Operations | Monitoring | ITSM | DevOps | Cloud

October 2020

Getting up and running with Calico on your on-prem K8s Cluster

If you are deploying Kubernetes on-premises in your datacenter, you won’t want to miss this talk and demo. The first thing you’re thinking about might not be networking, but without some knowledge of the networking decisions you’ll need to make, and what the right option is given your environment, you’re likely to get stuck or make the wrong assumptions that may limit your ability to scale or integrate with the rest of the datacenter network.

Solving Microservices Connectivity Issues with Network Logs

The network is foundational to distributed application environments. A distributed application has multiple microservices, each running in a set of pods often located on different nodes. Problem areas in a distributed application can be in network layer connectivity (think network flow logs), or application resources unavailability (think metrics), or component unavailability (think tracing).

Troubleshooting microservices on K8S

What’s the best way to troubleshoot an application made up of multiple microservices, distributed across multiple nodes and multiple pods? In this training session we will cover a variety of Kubernetes troubleshooting tips and tricks, and you’ll learn how Calico Enterprise can help provide valuable visibility and reduce troubleshooting time in complex networks of microservices.

Extending Your Fortinet FortiManager to Kubernetes

Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiManager and Calico Enterprise, you gain access control and full visibility into the container environment along with centralized management. In this webinar, you will learn how Calico Enterprise and FortiManager enable you to.

Extend Your Fortinet FortiManager to Kubernetes

Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls.

Calico and K8s Network Policies - An Overview and Comparison

In an age where attackers are becoming more and more sophisticated, network security as a line of defense is more important than ever. Network Policy is the primary tool for securing a Kubernetes network. It allows you to easily restrict the network traffic in your cluster so only the traffic that you want to flow is allowed. In this training session, we will go over the core concepts in Kubernetes Network Policies and Calico Network Policies. Compare and contrast between the two models, and highlight when to use one versus the other.

Secure Networking for Openshift

The Kubernetes network model defines a flat network in which pod connectivity is unimpeded, with no restrictions on what traffic is allowed to or from each pod. To make a cluster production ready you need to make this networking secure. Network Policy is the primary tool for doing this and is essential to understand before considering moving a cluster to production.