Enterprises can leverage the dashboard-style cluster analytics to obtain infrastructure insights by collecting, normalizing, and inferring cluster performance, workload metrics, data services, user/cluster activities, ops logs and more. to deliver better resource utilization.
D2iQ Kommander also enables central monitoring of issues arising within applications, as well as empowers admins to dive deep into each cluster, without losing valuable time required for troubleshooting of problems.
Provide Enterprise Access Controls for Multi-tenancy
D2iQ Kommander helps platform administrators drive federated role-based policy across clusters to reduce operational overhead and redundant effort. Provision Kubernetes’ native Role-Based Access Control (RBAC) settings to define user roles and responsibilities, administer groups, identify role violations, assess governance risk, and perform compliance checks against industry standards and in-house policies. Admins can deliver on the operational needs of enterprise security and DevOps teams, giving them control when a user’s role within an organization changes.
Deliver Centralized Governance for Any Kubernetes
Federation of our curated and expertly supported pure upstream open- source add-ons from the CNCF to any Kubernetes distribution help enable Day 2 production wherever you are running—public cloud, on prem, or even air-gapped. IT organizations can effectively prevent sprawl of resources, improve resource allocation, and minimize manual efforts in deployment and ongoing management with the visibility and control you need to maximize the efficiency of your Kubernetes investments
Features and Benefits
A centralized control plane for multi-cluster management provides enhanced visibility and easy visualization into your cluster landscape. Understand your organization’s cluster schema and develop a strategy for enterprise-wide services and workload deployments.
With integrated service monitoring, logging, and alerting, platform admins can centrally view the status and operational details of all managed clusters, on-premise or in the cloud. Aggregated alerting accelerates the time to triage problems so that they may be resolved quickly and easily before they escalate, saving valuable time and impact.
Granular Cost Control
Real-time cost management provides granular visibility and control across your Kubernetes clusters. Drill down into cluster costs in real time and attribute them to the right departments, teams, groups, or projects. Identify opportunities for savings and get the information you need for more effective budgeting.
With centralized management, you can enable service operations, such as upgrades and new service additions with zero downtime. This ensures there is a consistent upgrade policy, deployment policy, and security within a single pane of glass.
Quickly and easily deploy valuable applications from the centralized service catalog, including complex data services like Kafka, Cassandra, or Spark operators, to specific or multiple clusters, with governance — ensuring roles and responsibilities are adhered to.
Service Mesh Integration
With integrated service mesh capabilities, customers can add advanced networking capabilities, such as multi-cluster and cross-cluster service discovery, load balancing, and advanced network security capabilities. Granular network controls enable a variety of hybrid cloud, multi-cloud and multi-cluster use cases.
Integration with D2iQ KUDO Operators
Kubernetes Operators encode the operational runbooks for managing complex and stateful applications. Shipped with the Service Catalog, D2iQ KUDO operators are designed for building data rich applications using technologies like Spark, Kafka, and Cassandra and are backed by our expert support team 7x24x365.
Governance Policy Administration
Meet the requirements of security and audit teams with centralized cluster policy management. Platform operators can effectively empower users with the appropriate levels of access while identifying unnecessary or prohibited activity.
Centralized Authorization and Authentication
Embrace existing systems of record and authentication mechanisms to provide secure access. Active Directory, LDAP or Oauth integration enable single sign-on across an organization’s cluster footprint. Centralized RBAC and security based on Open Policy Access (OPA) govern authorization. Together these establish the baseline for enhancing the overall security posture and reducing risk.