Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Alex Chalkias
on 9 March 2021

Multi-cloud Kubernetes management with Portainer


If you feel intimidated by Kubernetes’ complexity but still need to modernize your business applications with containers, rest assured you’re not the only one. The container orchestration platform solves many problems but also creates new ones, so read on to find out about a new approach that can help you get just the benefits.

Our friends over at Portainer have been recently experimenting with Canonical’s Kubernetes distributions and created tutorials on how to run their container management system, which significantly simplifies the Kubernetes experience through an intuitive UI. They started small with MicroK8s, a lightweight Kubernetes for edge and IoT, and then looked at more complex enterprise use cases with Charmed Kubernetes on the Azure cloud.

The following tutorial is a direct repost of the original article on portainer.io blog.

Follow the Tutorial

You can also follow along on youtube here:

Install Charmed Kubernetes

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...