The networking requirements of an application are as critical and complicated as the business problem you are trying to solve. It is important and essential to follow the industry's best practice and guidelines on network configuration so that your application performs well during peak loads without breaking, and so that it is secured from any security breach which might intend to kill the application or, even worse, steal customer-sensitive data. Security can be controlled by adhering to strong networking policies and firewalls restrictions so that communication can be controlled, throttled and monitored across a group of machines (called subnets) and at each instance level. Network configuration also brings in logical isolation for a single tenant in a multi-tenant environments.
Deploying containerized applications using a virtualized network is quite like deploying virtual machines in a network. Any typical enterprise web application consists of a web...