This Kasten by Veeam special edition of Kaelble’s book was written to help developers understand the importance of cloud native backup and recovery for Kubernetes environments...
Apps are everywhere — and used for everything. Since the launch of the iPhone, their presence in our day to day lives has been growing, helping us navigate everything from healthcare to entertainment to shopping and food delivery.
And today, more and more developers are turning to container-based app development. In fact, Gartner predicts that public and distributed cloud container management services could be the default choice for three-quarters of new custom enterprise applications by 2024. And according to the Cloud Native Computing Foundation (CNCF), 92 percent of respondents to a 2020 survey say they use containers in production — a percentage that’s 3X higher than it was in 2016.
Use of Kubernetes is increasing rapidly, as it is the most commonly used platform for container orchestration. The platform is robust, reliable, scalable and extensible, and it supports application mobility. However, the widespread use of relational and nonrelational databases on Kubernetes can leave your data exposed if you don’t have the right data management systems in place.
Many developers assume that if you are replicating your data, that’s sufficient. And while replication improves data availability and protects against partial infrastructure failure, it doesn’t protect against data loss or corruption. Steve Kaelble, author of Kubernetes Backup & Recovery For Dummies puts it this way:
Downtime can be incredibly expensive. That’s one reason why so many people love running containerized applications on Kubernetes. But the replication and assorted other magic that makes this happen is not the same thing as backup. Your data is still very much at risk, unless you set out quite deliberately to protect it.
This Kasten by Veeam special edition of Kaelble’s book was written to help developers understand the importance of cloud native backup and recovery for Kubernetes environments, and how to implement a solution that eliminates risk while simplifying and accelerating the development of containerized applications.
In a nutshell, here’s what you’ll learn by reading Kubernetes Backup & Recovery For Dummies:
Kubernetes Backup & Recovery For Dummies is the best way to learn about how you can best protect your Kubernetes applications with a cloud native backup solution designed specifically for the unique requirements of containerized applications. It’s a fast-paced read that’s easy to digest and understand — and will help you get started with backing up your Kubernetes applications the right way.
Download the book today for a deep-dive and clearer understanding of cloud native backup for Kubernetes.
Kopia Backup: Architecture, Scale, and Performance
Benefits of Using Kubernetes
Kubernetes Best Practices
Best Practices for Kubernetes Backup
New Application Consistency Lab on Learning.kasten.io
A community first technologist for Kasten by Veeam Software. Based in the UK with over 16 years of industry experience with a key focus on technologies such as cloud native, automation & data management. His role at Kasten is to act as a technical thought leader, community champion and project owner to engage with the community to enable influencers and customers to overcome the challenges of Cloud Native Data Management and be successful, speaking at events sharing the technical vision and corporate strategy whilst providing ongoing feedback from the field into product management to shape the future success.
For information about Kasten K10, please send us a message using the form on this page, or email us at email@example.com
8800 Lyra Drive, Suite 450
Columbus, Ohio 43240
We value the critical role that the security community plays in helping us protect the confidentiality, integrity, and availability of our software, services, and information. If you have information about security vulnerabilities that affect Kasten software, services, or information, please report it to us via our HackerOne Vulnerability Disclosure Program, or anonymously via this form.