2023
DOI: 10.3390/fi15020063
|View full text |Cite
|
Sign up to set email alerts
|

Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations

Abstract: Kubernetes (K8s) defines standardized APIs for container-based cluster orchestration such that it becomes possible for application managers to deploy their applications in a portable and interopable manner. However, a practical problem arises when the same application must be replicated in a distributed fashion across different edge, fog and cloud sites; namely, there will not exist a single K8s vendor that is able to provision and manage K8s clusters across all these sites. Hence, the problem of feature incom… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Such space isolation is achieved through OS-level namespaces [16]. In this setting, the namespace provides running environment isolation for processes, including network, file system, and process identifier (PID) space [33]. Since users can run VOLUME 12, 2024 processes in isolated namespaces, they cannot typically interfere with or monitor other processes or the host OS itself [33].…”
Section: B Namespaces Applicability In Other Research Areasmentioning
confidence: 99%
See 3 more Smart Citations
“…Such space isolation is achieved through OS-level namespaces [16]. In this setting, the namespace provides running environment isolation for processes, including network, file system, and process identifier (PID) space [33]. Since users can run VOLUME 12, 2024 processes in isolated namespaces, they cannot typically interfere with or monitor other processes or the host OS itself [33].…”
Section: B Namespaces Applicability In Other Research Areasmentioning
confidence: 99%
“…In this setting, the namespace provides running environment isolation for processes, including network, file system, and process identifier (PID) space [33]. Since users can run VOLUME 12, 2024 processes in isolated namespaces, they cannot typically interfere with or monitor other processes or the host OS itself [33]. A consequence of this isolation is the proper usage of Linuxbased security access control, known as secure computing mode (Seccomp) [34], [35].…”
Section: B Namespaces Applicability In Other Research Areasmentioning
confidence: 99%
See 2 more Smart Citations