVN)? How It Works
  • What Is Virtual Networking? How It Works
  • What Is Docker Security & How Do You Use It?
  • How Does Micro-Segmentation Help Security? Explanation
  • What Is Network Automation With Network Virtualization?
  • What is the Docker Platform and Container Components? Definition
  • What is an SDN POC?
  • What's Networking Software?
  • What is CoreOS Flannel? Definition
  • What is Network Service Chaining? Definition
  • What is Docker Container? Part 2: How Docker Containers Work
  • Future of Virtual Security: Micro-Segmentation & Visibility
  • Software Defined Everything Pt. 8: Succeeding in an SDx World
  • Software Defined Everything Pt. 7: Infrastructure Form Factors & Delivery Models
  • Software Defined Everything Part 6: Infrastructure Attributes
  • Software Defined Everything Pt 5: SDx Use Cases
  • Software Defined Everything Part 4: SDx Infrastructure Buyers
  • Software Defined Everything Pt. 3: SDx infrastructure
  • Software Defined Everything Part 2: Cloud Infrastructure
  • What is Software Defined Everything - Part 1: Definition of SDx
  • Containers vs VMs: Which is better in the Data Center?
  • How Does Container Networking Work? Defined
  • What is Software-Defined Storage? - Definition
  • What is Storage Virtualization?
  • What is a Spine Switch?
  • What are Arista Switches? - Definition
  • What are Leaf Switches?
  • What are 40G Switches?
  • What is Software Defined Compute? - Definition
  • What is the Software Driven Cloud Networking?
  • What is Cloud-Based Security?
  • What is SDN Orchestration (SDN Policy Orchestration)?
  • What is an NFV OpenStack? --Definition--
  • What is Overlay Networking (SDN Overlay)?
  • What is an NFV Orchestration?
  • What is the Cloud? - Definition
  • What is Security Virtualization?
  • What is the Definition of IEEE Intercloud?
  • What is a VXLAN?
  • What is Networking as a Service or NaaS?
  • What is a Data Center Fabric?
  • What is an NFV Data Center?
  • What is Cloud Infrastructure? -- Definition
  • What is an NFV Strategy for Deploying New Services?
  • An Overview of NFV Elements
  • What is Software-Defined WAN (or SD-WAN or SDWAN)?
  • What is a Networking Switch Fabric?
  • What is KVM? - Definition
  • What is Cloud Networking or Cloud Based Networking?
  • What are Cloud Service Providers?
  • What are Network Overlays?
  • What’s a Virtual Router (vRouter)?
  • What's CloudNFV Architecture?
  • What's a Software Defined Data Center?
  • What’s in an NFV Cloud?
  • What's NFV Software?
  • What are Containers (like Docker Linux Containers or Software Containers)?
  • What is Docker Container? Pt. 1: The Docker Open Source Project
  • What is an NFV POC (aka: ETSI NFV POC)?
  • Understanding the SDN Architecture - SDN Control Plane & SDN Data Plane
  • Software-Defined Networking Tutorial - The Basics
  • What is Cyan Blue Planet?
  • What is Nuage Networks VSC?
  • What is the Juniper Contrail Controller?
  • What is the NEC OpenFlow ProgrammableFlow Controller?
  • What is Open SDN? A Definition
  • What is Juniper Networks Network Virtualization?
  • What is NEC Network Virtualization?
  • What is Nuage Network Virtualization?
  • What is Cisco Network Virtualization?
  • What is VMware Network Virtualization?
  • What is a Virtual Network Function or VNF?
  • SDN, NFV, and NV Define The Wave of New IP Infrastructure
  • What is ETSI ISG NFV?
  • What is NFV MANO?
  • What is OPNFV or Open Platform for NFV Project?
  • What is the Brocade SDN Controller (BSC)?
  • What Is Cisco Application Centric Infrastructure (or Cisco ACI or Cisco SDN)? Part 1
  • What is Cisco Application Policy Infrastructure Controller (APIC)? Part 3
  • What is Cisco APIC? Part 2 of Cisco ACI Definition
  • What is the OpenDaylight Project (ODL)?
  • What is OpenStack Networking?
  • What is VMware NSX and VMware SDN?
  • What is an OpenDaylight Controller? AKA: OpenDaylight Platform
  • What is a Cisco XNC (Extensible Network Controller)?
  • What is Open vSwitch Database or OVSDB?
  • What is a Floodlight Controller?
  • SDN Controller Comparison Pt. 2: Open Source SDN Controllers
  • What is a Cisco Nexus Switch?
  • What is Cisco OpFlex?
  • What is Cisco OpenFlow?
  • What are SDN Northbound APIs (and SDN Rest APIs)?
  • What are SDN Southbound APIs?
  • What is White Box Switching & White Box Switches (& are they SDN Switches)?
  • What is Software-Defined Security for SDN?
  • SDN Automation, Programmability, and Programmable Networks
  • What are SDN Controllers (or SDN Controllers Platforms)?
  • SDN Security - Challenges Implementing SDN Network Security in SDN Environments
  • How Does ETSI NFV Operate?
  • Who is the Open Networking Foundation (ONF)? The steward of OpenFlow.
  • What is OpenFlow? Definition and How it Relates to SDN
  • What is OpenStack Neutron?
  • Why SDN or NFV Now?
  • Which is Better - SDN or NFV?
  • What is Network Virtualization? - Definition
  • What is NFV - Network Functions Virtualization - Definition?

About SDxCentral

  • Newsletters
  • About Us
  • Contact Us
  • Work With Us
  • Editorial Team
  • Careers
  • Legal
  • Support

Engage With us

This material may not be copied, reproduced, or modified in whole or in part for any purpose except with express written permission from an authorized representative of SDxCentral, LLC. In addition to such written permission to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced. All Rights Reserved.

© 2012-2019 SDxCentral, LLC, All Rights Reserved. SDNCentral™, the SDNCentral logo, SDxCentral™, SDxCentral logo, SDxNews™, SDxTech™, SDx™, the SDx logo, and DemoFriday™ are trademarks of SDxCentral, LLC in the U.S. and other countries.

  • Terms of Service
  • Privacy