In this presentation, I'm addressing all the organizational issues related to devops teams and the rise of platform engineering. The good, the bad, and the pitfalls of how to organize your team (effort, skills, and gtd).
This deck was presented at Lendingkart meetup in Bangalore covering our experiences with creating CI/CD Pipeline with Kubernetes. Here is the video link of the meetup.
https://youtu.be/YraPL_NGmcs
Discussion of how security is in crisis but DevSecOps offers a new playbook and gives security a path to influence. Taking a look at the WAF space, we look at how Signal Sciences has created feedback between Dev and Ops and Security to create new value.
Canary Releases on Kubernetes w/ Spinnaker, Istio, and PrometheusKublr
In a microservices world, applications consist of dozens, hundreds, or even thousands of components. Manually deploying and verifying deployment quality in production is virtually impossible. Kubernetes, which natively supports rolling updates, enables blue-green application deployments with Spinnaker. However, gradual rollouts is a feature that doesn't come out-of-the-box but can be achieved by adding Istio and Prometheus to the equation.
During this meetup, Slava Koltovich, CEO of Kublr, and Oleg Atamanenko, Senior Software Architect, discussed canary release implementations on Kubernetes with Spinnaker, Istio, and Prometheus. They examined the role of each tool in the process and how they are all connected. During a demo, they demonstrated a successful and a failed canary release, and how these tools enable IT teams to properly roll out changes to their customer base without any downtime.
This document provides an overview of Docker and Kubernetes (K8S). It defines Docker as an open platform for developing, shipping and running containerized applications. Key Docker features include isolation, low overhead and cross-cloud support. Kubernetes is introduced as an open-source tool for automating deployment, scaling, and management of containerized applications. It operates at the container level. The document then covers K8S architecture, including components like Pods, Deployments, Services and Nodes, and how K8S orchestrates containers across clusters.
There are millions of applications that require frequent updates which risks errors and poor customer experiences if not implemented carefully. To mitigate these risks, companies use deployment strategies like blue/green deployments that maintain two identical production environments or canary deployments that first roll out updates to a small subset of users to test for issues before broader release. BuildPiper is a tool that aims to simplify deployments through these strategies to minimize problems from application updates.
This document provides an overview of DevOps delivery pipelines for beginners. It defines key concepts like source code repositories, build artifacts, environments, and the roles of continuous integration and continuous delivery. The core DevOps principle is an automated software delivery pipeline from code to production. This involves separate build and deploy stages. Common build steps include fetching code, testing, packaging artifacts, and publishing to repositories. Deployment typically includes retrieving artifacts, configuring environments, and validating deployments. Setting up roles, notifications, versioned scripts, and avoiding complex triggers are best practices for enjoying an automated DevOps pipeline.
This document discusses Docker Inc's transition to running their infrastructure on Docker EE (Docker Enterprise Edition). Some key points:
- Previously Docker Inc ran their infrastructure (Docker Hub, Docker Store, etc) on a collection of Docker hosts managed imperatively without orchestration.
- They transitioned to running everything on Docker EE for the benefits of declarative orchestration using Docker Swarm, access controls, and resource management.
- The transition was done by changing the orchestration layer only, without changing applications, containers, logs, metrics, etc. This allowed them to gradually transition services to Docker EE.
- Running as a customer of their own product has provided Docker Inc valuable insights into best practices, feature requests
Kubernetes Webinar - Using ConfigMaps & Secrets Janakiram MSV
Many applications require configuration using some combination of configuration files, command line arguments, and environment variables. ConfigMaps in Kubernetes provide mechanisms to inject containers with configuration data while keeping them portable. Secrets decouple sensitive content from the pods using a volume plug-in. This webinar will discuss the use cases and scenarios for using ConfigMaps and Secrets.
This deck was presented at Lendingkart meetup in Bangalore covering our experiences with creating CI/CD Pipeline with Kubernetes. Here is the video link of the meetup.
https://youtu.be/YraPL_NGmcs
Discussion of how security is in crisis but DevSecOps offers a new playbook and gives security a path to influence. Taking a look at the WAF space, we look at how Signal Sciences has created feedback between Dev and Ops and Security to create new value.
Canary Releases on Kubernetes w/ Spinnaker, Istio, and PrometheusKublr
In a microservices world, applications consist of dozens, hundreds, or even thousands of components. Manually deploying and verifying deployment quality in production is virtually impossible. Kubernetes, which natively supports rolling updates, enables blue-green application deployments with Spinnaker. However, gradual rollouts is a feature that doesn't come out-of-the-box but can be achieved by adding Istio and Prometheus to the equation.
During this meetup, Slava Koltovich, CEO of Kublr, and Oleg Atamanenko, Senior Software Architect, discussed canary release implementations on Kubernetes with Spinnaker, Istio, and Prometheus. They examined the role of each tool in the process and how they are all connected. During a demo, they demonstrated a successful and a failed canary release, and how these tools enable IT teams to properly roll out changes to their customer base without any downtime.
This document provides an overview of Docker and Kubernetes (K8S). It defines Docker as an open platform for developing, shipping and running containerized applications. Key Docker features include isolation, low overhead and cross-cloud support. Kubernetes is introduced as an open-source tool for automating deployment, scaling, and management of containerized applications. It operates at the container level. The document then covers K8S architecture, including components like Pods, Deployments, Services and Nodes, and how K8S orchestrates containers across clusters.
There are millions of applications that require frequent updates which risks errors and poor customer experiences if not implemented carefully. To mitigate these risks, companies use deployment strategies like blue/green deployments that maintain two identical production environments or canary deployments that first roll out updates to a small subset of users to test for issues before broader release. BuildPiper is a tool that aims to simplify deployments through these strategies to minimize problems from application updates.
This document provides an overview of DevOps delivery pipelines for beginners. It defines key concepts like source code repositories, build artifacts, environments, and the roles of continuous integration and continuous delivery. The core DevOps principle is an automated software delivery pipeline from code to production. This involves separate build and deploy stages. Common build steps include fetching code, testing, packaging artifacts, and publishing to repositories. Deployment typically includes retrieving artifacts, configuring environments, and validating deployments. Setting up roles, notifications, versioned scripts, and avoiding complex triggers are best practices for enjoying an automated DevOps pipeline.
This document discusses Docker Inc's transition to running their infrastructure on Docker EE (Docker Enterprise Edition). Some key points:
- Previously Docker Inc ran their infrastructure (Docker Hub, Docker Store, etc) on a collection of Docker hosts managed imperatively without orchestration.
- They transitioned to running everything on Docker EE for the benefits of declarative orchestration using Docker Swarm, access controls, and resource management.
- The transition was done by changing the orchestration layer only, without changing applications, containers, logs, metrics, etc. This allowed them to gradually transition services to Docker EE.
- Running as a customer of their own product has provided Docker Inc valuable insights into best practices, feature requests
Kubernetes Webinar - Using ConfigMaps & Secrets Janakiram MSV
Many applications require configuration using some combination of configuration files, command line arguments, and environment variables. ConfigMaps in Kubernetes provide mechanisms to inject containers with configuration data while keeping them portable. Secrets decouple sensitive content from the pods using a volume plug-in. This webinar will discuss the use cases and scenarios for using ConfigMaps and Secrets.
Get hands-on with security features and best practices to protect your containerized services. Learn to push and verify signed images with Docker Content Trust, and collaborate with delegation roles. Intermediate to advanced level Docker experience recommended, participants will be building and pushing with Docker during the workshop.
Led By Docker Security Experts:
Riyaz Faizullabhoy
David Lawrence
Viktor Stanchev
Experience Level: Intermediate to advanced level Docker experience recommended
Introduction to Team Foundation Server (TFS) OnlineDenis Voituron
TFS est la plateforme de collaboration qui se trouve au coeur de la solution de gestion du cycle de vie des applications (ALM) de Microsoft. Pour de petites équipes de développement (5 users), TFS est disponible online et gratuitement.
Lors de cette session, principalement à base d'exemples pratiques, nous aborderons les modules Source Controle, Collaborate (gestion des tâches et des bugs) et Automatic Builds (compilations et déploiements automatisés).
Docker For Windows | Setting Up Docker On Windows | EdurekaEdureka!
** Docker Training : https://www.edureka.co/docker-training **
YouTube Video: https://youtu.be/iJeL2tOFfvM
In this PPT on Docker For Windows we’ll discuss about one of the most popular DevOps tools, i.e. docker. Docker is one of the best containerization platforms out there and in this PPT, we’re specifically going to discuss docker for windows. I’ll be covering the following topics:
Why use Docker For Windows?
Prerequisites
Tools installed with Docker For Windows
What is Docker?
Docker Terminologies
Install Docker For Windows
Hands-On
Check our complete DevOps playlist here (includes all the videos mentioned in the video): http://goo.gl/O2vo13
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
¿Queres realizar un proyecto de #DevSecOps y no sabés por dónde empezar?
En estas paginas no te vamos a brindar la receta mágica o la super metodología de #DevSecOps porque eso no existe. En su lugar este E-book está destinado a ser en parte terapéutico y en parte de alerta temprana. “Las historias presentadas no son una hoja de ruta. Lo que hacen es reconocer el fracaso como parte de la base de conocimiento de la comunidad DevSecOps”.
El verdadero aprendizaje, llega a través del fracaso. Si algo sale mal, tenemos que revolver, experimentar, hackear y nuestras mentes están más abiertas a recibir aportes externos.
O documento apresenta os conceitos e práticas do DevOps, descrevendo: (1) O que é DevOps, como uma filosofia que promove a integração entre equipes de desenvolvimento e operações; (2) A história do DevOps e sua evolução ao longo dos anos; (3) Ferramentas comumente usadas no DevOps.
GitHub investierte sehr stark im Bereich Security und hat als weltweit grösste Open-Source-Plattform auch die ideale Basis, um Abhängigkeiten und Schwachstellen viel genutzter Bibliotheken zu analysieren und zu notifizieren. In öffentlichen wie auch in privaten Repositories in GitHub Enterprise Cloud und GitHub Enterprise Server stehen einem unter dem Betriff "GitHub Advanced Security" eine Vielzahl von Sicherheitsfunktionen zur Verfügung.
Dieser Vortrag zeigt die Funktionsweise der Features Code Scanning, Secret Scanning und Dependency Review auf. GitHub Actions und Pull Requests runden die Werkzeugkiste für einen erfolgreichen DevSecOps-Prozess ab.
This document summarizes Google I/O 2015, including:
- New permissions model in Android M to allow users control over app permissions.
- Power improvements in Doze and App Standby modes to improve battery life.
- Automatic app backups to Google Drive by default.
- Engagement tools for developers like Universal Ad Campaigns, App Invites, and A/B testing.
- Future projects like Project Brillo for IoT and expanded support for Google Photos and Cardboard VR.
In this presentation, we’ll show security mechanisms and protections related to OpenShift Container Platform and our experiences deploying and using OpenShift, including:
Security mechanisms, such as user and network access control and policies in Openshift and underlying Openstack, the audit trail of administrative actions, ways to use and protect Kubernetes secrets, and the concealment of application data.
How to address technical limitations or potentially unknown vectors of attack using compensating controls via auditd, monitoring, and alerting.
Security practices in Docker containers.
Use OpenSCAP auditing tool and profiles to audit virtual machine (VM) hosts and container images in our release pipeline.
We are building an application platform that is made up of ~20 microservices. Different microservices have the need to use different types of secrets (passwords, API keys, license keys, RSA keys, etc.) and these secrets are given to us by different internal/external teams. The presentation covered the need to manage secrets as code and the challenges that comes with it. One approach of solving this using Git, AWS KMS, Mozilla SOPS, Kubernetes Secrets and Helm Charts was presented.
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. It coordinates activities across a cluster of machines by defining basic building blocks like pods (which contain containers), replication controllers (which ensure a specified number of pods are running), and services (which define logical groups of pods). Kubernetes provides tools for running applications locally on a single node as well as managing resources in the cluster, including creating, deleting, viewing, and updating resources from configuration files.
The combination of StackPointCloud with NetApp creates NetApp Kubernetes Service, the industry’s first complete Kubernetes platform for multi-cloud deployments and a complete cloud-based stack for Azure, Google Cloud, AWS, and NetApp HCI. Further, Trident is a fully supported open source project maintained by NetApp, designed from the ground up to help meet the sophisticated persistence demands of containerized applications.
Palo Alto Networks provides a Cloud Access Security Broker (CASB) solution by natively integrating its Aperture, SAML Proxy, Next Generation Firewall (NGFW), and GlobalProtect products. These features work together to enforce security policies as managed devices access cloud services, such as authentication, authorization, and malware detection. The Aperture API also connects directly to software-as-service applications to provide additional data security capabilities like classification, leakage prevention, and threat detection.
Today much of our online world is powered by cloud computing & Amazon Web Services(AWS) offers an amazing depth and breadth of available services. In this event, we will collect our AWS logs by Integrating them with Splunk Observability.
The document provides information on how to write a Dockerfile, including:
- What a Dockerfile is and its purpose of providing instructions to build a Docker image
- Common Dockerfile instructions like FROM, RUN, COPY, EXPOSE, and CMD
- Best practices for writing Dockerfiles such as making images smaller, choosing the correct build context, leveraging the build cache, and ordering instructions
- Additional topics covered include the Docker build context, Dockerfile format, and tools like Docker BuildKit and Docker Scan. The presentation concludes with a demonstration of Dockerfiles.
Prowler: Cloud Security Assessment, Auditing, Hardening, Compliance and Forensics Readiness Tool
Prowler helps to assess, audit and harden your AWS account configuration and resources. It also helps to check your configuration with CIS recommendations, and check if your cloud infrastructure is GDPR compliance or if you are ready for a proper forensic investigation. It is a command line tool that provides direct and clear information about configuration status related to security of a given AWS account, it performs more than 80 checks.
1. Traditional database development faces issues like lack of source control, tedious deployment scripts, and manual processes.
2. DevOps principles like continuous integration, static code analysis, and automation can help address these issues. Database changes can be tracked in source control and deployed automatically.
3. There are different approaches to database deployment like state-based using DACPAC files or migration-based using incremental scripts stored in source control. Tools like SSDT, ReadyRoll, and Flyway support these approaches.
EGL is an interface between Khronos rendering APIs (such as OpenGL and OpenGL ES) and the underlying native platform windowing system. It handles graphics context management, surface/buffer creation and binding, and rendering synchronization. EGL provides mechanisms for creating on-screen and off-screen rendering surfaces and graphics contexts that store OpenGL state. Key EGL functions include eglGetDisplay(), eglInitialize(), eglChooseConfig(), eglCreateWindowSurface(), and eglCreatePbufferSurface().
Monitoring & alerting presentation sabin&mustafaLama K Banna
Monitoring systems help detect problems early, inform decision making, and enable automation. They do this by collecting data on system performance, aggregating and storing that data, and presenting visualizations. Early problem detection through monitoring can find resource saturation issues, downtime that costs revenue, and bugs only seen under heavy loads. Decision making is aided by establishing baselines and SLAs, and performing in-depth analysis. Automation allows systems to adapt to high loads. Effective monitoring involves measuring extensively but alarming selectively, learning from experience, and having a monitoring strategy.
This document discusses infrastructure as code and the HashiCorp ecosystem. Infrastructure as code allows users to define and provision infrastructure through code rather than manual configuration. It can be used to launch, create, change, and downscale infrastructure based on configuration files. Tools like Terraform allow showing what changes will occur before applying them through files like main.tf and variables.tf. Terraform is part of the broader HashiCorp ecosystem of tools.
Fernando Honig discusses moving from traditional datacenter models to a new cloud and DevOps model. He emphasizes automating servers, treating infrastructure as code, using configuration management and continuous integration tools. Honig also stresses testing all code, releasing often through continuous deployment, and using metrics to monitor and improve processes. The overall presentation focuses on how organizations can adopt DevOps practices to accelerate software delivery and recover more quickly from failures.
In this session, we'll unravel the core and essential pillars of any 'secure' Kubernetes cluster, that you absolutely can't ignore if you are running Kubernetes in production (or plan to). You'll discover the key concepts and strategies pivotal to safeguarding your Kubernetes environments. Our focus will be on practical, real-world applications, demystifying complex security challenges. Regardless if you are from a large organisation or from a small start-up, a seasoned DevOps professiyou will walk away with foundational knowledge and actionable insights, ready to implement stronger security measures in their Kubernetes deployments. Whether you're a seasoned DevOps professional or new to the cloud native arena, this talk will enhance your understanding of Kubernetes security, ensuring you're prepared for the evolving landscape of cloud native security.
Agile.. and then? – Enterprise DevOps: the digital transformation of the IT...Peter Muryshkin
Learn how DevOps can help ITSM to access the strategic value envelope available for the digital transformation of the enterprise.
Today, ITSM has to deal with many new, disruptive things.
Digital transformation should be a key asset in the transformational leadership portfolio. For the enterprise IT, DevOps can be the cross functional common language and the toolkit to make the IT part of this transformation.
Get hands-on with security features and best practices to protect your containerized services. Learn to push and verify signed images with Docker Content Trust, and collaborate with delegation roles. Intermediate to advanced level Docker experience recommended, participants will be building and pushing with Docker during the workshop.
Led By Docker Security Experts:
Riyaz Faizullabhoy
David Lawrence
Viktor Stanchev
Experience Level: Intermediate to advanced level Docker experience recommended
Introduction to Team Foundation Server (TFS) OnlineDenis Voituron
TFS est la plateforme de collaboration qui se trouve au coeur de la solution de gestion du cycle de vie des applications (ALM) de Microsoft. Pour de petites équipes de développement (5 users), TFS est disponible online et gratuitement.
Lors de cette session, principalement à base d'exemples pratiques, nous aborderons les modules Source Controle, Collaborate (gestion des tâches et des bugs) et Automatic Builds (compilations et déploiements automatisés).
Docker For Windows | Setting Up Docker On Windows | EdurekaEdureka!
** Docker Training : https://www.edureka.co/docker-training **
YouTube Video: https://youtu.be/iJeL2tOFfvM
In this PPT on Docker For Windows we’ll discuss about one of the most popular DevOps tools, i.e. docker. Docker is one of the best containerization platforms out there and in this PPT, we’re specifically going to discuss docker for windows. I’ll be covering the following topics:
Why use Docker For Windows?
Prerequisites
Tools installed with Docker For Windows
What is Docker?
Docker Terminologies
Install Docker For Windows
Hands-On
Check our complete DevOps playlist here (includes all the videos mentioned in the video): http://goo.gl/O2vo13
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
¿Queres realizar un proyecto de #DevSecOps y no sabés por dónde empezar?
En estas paginas no te vamos a brindar la receta mágica o la super metodología de #DevSecOps porque eso no existe. En su lugar este E-book está destinado a ser en parte terapéutico y en parte de alerta temprana. “Las historias presentadas no son una hoja de ruta. Lo que hacen es reconocer el fracaso como parte de la base de conocimiento de la comunidad DevSecOps”.
El verdadero aprendizaje, llega a través del fracaso. Si algo sale mal, tenemos que revolver, experimentar, hackear y nuestras mentes están más abiertas a recibir aportes externos.
O documento apresenta os conceitos e práticas do DevOps, descrevendo: (1) O que é DevOps, como uma filosofia que promove a integração entre equipes de desenvolvimento e operações; (2) A história do DevOps e sua evolução ao longo dos anos; (3) Ferramentas comumente usadas no DevOps.
GitHub investierte sehr stark im Bereich Security und hat als weltweit grösste Open-Source-Plattform auch die ideale Basis, um Abhängigkeiten und Schwachstellen viel genutzter Bibliotheken zu analysieren und zu notifizieren. In öffentlichen wie auch in privaten Repositories in GitHub Enterprise Cloud und GitHub Enterprise Server stehen einem unter dem Betriff "GitHub Advanced Security" eine Vielzahl von Sicherheitsfunktionen zur Verfügung.
Dieser Vortrag zeigt die Funktionsweise der Features Code Scanning, Secret Scanning und Dependency Review auf. GitHub Actions und Pull Requests runden die Werkzeugkiste für einen erfolgreichen DevSecOps-Prozess ab.
This document summarizes Google I/O 2015, including:
- New permissions model in Android M to allow users control over app permissions.
- Power improvements in Doze and App Standby modes to improve battery life.
- Automatic app backups to Google Drive by default.
- Engagement tools for developers like Universal Ad Campaigns, App Invites, and A/B testing.
- Future projects like Project Brillo for IoT and expanded support for Google Photos and Cardboard VR.
In this presentation, we’ll show security mechanisms and protections related to OpenShift Container Platform and our experiences deploying and using OpenShift, including:
Security mechanisms, such as user and network access control and policies in Openshift and underlying Openstack, the audit trail of administrative actions, ways to use and protect Kubernetes secrets, and the concealment of application data.
How to address technical limitations or potentially unknown vectors of attack using compensating controls via auditd, monitoring, and alerting.
Security practices in Docker containers.
Use OpenSCAP auditing tool and profiles to audit virtual machine (VM) hosts and container images in our release pipeline.
We are building an application platform that is made up of ~20 microservices. Different microservices have the need to use different types of secrets (passwords, API keys, license keys, RSA keys, etc.) and these secrets are given to us by different internal/external teams. The presentation covered the need to manage secrets as code and the challenges that comes with it. One approach of solving this using Git, AWS KMS, Mozilla SOPS, Kubernetes Secrets and Helm Charts was presented.
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. It coordinates activities across a cluster of machines by defining basic building blocks like pods (which contain containers), replication controllers (which ensure a specified number of pods are running), and services (which define logical groups of pods). Kubernetes provides tools for running applications locally on a single node as well as managing resources in the cluster, including creating, deleting, viewing, and updating resources from configuration files.
The combination of StackPointCloud with NetApp creates NetApp Kubernetes Service, the industry’s first complete Kubernetes platform for multi-cloud deployments and a complete cloud-based stack for Azure, Google Cloud, AWS, and NetApp HCI. Further, Trident is a fully supported open source project maintained by NetApp, designed from the ground up to help meet the sophisticated persistence demands of containerized applications.
Palo Alto Networks provides a Cloud Access Security Broker (CASB) solution by natively integrating its Aperture, SAML Proxy, Next Generation Firewall (NGFW), and GlobalProtect products. These features work together to enforce security policies as managed devices access cloud services, such as authentication, authorization, and malware detection. The Aperture API also connects directly to software-as-service applications to provide additional data security capabilities like classification, leakage prevention, and threat detection.
Today much of our online world is powered by cloud computing & Amazon Web Services(AWS) offers an amazing depth and breadth of available services. In this event, we will collect our AWS logs by Integrating them with Splunk Observability.
The document provides information on how to write a Dockerfile, including:
- What a Dockerfile is and its purpose of providing instructions to build a Docker image
- Common Dockerfile instructions like FROM, RUN, COPY, EXPOSE, and CMD
- Best practices for writing Dockerfiles such as making images smaller, choosing the correct build context, leveraging the build cache, and ordering instructions
- Additional topics covered include the Docker build context, Dockerfile format, and tools like Docker BuildKit and Docker Scan. The presentation concludes with a demonstration of Dockerfiles.
Prowler: Cloud Security Assessment, Auditing, Hardening, Compliance and Forensics Readiness Tool
Prowler helps to assess, audit and harden your AWS account configuration and resources. It also helps to check your configuration with CIS recommendations, and check if your cloud infrastructure is GDPR compliance or if you are ready for a proper forensic investigation. It is a command line tool that provides direct and clear information about configuration status related to security of a given AWS account, it performs more than 80 checks.
1. Traditional database development faces issues like lack of source control, tedious deployment scripts, and manual processes.
2. DevOps principles like continuous integration, static code analysis, and automation can help address these issues. Database changes can be tracked in source control and deployed automatically.
3. There are different approaches to database deployment like state-based using DACPAC files or migration-based using incremental scripts stored in source control. Tools like SSDT, ReadyRoll, and Flyway support these approaches.
EGL is an interface between Khronos rendering APIs (such as OpenGL and OpenGL ES) and the underlying native platform windowing system. It handles graphics context management, surface/buffer creation and binding, and rendering synchronization. EGL provides mechanisms for creating on-screen and off-screen rendering surfaces and graphics contexts that store OpenGL state. Key EGL functions include eglGetDisplay(), eglInitialize(), eglChooseConfig(), eglCreateWindowSurface(), and eglCreatePbufferSurface().
Monitoring & alerting presentation sabin&mustafaLama K Banna
Monitoring systems help detect problems early, inform decision making, and enable automation. They do this by collecting data on system performance, aggregating and storing that data, and presenting visualizations. Early problem detection through monitoring can find resource saturation issues, downtime that costs revenue, and bugs only seen under heavy loads. Decision making is aided by establishing baselines and SLAs, and performing in-depth analysis. Automation allows systems to adapt to high loads. Effective monitoring involves measuring extensively but alarming selectively, learning from experience, and having a monitoring strategy.
This document discusses infrastructure as code and the HashiCorp ecosystem. Infrastructure as code allows users to define and provision infrastructure through code rather than manual configuration. It can be used to launch, create, change, and downscale infrastructure based on configuration files. Tools like Terraform allow showing what changes will occur before applying them through files like main.tf and variables.tf. Terraform is part of the broader HashiCorp ecosystem of tools.
Fernando Honig discusses moving from traditional datacenter models to a new cloud and DevOps model. He emphasizes automating servers, treating infrastructure as code, using configuration management and continuous integration tools. Honig also stresses testing all code, releasing often through continuous deployment, and using metrics to monitor and improve processes. The overall presentation focuses on how organizations can adopt DevOps practices to accelerate software delivery and recover more quickly from failures.
In this session, we'll unravel the core and essential pillars of any 'secure' Kubernetes cluster, that you absolutely can't ignore if you are running Kubernetes in production (or plan to). You'll discover the key concepts and strategies pivotal to safeguarding your Kubernetes environments. Our focus will be on practical, real-world applications, demystifying complex security challenges. Regardless if you are from a large organisation or from a small start-up, a seasoned DevOps professiyou will walk away with foundational knowledge and actionable insights, ready to implement stronger security measures in their Kubernetes deployments. Whether you're a seasoned DevOps professional or new to the cloud native arena, this talk will enhance your understanding of Kubernetes security, ensuring you're prepared for the evolving landscape of cloud native security.
Agile.. and then? – Enterprise DevOps: the digital transformation of the IT...Peter Muryshkin
Learn how DevOps can help ITSM to access the strategic value envelope available for the digital transformation of the enterprise.
Today, ITSM has to deal with many new, disruptive things.
Digital transformation should be a key asset in the transformational leadership portfolio. For the enterprise IT, DevOps can be the cross functional common language and the toolkit to make the IT part of this transformation.
The DevOps paradigm - the evolution of IT professionals and opensource toolkitMarco Ferrigno
This document discusses the DevOps paradigm and tools. It begins by defining DevOps as focusing on communication and cooperation between development and operations teams. It then discusses concepts like continuous integration, delivery and deployment. It provides examples of tools used in DevOps like Docker, Kubernetes, Ansible, and monitoring tools. It discusses how infrastructure has evolved to be defined through code. Finally, it discusses challenges of security in DevOps and how DevOps works aligns with open source principles like meritocracy, metrics, and continuous improvement.
This document summarizes the DevOps paradigm and tools. It discusses how DevOps aims to improve communication and cooperation between development and operations teams through practices like continuous integration, delivery, and deployment. It then provides an overview of common DevOps tools for containers, cluster management, automation, CI/CD, monitoring, and infrastructure as code. Specific tools mentioned include Docker, Kubernetes, Ansible, Jenkins, and AWS CloudFormation. The document argues that adopting open source principles and emphasizing leadership, culture change, and talent growth are important for successful DevOps implementation.
This document provides a guide for becoming a DevOps engineer. It discusses what DevOps is, the responsibilities of a DevOps engineer, and the necessary technical and non-technical skills. Foundational skills like Linux, programming, Git, networking and cloud are recommended. Technical skills like CI/CD, containers, Kubernetes, infrastructure as code and security are important. Non-technical skills include understanding DevOps culture, communication, Agile principles and Lean. The document provides certification and learning resources recommendations.
DevOps combines software development and IT operations to shorten the development lifecycle while allowing for frequent, close-aligned releases with business objectives. It uses toolchains across coding, building, testing, packaging, releasing, configuring, and monitoring. Key principles include incorporating business needs, decomposing user stories methodically, and using clouds to improve computing. DevOps emerged from agile methodology and blends development and operations roles. Career paths can begin as system administrators who gain programming skills or developers who learn operations processes.
This conference is dedicated exclusively to application development, cloud transformation and web new framework like Blazor,
Angular, React, software architecture and Patterns like Microservices and Functions, IA and ML, Blockchain, Big data, analytics, IoT.and more.
This is the first edition of TechDay Conf, it is a virtual Conference, this conference, full-day technical sessions, 2 hours of learning. and sharing.
This virtual conference will be presented MVP (Microsoft Most Valuable Professional) and expert, by a slot of 15 minutes each one to present the best practices or a demo.
This digital virtual event enables all types of developers to connect and learn differents online sessions in two languages: French and English.
Managing Infrastructure as a Product - Introduction to Platform EngineeringAdityo Pratomo
This is an introduction to platform engineering, the bridge that truly fulfills DevOps potential inside a mid-large scale organization. Sure, it's all the rage these days, but I'd argue to completely develop a platform, a product thinking mindset is also required.
This talk was presented in Kubernetes Day Indonesia 2022
OPENING KEYNOTE:
The Cloud Native Computing Foundation (CNCF) is an open source software foundation dedicated to making cloud native computing universal and sustainable. With over 300 members including the world’s largest public cloud and enterprise software companies, Alexis Richardson, CEO of Weaveworks and chair of the CNCF Technical Oversight Committee will walk you through some success stories, and why cloud native is the way forward. You’ll learn why Kubernetes and other CNCF projects have some of the fastest adoption rates in the history of open source, and how this is only the beginning.
Alexis will then show how you can increase speed and reliability in your development workflows even further by using the GitOps model, which has been developed at Weaveworks. You’ll learn about the core concepts of GitOps, including customer success stories, and how you can benefit from using this model.
Dev Ops for systems of record - Talk at Agile Australia 2015Mirco Hering
Mirco Hering is a DevOps and Agile lead with over 10 years of experience improving IT delivery through automation, methodology, and innovation. The document discusses applying DevOps principles to systems of record like packaged software, non-custom code, and older custom code. It outlines challenges in automating builds, deployments, testing and integrating these systems. It provides examples of automating merges and traceability for a Siebel system to help systems of record adopt DevOps practices and continuous delivery.
The document discusses how DevOps can help transform enterprises from traditional slow and siloed software development processes to more agile and collaborative processes. It introduces a "Sonar model" to visualize how DevOps establishes feedback loops between development, testing, operations, and business users to continuously improve products and give businesses a competitive advantage. The model shows how Agile development, DevOps practices like continuous integration and delivery, and incorporating long-term business feedback can work together to achieve project, product, and business goals.
Containers, Serverless, Polyglot Development World, And Others…10 trends resh...PROIDEA
During this presentation, you will learn about the 10 changes that might reshape the developer tools market in the next 10 years. Jarek will discuss containers, serverless functions, and how it all supports an agile and CI/CD experience. The move to a polyglot development world means most applications will be written in a mix of languages, with developers favoring tools that help them navigate easily between languages. Jarek will also walk us through the evolution away from stand-alone developer workstations toward cloud-and-container based development environments offered as a service.
This document provides tips for organizing code in new Unity projects. It recommends using a hub manager script to organize logic into groups and namespaces. Script execution order and custom app flows using coroutines and events are also discussed. Code should be organized pragmatically with self-speaking names and smart commenting rather than following dogmas. Behavior trees and reactive patterns can help structure application logic and data flow.
Docker Geneva Meetup - Introduction to DockerSmartWave
This document provides an introduction to Docker. It begins with an agenda and then discusses how Docker addresses issues with traditional monolithic applications like long development cycles and difficulty scaling. Docker allows for decoupled services, fast iterations, and increased portability. Case studies show Docker helping companies reduce development to production time from months to minutes and increase infrastructure utilization. The technical introduction explains that a container is an isolated process that includes everything an app needs to run. Docker Engine manages containers that share the underlying OS kernel. The demo portion was to illustrate Docker concepts in action.
DevOps is a one-stop solution for all software engineering. From creating the software to implementing it in real-time, DevOps does all. This creates an infinite demand for excellent DevOps developers in the market. Since the platform is quite fast and effective, it is attracting the attention of many organizations that are looking to develop a software solution for their own business. Thus, here are a few DevOps interview questions that can help you crack an interview.
Contino is a global professional services firm that helps enterprises accelerate innovation through DevOps and cloud-native computing. They have the largest pool of DevOps talent, can rapidly scale to meet client needs worldwide, and have more DevOps transformation experience than any other firm. Contino advises clients on DevOps best practices, security, and cloud migrations using data-driven frameworks to improve time-to-market and agility without exposing clients to undue risk.
A DETAILED ROADMAP TO BECOMING A DEVOPS ENGINEEROrion eSolutions
If you are looking forward to establishing your career as a DevOps engineer, you are on the right track.
But, before moving forward to how to become a DevOps engineer, let's discuss what DevOps engineering is and how it benefits business enterprises.
In the ever-evolving landscape of software development, staying ahead of the curve requires leveraging the latest tools and technologies. As we enter 2024, developers are faced with a plethora of options for streamlining their workflows, enhancing collaboration, and delivering high-quality software solutions.
Integrated Development Environments (IDEs):
IDEs are the cornerstone of modern software development, providing developers with a unified platform for writing, editing, and debugging code. With features like syntax highlighting, code completion, and version control integration, IDEs such as Visual Studio Code, IntelliJ IDEA, and Eclipse streamline the development process and improve productivity.
Collaboration Tools:
Collaboration tools play a crucial role in fostering communication and teamwork among developers. Platforms like Slack, Microsoft Teams, and Zoom provide instant messaging, video conferencing, and file sharing capabilities, enabling developers to collaborate effectively, regardless of their location or time zone.
Code Editors:
Code editors are lightweight yet powerful tools for writing and editing code. With features like customizable themes, plug-in support, and multi-language syntax highlighting, code editors like Sublime Text, Atom, and Vim enhance coding efficiency and readability, enabling developers to write clean and maintainable code.
Testing Frameworks:
Testing frameworks such as Selenium, JUnit, and PyTest enable developers to automate the testing process and ensure the quality of their code. By writing and running test cases, testing frameworks help identify and fix bugs early in the development cycle, reducing the risk of defects in production.
Continuous Integration/Continuous Deployment (CI/CD) Tools:
CI/CD tools like Jenkins, Travis CI, and CircleCI automate the process of building, testing, and deploying software updates. By integrating with version control systems and automating repetitive tasks, CI/CD tools enable developers to deliver software faster and more reliably, accelerating time-to-market and enhancing agility.
Code Quality Analysis Tools:
Code quality analysis tools like SonarQube, ESLint, and Checkstyle help developers identify and fix code smells and vulnerabilities. By analyzing code against coding standards and best practices, code quality analysis tools ensure the maintainability and security of software projects, enabling developers to write clean and robust code.
Performance Monitoring Tools:
Performance monitoring tools such as New Relic, Datadog, and Prometheus enable developers to monitor and optimize the performance of their applications in real-time. By collecting and analyzing metrics like response time, throughput, and error rate, performance monitoring tools help developers identify and address performance bottlenecks, ensuring optimal application performance and user experience.
In Data Engineer’s Lunch #68, Will Angel, Technical Product Manager at Caribou Financial, will provide an introduction to DevOps practices and tooling including testing, deployment automation, logging, monitoring, and DevOps principles. Additionally, we will discuss some of the ways that DevOps for data engineering is different from conventional application development.
Accompanying Blog: Coming Soon!
Accompanying YouTube: https://youtu.be/eBtrOv_qLHQ
Sign Up For Our Newsletter: http://eepurl.com/grdMkn
Join Data Engineer’s Lunch Weekly at 12 PM EST Every Monday:
https://www.meetup.com/Data-Wranglers-DC/events/
Cassandra.Link:
https://cassandra.link/
Follow Us and Reach Us At:
Anant:
https://www.anant.us/
Awesome Cassandra:
https://github.com/Anant/awesome-cassandra
Email:
solutions@anant.us
LinkedIn:
https://www.linkedin.com/company/anant/
Twitter:
https://twitter.com/anantcorp
Eventbrite:
https://www.eventbrite.com/o/anant-1072927283
Facebook:
https://www.facebook.com/AnantCorp/
Join The Anant Team:
https://www.careers.anant.us
Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...Dana Gardner
Transcript of a BriefingsDirect discussion on how continuous processes around development and deployment of applications impact and benefit the Internet of Things trend.
Similar to Tales of the mythical cloud-native platform - Container day 2022 (20)
A lightening talk I gave at the last Kubernetes Milano Meetup about what it takes to split a monolithic codebase, when you should do it and a few tips to keep in mind during the process.
Monitoring Cloud Native Applications with PrometheusJacopo Nardiello
This talk is a quick intro to Prometheus with an overview on all its components. The presentation points to a generally available demo so that you can see all its components in action.
This document provides an introduction and overview of Kubernetes for deploying and managing containerized applications at scale. It discusses Kubernetes' key features like self-healing, dynamic scaling, networking and efficient resource usage. It then demonstrates setting up a Kubernetes cluster on AWS and deploying a sample application using pods, deployments and services. While Kubernetes provides many benefits, the document notes it requires battle-testing to be production-ready and other topics like logging, monitoring and custom autoscaling solutions would need separate discussions.
This document provides pragmatic advice for becoming a developer. It notes that developers are knowledge workers who must continually study and learn without being scared of complexity. It emphasizes keeping focus on work while being inspired, being brave in making things work well and fast, and writing clean code that expresses intent. It also advises preparing for change through testing, choosing mentors carefully, and eventually learning to work independently.
How to process data using events on top of PHP and MongoDB. Introducing Eventsourcing and CQRS, how to handle events and how to generate Read Models and Aggregates leveraging the MongoDB Aggregation Framework.
This document provides an introduction to AngularJS. It explains that AngularJS is a JavaScript MVC framework and not just a library. It describes key Angular concepts like directives, controllers, services and dependency injection which make Angular apps modular and components easily testable. Testing is emphasized as equally important as writing code. The document also introduces tools like Karma and Protractor that are useful for automated testing of Angular apps in browsers.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Tales of the mythical cloud-native platform - Container day 2022
1. Tales of the mythical
Cloud-Native Platform
(How Kubernetes won’t fix your broken organization and
what you can do about it)
2. About Me
Jacopo Nardiello (@jnardiello)
Founder & CEO SIGHUP
CNCF Ambassador
Engineer
Dad of 2 kiddos
Up until 2014 - Software Engineer
2014 - Shifted to DevOps
started working on this thing called Docker and all the mess to run it in
prod
2015 - Pushing Kubernetes to prod
I need to run stuff in prod, deep into orchestrators war, Kubernetes
had a clear vision and solid core community I got very involved with. I
was onto something
3. About SIGHUP
2018 - Unleash Kubernetes Fury, The truly free Kubernetes Distro
~tens of clusters in Prod. As we focus on running and maintaining upstream Kubernetes
infrastructures, we develop a common set of modules to provision standard clusters. This
is where we realise that, we have developed a Kubernetes Distro. Kubernetes Fury
Distribution gets CNCF Certified.
2020 - Kubernetes Fury becomes an Ecosystem as we onboard more organisations
Fury powers ~Hundreds of prod clusters, from startups to enterprises.
We announce more OSS projects: Permission Manager, Gatekeeper Policy Manager,
OPA-Notary connector, Certified Container Images, Kage.
Check them out!
https://kubernetesfury.com
https://github.com/sighupio
@sighup_
4. The goal for this talk
This is not a talk about containers
Too often we simply focus on:
- What tech stack to adopt
- The latest cool technology
- What product to buy on the market
These things are NOT very important!
5. The goal for this talk
- The “Why”
- What are the key aspects and challenges to focus on (both
technological and organizational)
6. Cloud Native - Why
Ogni azienda oggi e’ una
software company.
DevOps come uno
standard de-facto
(we made it!!)
Aumentare quindi sviluppo e velocity di
rilascio di nuovi prodotti.
Capacità di sviluppare e far evolvere il
software verso nuovi prodotti. Il business
guida, IT deve seguire.
Evitare incident ed aumentare l’efficienza e
affidabilità operative.
Implementare o migliorare governance
aziendale e security.
9. The traditional model - The good and the bad
The traditional
model
Bashed for the last 20 years (for a reason 😬).
- Everything is manual
- Hardly anything is reproducible nor
automated
- Everything is a ticket
- No swe culture
- Company velocity: 💩
This is what the average advocate (myself
5y-ago included) would tell your management to
justify change (and 💰). And that’s ok, because
they wouldn’t be wrong, BUT…
10. The traditional model - The good and the bad
The traditional
model BUT
The missing point: these people are hell of professionals.
- Super in-depth knowledge, super low-level
- They know how to run systems in prod
- They are the good kind of silos**
** Next talk idea: how to get banned from all future conferences worldwide with one simple sentence
11. The DevOps’ed model - The good and the bad
The DevOps’ed
model
The good
- High degree of automation
- High short-term velocity &
time-to-value
- Strong ownership on running systems
“You build it, you run it” - this is the system
pushed by cloud vendors (for a reason 💰),
hardly anyone has the maturity to talk about the
disadvantages of this model.
12. The DevOps’ed model - The good and the bad
The DevOps’ed
model
The bad
- Fine for small orgs, quickly turns into a
nightmare for large organizations.
- The Horde 🧌 effect:
- High fragmentation
- Extremely inefficient devs
time-allocation
- Developers Burnout as complexity of
tools grows
- Lower TCO but higher short-term costs
13. The real holy grail of infra automation:
Platform engineering
15. Towards platform engineering (IDP) - A Target Org
- Internal Dev Platform Team
(IDP)
Will integrate low level components, third
party software and will write abstractions
and components with software.
IDP to enable self-serve of infrastructure
from DevOps & Application teams,
abstracting away the vertical complexity.
- DevOps
Consume and integrate platform
abstractions with application software, still
in charge of delivering to prod.
- SRE
Observability, SLO & defcon
management.
16.
17. The role of Kubernetes towards platform engineering
Kubernetes as the holy grail of organisational and technological transformation.
18. The role of Kubernetes towards platform engineering
Kubernetes as the holy grail of organisational and technological transformation.
Introduced a powerful low level abstraction layer that is consumable via a
coherent API.
COMPLEX
(The kind of low level complexity you don’t
want to throw on developers)
19. Is K8s the holy grail of transformation?
�� �� ��
- Not just containers
- IDP should provide documentation
and abstractions to enable app
teams to consume infra
dependencies for their specific
needs.
- An IDP is NOT a general purpose
all-you-can-eat product you can buy
on the market.
An IDP is much more than just
Kubernetes.
20. The only key aspect: Golden Paths
To enhance velocity and time-to-value, focus on
the Golden Paths, technology (k8s included) is
just a building block (and not a solution by itself)
21. To wrap it up
- You must invest in building up the seniority in your team to
identify and automate:
- Your golden paths (what matters to you)
- Your existing layered technological complexity (this is where the
challenge is)
- Self-serve of infrastructural layers (way beyond containers)
- The adoption of Cloud Native technologies, is just a (small) part
of the overall story.
We had all the necessary technology to implement all these aspects before
Kubernetes - so, it’s not about the technology.