Keeping up with Kubernetes Radio Presents:
Podcast with Ritesh Patel, Co-Founder & VP of Products at Nirmata
By 2013, cloud-native applications were beginning to tax traditional application development architectures. In this episode, Nirmata founder Ritesh Patel discusses Nirmata’s origins and how the company’s solution evolved to address these application development challenges with Kubernetes.
Learn more: https://www.nirmata.com/
Keeping up with Kubernetes Presents:
Podcast with Anubhav Sharma, VP of Business Development at Nirmata
Anubhav Sharma runs sales, business development, and alliances at Nirmata. In this episode, Anu discusses how Nirmata allows customers to manage complex containerized environments easily, and how that easy and effective management benefits the entire organization.
Learn more: https://www.nirmata.com/
In this episode of the Enterprise-Wide Kubernetes series, we will show
how Nirmata makes it easy to integrate your Kubernetes clusters and
workloads with Vault for enterprise grade secrets management.
What to expect:
1. Learn best practices for managing secrets in Kubernetes.
2. Get an overview of HashiCorp Vault and learn how to use the tool for managing secrets i.e. sensitive data like passwords and access keys.
3. Discover Nirmata integrations with Vault.
Keeping Up With Kubernetes Radio. A podcast session with Nirmata's CEO and Co-founder, Jim Bugwadia
The open source ecosystem has produced some incredible technologies that have also been crafted into enterprise-ready tools. In this episode, Nirmata CEO Jim Bugwadia discusses how Kubernetes fits into that open source ecosystem, and what Nirmata’s individual approach is to delivering Kubernetes as a powerful, enterprise-ready tool for container management.
Learn more: https://www.nirmata.com/
Kubernetes security features focus on infrastructure layer: verifying that configuration is safe, follow the security best practices, the last privileges and your deployment has no known issues. How that compares with runtime security?
- Kubernetes RBAC overview
- Kubernetes Pod Security Policy
- Kubernetes Network Policy
- Securing Kubernetes components and applications
Kubernetes-orchestrated applications running on containers require a new approach to performance monitoring and troubleshooting. Join Sysdig for an overview of what you can expect when monitoring Kubernetes-based microservices and what to consider for optimal effectiveness. During this webinar you'll learn:
- What are the key metrics and components to monitor in a Kubernetes environment?
- How do containers complicate monitoring and what you can do to see inside?
- When should you set alerts, and for what, to keep on top of cluster behavior?
- What role do custom metrics (e.g., Prometheus) play for observing app behavior?
- How do you troubleshoot in an auto-scaling, distributed environment?
This webinar will include a demonstration of open source and commercial tools that can help you solve these new challenges. Attend to get insight that will help you operate Kubernetes deployments in development and production at any scale.
Join us for an online demo of blocking an application attack in your Kubernetes cluster.Read more >
Aqua’s open source tools arm Kubernetes administrators and developers with an easy way to identify weaknesses in their deployments so that they can address those issues before they are exploited by attackers.
During this webinar we’ll review how Aqua's open source tools offer preventive security for Kubernetes:
•Kube-Bench: checks a Kubernetes cluster against 100+ checks documented in the CIS Kubernetes Benchmark.
•Kube-Hunter: conducts penetration tests against Kubernetes clusters that hunt for exploitable vulnerabilities and misconfiguration - both from outside the cluster as well as inside it (running as a pod).
Join us to learn about container runtime security, and how to secure your container runtime environment with Falco and Kubeless. We'll also demo Falco detecting abnormal behavior in a container, and Kubeless taking action on the compromised container.Read more >
Effective security requires a layered approach. If one layer is comprised, the additional layers will (hopefully) stop an attacker from going further. Much of container security has focused on the image build process and providing providence for the artifacts in a container image, and restricting kernel level tunables in the container runtime (seccomp, SELinux, capabilities, etc). What if we can detect abnormal behavior in the application and the container runtime environment as well? In this talk, we’ll present Falco - an open source project for runtime security - and discuss how it provides application and container runtime security. We will show how Falco taps Linux system calls to provide low level insight into application behavior, and how to write Falco rules to detect abnormal behavior. Finally we will show how Falco can trigger notifications to stop abnormal behavior, notify humans, and isolate the compromised application for forensics. Attendees will leave with a better understanding of the container security landscape, what problems runtime security solves, & how Falco can provide runtime security and incident response.Read more >
The Domain Name System (DNS) is used to associate IP addresses with meaningful names. By default, Kubernetes clusters configure internal DNS to provide for service discovery automatically. This makes it easy for workloads to locate and work with each other on Kubernetes clusters.
In this webinar, learn:
* How DNS resolution works in Kubernetes with a network security solution like Tigera
* How services and pods get assigned fully qualified domain names (FQDN)
* The relationship between services and pods
Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.Read more >
While developers see and realize the benefits of Kubernetes, how it improves efficiencies, saves time, and enables focus on the unique business requirements of each project; InfoSec, infrastructure, and software operations teams still face challenges when managing a new set of tools and technologies, and integrating them into an existing enterprise infrastructure.
During this online meetup, Oleg will discuss what’s needed for a general architecture of a centralized Kubernetes operations layer based on open source components such as Prometheus, Grafana, ELK Stack, Keycloak, etc., and how to set up reliable clusters and multi-master configuration without a load balancer. He’ll also describe how these components should be combined into an operations-friendly enterprise Kubernetes management platform with centralized monitoring and log collection, identity and access management, backup and disaster recovery, and infrastructure management capabilities. This presentation will show real-world open source projects use cases to implement an ops-friendly environment.
In Kubernetes, Network Policy allows you to define a policy determining what traffic is allowed to flow to and from specific workloads. By default, Kubernetes permits ingress and egress traffic to and from all pods in a namespace. Without correct configuration your risk of a significant security breach is high. Attend this webinar and learn best practices in configuring Kubernetes network security.Read more >
Ready to learn how to manage persistent storage for containers in the multi-cloud environment?
Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.
In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.
Anubhav Sharma, VP, Business Development, Nirmata
Michael Ferranti, VP, Marketing, Portworx,
In this our first episode of the Enterprise-wide Kubernetes series, we will introduce what an enterprise-wide Kubernetes stack consists of, and will look at the compute, networking, and storage infrastructure requirements. Our featured guest will be Paulo Renato, a Principal Cloud Architect with the Microsoft Azure team. Some of the questions we will cover are:
1. What are the enterprise options for selecting Kubernetes distributions?
2. When should an enterprise choose a managed Kubernetes service?
3. How should enterprises evaluate managed Kubernetes services from the top cloud providers?
4. What else matters for Kubernetes infrastructure?
While the Container/Kubernetes revolution is starting to deliver on its promise of making application development and delivery more agile and responsive, it does so by changing some of the traditional characteristics and behaviors of the development and delivery model. Control and compliance regimes have assumed that these would continue to be constant going forward. That set of assumptions is no longer entirely correct. Attend this webinar and learn about what's changed, how those changes weaken your compliance and control environment, and what you can do to not only adjust to the new reality but actually have your security team being a key enabler of the new agile model.Read more >
The success of Kubernetes has made monitoring and alerting more difficult for traditional Security Information and Event Management (SIEM) tools. Attend this live webinar to learn how implementing the right network security and compliance solution will improve the accuracy and completeness of security forensic monitoring and alerting when using Kubernetes.Read more >
TLS v1.3 introduces several new security improvements over TLS 1.2 but some of these enhancements have an impact on network-based security solutions such as IDS/IPS. While the goal is to enhance the overall security at the application level, there are a few scenarios that are not easily solved when introducing the new technology, especially in Kubernetes environments. Watch this webinar to learn about security and compliance considerations for Kubernetes when implementing TLS v1.3.Read more >
Kubernetes has a number of different components that developers can use to model their applications. In this introductory video, Deen explains the basics of the Kubernetes workload APIs and discussing concepts like Pods. The video also shows how easy it is to deploy, run, and manage Kubernetes workloads with Nirmata, without having to deal with complex interfaces.Read more >
Kubernetes provides a rich set of tools for DevOps teams to describe, run, and manage different types of workloads. In this session, Jim discusses the Kubernetes architecture and then dives into the main concepts for cluster operations as well as controllers used to model Kubernetes applications. The session includes a demo of creating clusters, deploying and managing applications.Read more >
With Nirmata, you can securely manage Kubernetes workloads and clusters across public and private clouds. In this video, we create a Kubernetes cluster on VMware vSphere using Nirmata's cloud provider integrations. Once the cluster is up and running, we can create environments and deploy applications on it.Read more >
Hybrid cloud Kubernetes and container solution using Oracle and Nirmata. The demo includes:
1) Oracle Image Registry
2) Oracle Linux 7.5
3)Oracle Docker Engine 17.06
4) Oracle Kubernetes 1.9.1
5) Oracle Web logic server 12c
6) Oracle MySQL DB
With Nirmata the entire stack can be easily deployed on bare metal or virtual servers in a private cloud and managed seamlessly alongside Oracle Cloud Services.
While a microservice architecture, orchestrated by applications like Kubernetes, offers a tremendous business advantage for time to market, proper security and compliance controls must be put in place.
This is a crucial step when deploying microservices and teams must work together by using the proper tools during implementation. We will explore 5 things you can do to meet security and compliance requirements for your microservices stack.
Watch this webinar to learn about considerations for security and compliance with microservices, understanding key principles for compliance, and leveraging the proper security tools and methods for compliance.
Join this exclusive AWS webinar co-hosted with Tigera. We will demo how to implement turnkey compliance and security controls for Kubernetes in AWS and Amazon EKS environments.
This webinar will explore how to extract data required for IT audits and implement network segmentation and encryption to meet your security and compliance requirements. We'll cover the security and compliance challenges that users face when deploying Kubernetes in AWS and Amazon EKS environments
We'll also present a live demonstration of key capabilities within Tigera Secure Cloud Edition