Latest Videos

Introduction to Kubernetes

From Raspberry Pis to satellites in space, Kubernetes continues to be the lifeblood of the cloud-native landscape and is a fast-moving train increasing in both popularity and demand, among businesses and developers. As a result, K8s has experienced rapid adoption and progressive development as an ecosystem. But what exactly is Kubernetes and why is it so popular? Even more, what are the necessary basics for someone to get started with K8s?

Kubernetes Master Class GitOps and Fleet Multi Cluster CD with EKS, GKE and AKS

GitOps is a relatively new model with a fast adoption rate because of how it enhances the continuous delivery workflow in the Kubernetes context. GitOps requires you to describe and observe systems with declarative configurations that will form the basis of continuous integration, continuous delivery and continuous deployment of your infrastructure. In this session, we will focus on making use of Fleet to manage deployments to multiple downstream clusters at scale.

Kubernetes Master Class Security & Observability feat. Tigera

In this RKE-focused workshop for networking, security, and observability on containers, Kubernetes, and Calico, you will work with a Calico and RKE expert to learn how to design, deploy, and observe security and networking policies in an RKE environment. This 90-minute hands-on lab comes with your own provisioned Calico Cloud environment, designed to provide more complete knowledge on how to implement:– Workload access controls– Compliance and reporting– Run-time visualization of traffic flow and security policies– Service-level observability– Anomaly detection and live troubleshooting You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes, container and cloud security, and observability in RKE, and how you can implement it in your own organization.

Kubernetes Master Class Managing Cluster Security at Scale

A Kubernetes cluster has various attack surfaces, from the API server to application traffic. It's important to understand what these potential areas of attack are, and from there, work out the best ways to mitigate the risks. This is especially important when managing multiple clusters. You want to ensure that you are following the right methods, and then standardizing those security approaches to be applied to all your clusters. In this session, we will cover some of the Kubernetes attack vectors and detail how to secure your clusters.