Kubernetes Networking: Challenges and Advances in Container Communication
Downloads
Keywords:
Kubernetes, Networking, Container Communication, Challenges, Advances, Microservices, Service Mesh, Network Policies, Load Balancing, ScalabilityAbstract
The intricacies, developments, and potential paths of Kubernetes networking in containerized settings are examined in this review. This study's primary goals were to explore the difficulties in Kubernetes networking architecture, look at new security and network policy developments, and discover ways to improve performance and Scalability. A thorough literature review of academic journals, technical reports, and industry publications was carried out to synthesize existing information and develop trends. Key findings show that fixing security flaws in multi-tenant settings, defining network policies across clusters, and guaranteeing compatibility with legacy systems are all challenging tasks. Promising answers to these problems can be found in the integration of service mesh technologies and improved encryption protocols, which are examples of advancements in network policies. The significance of standardized best practices for network security, real-time threat detection tools, and robust disaster recovery procedures is highlighted by policy implications. The present study enhances comprehension of the dynamic terrain of Kubernetes networking by emphasizing prospects for augmenting dependability, expandability, and safety within container communication frameworks.
Downloads
References
Agustí-Torra, A., Ferré-Mancebo, M., Orozco-Urrutia, G. D., Rincón-Rivera, D., Remondo, D. (2024). A Microservices-Based Control Plane for Time-Sensitive Networking. Future Internet, 16(4), 120. https://doi.org/10.3390/fi16040120
Carrión, C. (2022). Kubernetes as a Standard Container Orchestrator - A Bibliometric Analysis. Journal of Grid Computing, 20(4), 42. https://doi.org/10.1007/s10723-022-09629-8
Danino, T., Ben-Shimol, Y., Greenberg, S. (2023). Container Allocation in Cloud Environment Using Multi-Agent Deep Reinforcement Learning. Electronics, 12(12), 2614. https://doi.org/10.3390/electronics12122614
Dell’Immagine, G., Soldani, J., Brogi, A. (2023). KubeHound: Detecting Microservices’ Security Smells in Kubernetes Deployments. Future Internet, 15(7), 228. https://doi.org/10.3390/fi15070228
Deng, L., Wang, Z., Sun, H., Li, B., Yang, X. (2023). A Deep Reinforcement Learning-based Optimization Method for Long-running Applications Container Deployment. International Journal of Computers, Communications and Control, 18(4). https://doi.org/10.15837/ijccc.2023.4.5013
Dogani, J., Khunjush, F., Seydali, M. (2022). K-AGRUED: A Container Autoscaling Technique for Cloud-based Web Applications in Kubernetes Using Attention-based GRU Encoder-Decoder. Journal of Grid Computing, 20(4), 40. https://doi.org/10.1007/s10723-022-09634-x
Donca, I-C., Stan, O. P., Misaros, M., Stan, A., Miclea, L. (2024). Comprehensive Security for IoT Devices with Kubernetes and Raspberry Pi Cluster. Electronics, 13(9), 1613. https://doi.org/10.3390/electronics13091613
Femminella, M., Reali, G. (2024). Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies. Future Internet, 16(3), 91. https://doi.org/10.3390/fi16030091
Gonzalez, L. F., Vidal, I., Valera, F., Martin, R., Artalejo, D. (2023). A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M. Future Internet, 15(8), 274. https://doi.org/10.3390/fi15080274
He, Q., Zhang, F., Bian, G., Zhang, W., Li, Z. (2023). Real-time Network Virtualization Based on SDN and Docker Container. Cluster Computing, 26(3), 2069-2083. https://doi.org/10.1007/s10586-022-03731-y
Ji-Beom, K., Choi, J-B., Eun-Sung, J. (2024). Design and Implementation of an Automated Disaster-Recovery System for a Kubernetes Cluster Using LSTM. Applied Sciences, 14(9), 3914. https://doi.org/10.3390/app14093914
Li, Y., Hu, H., Liu, W., Yang, X. (2023). An Optimal Active Defensive Security Framework for the Container-Based Cloud with Deep Reinforcement Learning. Electronics, 12(7), 1598. https://doi.org/10.3390/electronics12071598
Ni, Z., You, J., Yang, L. (2024). An ICN-Based On-Path Computing Resource Scheduling Architecture with User Preference Awareness for Computing Network. Electronics, 13(5), 933. https://doi.org/10.3390/electronics13050933
Nsafoa-Yeboah, K., Tchao, E. T., Yeboah-Akowuah, B., Kommey, B., Agbemenu, A. S. (2022). Software-Defined Networks for Optical Networks Using Flexible Orchestration: Advances, Challenges, and Opportunities. Journal of Computer Networks and Communications, 2022. https://doi.org/10.1155/2022/5037702
Petrakis, E. G. M., Skevakis, V., Eliades, P., Aznavouridis, A., Tsakos, K. (2024). ModSoft-HP: Fuzzy Microservices Placement in Kubernetes. Electronics, 13(1), 65. https://doi.org/10.3390/electronics13010065
Sadiq, A., Syed, H. J., Ansari, A. A., Ibrahim, A. O., Alohaly, M. (2023). Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF. Applied Sciences, 13(8), 4700. https://doi.org/10.3390/app13084700
Senjab, K., Abbas, S., Ahmed, N., Khan, A. U. R. (2023). A Survey of Kubernetes Scheduling Algorithms. Journal of Cloud Computing, 12(1), 87. https://doi.org/10.1186/s13677-023-00471-1
Silva, D., Rafael, J., Fonte, A. (2024). Toward Optimal Virtualization: An Updated Comparative Analysis of Docker and LXD Container Technologies. Computers, 13(4), 94. https://doi.org/10.3390/computers13040094
Wu, H., Cai, Z., Lei, Y., Xu, J., Buyya, R. (2022). Adaptive Processing Rate Based Container Provisioning for Meshed Micro-services in Kubernetes Clouds. CCF Transactions on High Performance Computing, 4(2), 165-181. https://doi.org/10.1007/s42514-022-00096-x
Yuan, H., Liao, S. (2024). A Time Series-Based Approach to Elastic Kubernetes Scaling. Electronics, 13(2), 285. https://doi.org/10.3390/electronics13020285
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the journal owned and operated by The Science Brigade Group retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this Journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.
Plaudit
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.