Tigera today announced it will make it easier to migrate policies created for microsegmented networks running virtual machines from VMware to be migrated to instances of open-source Kubevirt software that encapsulate virtual machines in containers.
In the wake of licensing changes that Broadcom has instituted since acquiring VMware, many IT organizations are weighing their platform options. One option is Kubevirt, which enables IT organizations to encapsulate kernel-based virtual machines (KVM). IT teams could migrate virtual machines from VMware to KVM, which would allow them to run monolithic applications running on virtual machines on top of the same Kubernetes clusters as microservices-based applications.
Dhiraj Sehgal, director of product marketing at Tigera, said one of the challenges that IT teams will encounter, however, is that many of them make use of microsegmented networks using NSX software from VMware. Tigera is now making is easier to migrate the policies created for those networks to the open-source Calico network virtualization software that it created for cloud-native application environments, he added
.
Calico already supports virtual machines, containers and bare-metal servers, but Kubevirt enables IT teams to centralize the management of virtual and machines using a single platform. It will take any IT organization that decides to move workloads off VMware virtual machines a significant amount of time given all the dependencies that exist, but Tigera is moving to make it simpler to at the very least preserve the policies they have already created to microsegment virtual networks.
It’s not clear how many IT organizations have adopted NSX from VMware but interest in encapsulating legacy monolithic applications has increased since Broadcom acquired VMware. Calico provides a declarative segmentation alternative based on workload metadata such as namespace and labels to ensure new workloads are segmented automatically upon deployment.
That approach also makes it simpler to define policies that can be applied granularly to workloads across a heterogeneous IT environment, noted Sehgal. Additionally, a policy recommendation engine recommends policies based on the traffic flow of workloads that can be instantly applied via a single click in a way that requires no coding.
Calico also allows IT teams to preview and stage policies prior to enforcement along with immediate feedback on policy rule changes in the production environment before enforcement.
A dynamic service and threat graph built on flow logs also collects and analyzes communication flows to create a comprehensive map of the application environment.
Finally, integrated intrusion detection and intrusion prevention capabilities ingest threat feeds to pinpoint the source of malicious activity in the event of a breach.
Regardless of the motivation for adopting, microsegmention plays a critical role in limiting the blast radius of any network breach by helping to prevent malware from moving laterally across an IT environment. The challenge, historically, is that network microsegmentation of networks in IT environments that are constantly being updated is not easy.
However, as networking continues to evolve the days when every change to a network requires manual effort are mercifully coming to an end.