List of videos

Simpler and more flexible Kubernetes Ingress: Apache APISIX | Wei Jin | Conf42 Cloud Native 2022

This session mainly shares the use and architecture of Apache APISIX Ingress. The audience can learn about the design of Apache APISIX Ingress from this sharing. Through some practical cases, it will introduce how to simplify user configuration , it is applicable to more complex cloud requirements. The outline of this sharing is as follows: - About Wei - Introduce the design of Apache APISIX Ingress - Explain the simplicity in combination with specific scenarios - Combine the case to illustrate the benefits of architectural flexibility - Outlook Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.com/cloud2022 โ€” 0:00 Intro 1:27 Talk

Watch
Rules of Observability: The Data Edition | Dave McAllister | Conf42 Cloud Native 2022

There are immutable laws and rules for many things, from nature to physics to karma. Observability, with its innate complexity, also has its own immutable rules, which transform elastic and ephemeral rote reactions to a clear and concise approach and understanding of your environment. Join us to learn the rules you should understand with your approach to observability, including: - The impact of open and flexible data ingest and instrumentation - The impact of data retention and aggregation on blind spot analysis - The impact of data accuracy and precision on observability - The innate drive for seamless workflow integration, from alerts to resolution - Why drift and skew could lead to erroneous conclusions Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.com/cloud2022 โ€” 0:00 Intro 1:27 Talk

Watch
What happens when DynamoDB explodes? A practical guide | Erez Berkner | Conf42 Cloud Native 2022

2:32 AM. PagerDuty wakes you up. DynamoDB is throttling. Should you wake up the team and fiercely charge to resolve the issue, or can it wait for tomorrow? Understanding the business impact and the affected users are the key points to making this decision. Those data points are usually not easy to obtain, especially in highly distributed asynchronous architectures like serverless. In this session, we will share guidelines on what needs to be part of your serverless application in order to be able to answer those questions in a matter of minutes. The main operational questions, when things go bad: - What is the user functionality being affected? - Which users were affected and how? - What is the root cause of these issues? Getting a good night's sleep is within armโ€™s reach... Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.com/cloud2022 โ€” 0:00 Intro 1:27 Talk

Watch
Survival Guide for Java Architect in the Cloud Era | Otavio Santana | Conf42 Cloud Native 2022

Currently, we see several cases of security breaches that caused a loss of millions, either as credibility or as new fines. As a result, new data protection laws emerge. Betting on information security guarantees quality and helps prevent these headaches, in addition to avoiding scandals that could make a software project unfeasible. The company and its team are aware of the importance of safety and prevention; it is necessary to develop a DevSecOps culture. In this talk, you will learn more about this working model and how to prevent you or someone on your team from being responsible for the next security disaster. Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.com/cloud2022 โ€” 0:00 Intro 1:27 Talk

Watch
Introduction to Ansible for Network Engineers | Jason Belk | Conf42 Cloud Native 2022

When getting started with network automation, Ansible is a super useful tool to learn. It will provide a helpful platform and framework for connecting to network devices in a secure way to make configuration changes, read operational data and build reports. You can run Ansible locally on your laptop and connect to a ton of devices to save time in your next change window, even if it is just grabbing โ€œshowโ€ commands to put into a file and view the differences between the state before and after your change. Ansible was originally designed for compute and cloud engineers, so this session is focused on how to learn it from a network engineerโ€™s perspective, assuming no previous knowledge Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.com/cloud2022 โ€” 0:00 Intro 1:27 Talk

Watch
Serverless Security Top 10 | Tal Melamed | Conf42 Cloud Native 2022

When adopting serverless technology, we eliminate the need to develop a server to manage our application and by doing so, we also pass some of the security threats to the infrastructure provider. However, serverless functions, even without provisioning or managing servers, still execute code. If this code is written in an insecure manner, it can still be vulnerable to traditional application-level attacks. The OWASP Serverless Top 10 project recently launched. In this talk, I will examine how the original Top 10 stack up for serverless apps. In particular, weโ€™ll examine the differences in attack vectors, security weaknesses, and the business impact of successful attacks on applications in the serverless world, and, most importantly, how to prevent them. As we will see, attack vectors and prevention techniques are completely different from the traditional application world. Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.comโ€‹/cloud2022 โ€” 0:00 Intro 1:27 Talk

Watch
Reimagining Application Networking and Security | Tim Szigeti | Conf42 Cloud Native 2022

Businesses are increasingly shifting their applications to microservice based architectures, as these support rapid application development with flexibility, stability, portability, and scale. However, microservice architectures present new networking and security challenges that traditional approaches simply cannot meet. For instance, securely interconnecting such microservices dynamically and at scale cannot be done with legacy systems and requires and entirely new approach, a Cloud Native approach. Similarly too, when it comes to security, it's not enough to secure an interconnection, but also containers, pods, clusters and even APIs. This requires security to be embedded early and pervasively into the entire CI/CD pipeline, and not simply as an after-the-fact consideration. In this session weโ€™ll lay out some of the key problem areas, industry best practices and demonstrate solutions to meet these new and complex requirements. Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.comโ€‹/cloud2022

Watch
Argo CD and Kubernetes from event based to microservices | Ramesh Patel | Conf42 Cloud Native 2022

As a small firm starting up we relied heavily on aws resources at first to get our event based architecture in place for rapid code deployment. As our core api became very large on fargate we ran into issues with a bulky ci/cd process and slower release cycles. This is why we have made a move to shift off fargate and move to kubernetes and break apart our monolith using domain driven design. We would like to walk you through the hurdles we faced and what our current design looks like using Argo CD and kubernetes. Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.com/cloud2022 โ€” 0:00 Intro 1:27 Talk

Watch
5 Open Source Cloud Native Security Tools | Aviram Shmueli | Conf42 Cloud Native 2022

The minimum viable security (MVS) approach, enables us to easily bake security into our cloud config files, apps, and CI/CD processes with a few simple controls built - and the great part? It's easily achievable through cloud native open source tooling. In this talk we will focus on five critical security controls that will be integrated as part of your typical cloud native operations and CI/CD pipeline and provide an overview of some of the existing tools for which challenge - with our take on the right one for the job - from npm audit to OWASP dependency check, Gitleaks to detect-secrets, to KICS & Chekhov for IaC scanning, Trivy to container security scanning, OWASP ZAP and much more. These controls will provide a foundational framework for securing your applications from the first line of code, that will make it possible to continuously iterate and evolve your security maturity all the way through advanced layers of security that comes with time, as well as increased experience with your deployments, stacks, and security posture. Code examples & demos will be showcased as part of this session. Other talks at this conference ๐Ÿš€๐Ÿช https://www.conf42.com/cloud2022 โ€” 0:00 Intro 1:27 Talk

Watch