Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to Implement Network Policy in Amazon EKS to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Amazon EKS solution to this security concern is Network Policy that lets developers control network access to their services. Amazon EKS comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

Calico Enterprise Multi Cluster Management - Federated Identity and Services

Learn how to simplify deployment and ongoing operations for more than one cluster running Calico Enterprise. What is Calico Enterprise Multi-Cluster Management How is Calico Enterprise Multi-Cluster architected How to set up Calico Enterprise Multi-Cluster Management How to enable Federated Endpoint Identity and Services for Multi-Cluster use cases A Calico Enterprise trial is available after this session and you will be able to practice these use cases on your own within a hosted lab.

How Calico Enterprise Enables Your Kubernetes Multi-Tenancy

In this talk, we will explore Kubernetes multi tenancy concepts and design patterns. Specifically, we will go over the network and network security design patterns needed for enabling multi tenancy within your k8s clusters using key capabilities of Calico Enterprise. Explore multi-tenancy use-cases in Kubernetes Learn about the core concepts and design patterns behind multi tenancy in Kubernetes Understand the key capabilities of Calico and Calico Enterprise that enable multi tenancy

Enterprise Security Controls for Kubernetes

In this talk, we will explore how to meet common enterprise security control needs when running Kubernetes. Specifically, we will look at a range of common enterprise security needs and how you can meet these with standard Kubernetes primitives and open source projects such as Calico, or take it a step further with the additional features of Calico Enterprise.

Up and running with Calico Host Micro-segmentation on AWS

In this online training, we will explain how to install and configure Calico on AWS VMs to apply network policy to resources outside your K8s cluster. The talk will be primarily a walkthrough and demo and you will receive all manifests and instructions to do the demo on your own after the session.