D2iQ Kommander 2.0
D2iQ Kommander 2.0: Enterprise Kubernetes Cluster Management and Governance
Why D2iQ Kommander?
Ensure Granular Cost Visibility Across Lines of Business
Integrated Real-Time Cost Management
Deliver Centralized Multi-Cluster Governance
Enhance Multi-Cluster Visibility, Monitoring, and Logging
Empower Divisions of Labor Across a Wide Variety of Roles
Provide Enterprise Access Controls for Multi-Tenancy
D2iQ Kommander provides federated role-based policy and single sign-on across your organization’s clusters. With Role-Based Access Control (RBAC), admins can flexibly configure user roles, responsibilities, and account privileges. And with Active Directory integration and security based on Open Policy Access (OPA), users can leverage their existing authentication mechanism already in place and the health of the environment can be monitored.
Ensure Conformance and Compliance
Manage Risk and Security Vulnerabilities
Features and Benefits
Provide instant visibility and operational efficiency into the Kubernetes landscape from a single-view control plane.
Enable cross-cluster monitoring and alerting of issues arising within operational and application infrastructure.
Granular Cost Control
Drill down into cluster costs in real-time with an accurate and consolidated cost management across your cluster landscape.
Enable service operations, such as upgrades and new service additions with zero downtime. Ensure consistent upgrade, deployment, and security policies.
Quickly and easily deploy applications and complex data services from a centralized service catalog to specific or multiple clusters, with governance.
Service Mesh Integration
Add advanced networking capabilities, such as multi-cluster and cross-cluster service discovery, load balancing, and security, across a variety of hybrid cloud, multi-cloud, and multi-cluster environments.
Integration with D2iQ KUDO
Run and manage complex and stateful applications for use with persistent storage on Kubernetes clusters.
Governance Policy Administration
Meet the requirements of security and audit teams with centralized cluster policy management.
Centralized Authorization and Authentication
Enable single sign-on across an organization’s cluster footprint (Active Directory, LDAP, Oauth integration) and govern authorization (RBAC and Open Policy Access) to enhance security and reduce risk.
D2iQ Resources for Enterprise Kubernetes Success
Everything is pure open-source. I’m able to do my own research, get stuff done, and have D2iQ there for back-up support if it’s needed.