by John Armstrong | Jul 23, 2020 | Blog, Calico, Kubernetes, Networking, Security
Today we are pleased to announce our partnership with Nutanix, creators of the industry’s most popular hyper-converged infrastructure (HCI) technology. HCI combines datacenter hardware using locally-attached storage resources with intelligent software to create...
by Bikram Gupta | Apr 21, 2020 | Blog, Calico Enterprise, DevOps, Kubernetes, Networking, Project Calico, Technical
Designing and maintaining networks is hard. When deploying Kubernetes in your on-prem data center, you will need to answer a basic question: Should it be an overlay network on top of an existing network, or should it be part of an existing network? The Networking...
by Andy Wright | Apr 14, 2020 | Calico, eBPF, Networking, Open Source
eBPF is a hot topic right now; most of the infrastructure-focused conferences and events have included talks on eBPF over the past year, which is creating a lot of interest in the technology. You might be wondering what eBPF is. eBPF stands for “extended Berkeley...
by Bikram Gupta | Apr 7, 2020 | Blog, Calico, DevOps, Kubernetes, Networking, Open Source, Project Calico, Security, Technical
Calico is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Docker EE, OpenStack, and bare metal. In this blog, we will...
by Alex Pollitt | Jun 13, 2019 | Calico, eBPF, Networking, Open Source
Calico provides users flexibility by detecting and choosing the right tool for the right job. One of our core values at Tigera is Our customer is the hero of our story. We consider the OpenSource users of Project Calico our customers and we intently listen to their...
by Shaun Crampton | Jun 4, 2019 | Calico, Cybersecurity, Networking
In this article, we’ll explore Calico’s denial-of-service (DoS) mitigation features, including XDP-optimisation support introduced in Calico v3.7. Using Calico Policy for DoS Mitigation During a DoS attack, a cluster can receive massive numbers of...