Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Cloud Computing|Microsoft Azure

Microsoft Looks to Make Azure More Container Friendly With Container Instances

If you look at any recent earnings report from Microsoft, there is one consistent segment of growth that is outpacing other company operations, cloud services. Microsoft’s Azure platform is the backbone of the future of the company and they are continuously making large investments in this platform.

Announced today, Microsoft is making it easier to deploy and manage containers in Azure without the need to manage a virtual machine. The service is being called Azure Container Instances (ACI) and the company says this is the fastest and easiest way to run a container in the cloud.

The new containers will be customizable based on your needs with the ability to define the amount of memory needed and an exact count of vCPUs. The company says that these containers will be first-class objects on Azure and will also offer Role-Based Access Control (RBAC) as well.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Somewhat surprising is that the service is entering preview today for Linux containers only. The company says that Windows container support will be available in the coming weeks and that all containers will be billed by the second so that you don’t pay for when you are not using the service.

This new container service is not an orchestrator and the company does not plan to turn this service into that type of product but they do intend for ACI to fuel orchestrators. As part of the announcement today, Microsoft is also releasing an open source ACI connector for Kubernetes that enables Kubernetes clusters to deploy to Azure Container Instances.

With this new service and connector, the goal is to allow for rapid scaling of compute using Kubernetes without having to manage a VM infrastructure. This will allow you to use both VMs and container instances at the same time in the same K8 clusters to extract the strengths of both technologies as workloads spin up and slow down.

Microsoft is working to make Azure the most flexible cloud product available and while Amazon has its unique way of building out its platform, Microsoft continues to push further into the open-source world of technologies with ACI being the latest step in that process. I’ll be curious to see how this new service is utilized and the feedback from developers as they build out with this new model to see if it truly is an easier way to manage your containers and more importantly if it is a cost-effective solution.


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: