How to scale pods and nodes under heavy load? On k8s / AKS we have few options, like horizontal-pod-autoscaler or cluster autoscaler.
In this talk I show these options through some examples.
Autoscaling of workloads in the Kubernetes environment. A slidedeck about Pod and Node autoscaling and the machinery behind it that makes it happen. Few recommendations for Pod and Node autoscaling while implementing it.
This presentation was made by Mangesh Patankar (Developer Advocate - IBM Cloud) as part of Container Conference 2018: www.containerconf.in.
"How do we make microservices resilient and fault-tolerant? How do we enforce policy decisions, such as fine-grained access control and rate limits? How do we enable timeouts/retries, health checks, etc.?
A service-mesh architecture attempts to resolve these issues by extracting the common resiliency features needed by a microservices framework away from the applications and frameworks and into the platform itself. Istio provides an easy way to create this service mesh."
Kafka Excellence at Scale – Cloud, Kubernetes, Infrastructure as Code (Vik Wa...HostedbyConfluent
Cloud is changing the world; Kubernetes is changing the world; real-time event streaming is changing the world. In this talk we explore some of best practices to synergistically combine the power of these paradigm shifts to achieve a much greater return on your Kafka investments. From declarative deployments, zero-downtime upgrades, elastic scaling to self-healing and automated governance, learn how you can bring the next level of speed, agility, resilience, and security to your Kafka implementations.
Kubernetes can be complex to manage at enterprise scale! Cloud provider services like Amazon EKS solves the challenge of bringing up a Kubernetes control plane. However, production Kubernetes requires multi-layer security, access controls, load-balancing, monitoring, logging, governance, secrets management, policy management, and several other considerations. In this fast paced talk, we will cover how enterprises can address each of these areas and discuss best practices to fast track deployments.
AKS reduces the complexity of managing Kubernetes by offloading operations to Azure. It allows easy creation and management of Kubernetes clusters through simple CLI commands. AKS supports advanced networking features in Azure like VNET integration and ingress controllers. It also enables integration with other Azure services for storage, databases, and monitoring through open service brokers.
This document provides an overview of moving applications to Azure Kubernetes Service (AKS). It discusses microservices architecture and how containers can help deploy microservices. It introduces Docker and shows how to containerize an application. It then explains Kubernetes and its main objects like pods, services, replica sets and deployments. It demonstrates pushing container images to Azure Container Registry (ACR) and deploying the containerized application to an AKS cluster. The document aims to help understand microservices, containers, Kubernetes and how to leverage Azure services to deploy applications to AKS.
How to scale pods and nodes under heavy load? On k8s / AKS we have few options, like horizontal-pod-autoscaler or cluster autoscaler.
In this talk I show these options through some examples.
Autoscaling of workloads in the Kubernetes environment. A slidedeck about Pod and Node autoscaling and the machinery behind it that makes it happen. Few recommendations for Pod and Node autoscaling while implementing it.
This presentation was made by Mangesh Patankar (Developer Advocate - IBM Cloud) as part of Container Conference 2018: www.containerconf.in.
"How do we make microservices resilient and fault-tolerant? How do we enforce policy decisions, such as fine-grained access control and rate limits? How do we enable timeouts/retries, health checks, etc.?
A service-mesh architecture attempts to resolve these issues by extracting the common resiliency features needed by a microservices framework away from the applications and frameworks and into the platform itself. Istio provides an easy way to create this service mesh."
Kafka Excellence at Scale – Cloud, Kubernetes, Infrastructure as Code (Vik Wa...HostedbyConfluent
Cloud is changing the world; Kubernetes is changing the world; real-time event streaming is changing the world. In this talk we explore some of best practices to synergistically combine the power of these paradigm shifts to achieve a much greater return on your Kafka investments. From declarative deployments, zero-downtime upgrades, elastic scaling to self-healing and automated governance, learn how you can bring the next level of speed, agility, resilience, and security to your Kafka implementations.
Kubernetes can be complex to manage at enterprise scale! Cloud provider services like Amazon EKS solves the challenge of bringing up a Kubernetes control plane. However, production Kubernetes requires multi-layer security, access controls, load-balancing, monitoring, logging, governance, secrets management, policy management, and several other considerations. In this fast paced talk, we will cover how enterprises can address each of these areas and discuss best practices to fast track deployments.
AKS reduces the complexity of managing Kubernetes by offloading operations to Azure. It allows easy creation and management of Kubernetes clusters through simple CLI commands. AKS supports advanced networking features in Azure like VNET integration and ingress controllers. It also enables integration with other Azure services for storage, databases, and monitoring through open service brokers.
This document provides an overview of moving applications to Azure Kubernetes Service (AKS). It discusses microservices architecture and how containers can help deploy microservices. It introduces Docker and shows how to containerize an application. It then explains Kubernetes and its main objects like pods, services, replica sets and deployments. It demonstrates pushing container images to Azure Container Registry (ACR) and deploying the containerized application to an AKS cluster. The document aims to help understand microservices, containers, Kubernetes and how to leverage Azure services to deploy applications to AKS.
This presentation was made as part of the Container Conference 2018 - www.containerconf.in
"Containers have gained lot of attention ever since it came into existence. And why not? With the speed and ease it provides for running user application, it is definitely the most preferred solution for many of the real world use cases.
OpenStack, on the other hand is a cloud solution which has always evolved in supporting newer technologies. OpenStack have many projects around containers that tries to cater the practical use cases. Some of the real world use cases that OpenStack fulfils are:
OpenStack deployment could be very complex and so is its upgrade. OpenStack Helm, Triple-O and Kolla uses Kubernetes, Docker that helps its users to easily deploy and upgrade their cloud.
Containers lacks the security as compared to VMs, so many users want to run their application on secure environment. OpenStack Zun enables Clear Containers and Kata Containers that provides the security of VMs and speed of containers.
Other use cases include running Kubernetes cluster on OpenStack, CI/CD, managing applications using microservices which can be done by Magnum, Zuul, Zun respectively. In this presentation, we will talk about the practical use cases where containers can help us and what OpenStack provides to fulfill those requirements."
Production ready tooling for microservices on kubernetesChandresh Pancholi
This document provides an overview of various production-ready tools for building and managing microservices on Kubernetes, including tools for service discovery, request routing and load balancing, monitoring and visualization, configuration management, security, centralized logging, package management, and more. It discusses common tools like Prometheus, Kubernetes Ingress, ConfigMaps, and Istio, and also introduces tools like Kubeless, Kubewatch, and Kube-monkey.
Slides from the April 27th, 2016 Milwaukee Java Meetup held at DigitalMeasures in Milwaukee WI.
Example code and configuration at:
https://github.com/shall11672/mkej-config
https://github.com/shall11672/mkej-configServer
https://github.com/shall11672/mkej-eurekaService
https://github.com/shall11672/mkej-greetingService
https://github.com/shall11672/mkej-menuService
https://github.com/shall11672/mkej-apiGateway
https://github.com/shall11672/mkej-monitoringApplication
Building Cloud Native Applications Using Spring Boot and Spring CloudGeekNightHyderabad
Nowadays enterprises as well as startups are looking to build their software applications leveraging Cloud Platforms so that they can greatly reduce their go to market time and infrastructure setup costs. However, Cloud Native Applications (NCA) should be designed with cloud computing architecture in mind which involves thinking about dynamic provisioning of resources, service downtimes, data redundancy etc. Spring Boot provides a robust platform for building microservices and Spring Cloud provides the capabilities to build Cloud Native Applications by abstracting the low level details. In this talk, we will learn how to develop Cloud Native Applications using Spring Boot and Spring Cloud frameworks.
Storage os kubernetes clusters need persistent dataLibbySchulze
Kubernetes clusters require persistent storage to unlock their full potential. Without persistent storage, workarounds are needed that sacrifice Kubernetes benefits. StorageOS provides persistent storage through storage classes, allowing multi-tenancy, data encryption, and migration of legacy apps to Kubernetes without additional scaffolding. It also enables features like read-write-many volumes through orchestrating user space NFS.
Live Event Debugging With ksqlDB at Reddit | Hannah Hagen and Paul Kiernan, R...HostedbyConfluent
Convincing developers to write tests for new code is hard; convincing developers to write tests for new event data is even harder. At Reddit, engineers have often deployed new app versions, only to find out later that the event wasn’t firing at all, or it was missing critical fields. So this begs the question, “How can engineers at Reddit be confident that the events they instrument are accurate and complete?”
In this session, we will learn about an internal tool developed at Reddit to QA events in real-time. This KSQL-powered web app streams events from our pipeline, allowing developers to filter events they care about using criteria like User ID, Device ID or the type of user interaction. With a backbone of KSQL and Kafka Streams, engineers can get real-time feedback on how accurate (or how erroneous) their event data is.
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
With the growing adoption of Kubernetes, organizations want to take advantage of containerized Microsoft SQL Server 2019 to optimize transactional performance and accelerate time-to-insights from their business-critical data. However, as enterprises embrace hybrid cloud strategy, they need to consider several aspects based on the performance, cost and data protection requirements for running enterprise-grade SQL Server databases.
In this webinar, we will compare and contrast various cloud-native platforms for SQL Server that would help CIOs, DevOps engineers, database administrators and applications architects to determine the most suitable platform that fits their business needs.
Join us as we explore some exciting results from a recent performance benchmark study conducted by McKnight Consulting Group, an independent consulting firm, to compare the performance of Microsoft SQL Server 2019 on the best possible configurations of the following Kubernetes platforms:
Diamanti Enterprise Kubernetes Platform
Amazon Web Services Elastic Kubernetes Service (AWS EKS)
Azure Kubernetes Service (AKS)
Topics will include:
Platform considerations and requirements for running Microsoft SQL Server 2019
Performance comparison and analysis of running SQL Server on various platform
Best practices for running containerized SQL Server databases in Kubernetes environment
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...Davide Benvegnù
[SLIDES FROM MICROSOFT ONLINE TECH FORUM SESSION]
Kubernetes is the open source container orchestration system that supercharges applications with scaling and reliability and unlocks advanced features, like A/B testing, Blue/Green deployments, canary builds, and dead-simple rollbacks.
In this session, see how Tailwind Traders took a containerized application and deployed it to Azure Kubernetes Service (AKS).
You’ll walk away with a deep understanding of major Kubernetes concepts and how to put it all to use with industry standard tooling.
Stateless and Stateful Services in Kubernetes - Mohit Saxena - Citrix - CC18CodeOps Technologies LLP
This document discusses stateless and stateful services in Kubernetes. It defines core Kubernetes concepts like pods, deployments, labels and label selectors. It explains services, the difference between stateless and stateful services, and the role of Kubernetes proxy and DNS. It provides examples of defining stateful sets, services, and load balancing stateful services. It also discusses using Citrix ADC (CPX) for load balancing microservices and providing security and visibility.
Kubernetes as Orchestrator for A10 Lightning ControllerAkshay Mathur
The document discusses using Kubernetes as an orchestrator for A10 Lightning Controller. Some key points:
1) Kubernetes allows for automatic recovery of pods on failure, easy rolling upgrades of code, and automated scaling of microservices.
2) Using Kubernetes allows the controller to be deployed on-premise and scaled across multiple VMs, with automated launching and scaling. Installation is also now independent of the underlying infrastructure.
3) The journey involved moving from a manual deployment to a Kubernetes deployment, which simplified overlay networking, environment variable passing, and simplified adding/replacing nodes.
How kubernetes operators can rescue dev secops in midst of a pandemic updatedShikha Srivastava
This document discusses how Kubernetes operators can help automate DevSecOps processes. It begins by explaining why organizations adopt containers and Kubernetes. It then discusses the challenges of managing containerized workloads at scale and how Kubernetes operators can provide orchestration and management. It provides an overview of what operators are, how the Operator Framework works, and the phases of building an operator. It demonstrates building a sample memcached operator in Golang using the Operator SDK tools. Finally, it discusses different options for installing operators like Helm, Ansible, and custom operators and provides some useful links for learning more.
Federation of Kubernetes clusters allows for high availability, application migration, policy enforcement, and vendor lock-in avoidance by connecting multiple Kubernetes clusters. It treats clusters as independent control planes that can discover and load balance applications. The implementation extends Kubernetes APIs to support federation while keeping per-cluster state isolated. Early versions will support multi-zone clusters while full federation of independent clusters is planned for 2016.
In this session, we will show how to simplify the deployment, management, and operations of Kubernetes using Azure Container Service (AKS). We will demonstrate how to use Brigade - a framework for scripting together multiple tasks and executing them inside of containers and Kashti - an open source reporting dashboard web interface to easily manage and visualize their Brigade events and projects through a web browser. Additionally, we will provide comparisons of the wide variety of tools in the Kubernetes ecosystem for CI/CD, observability, storage and networking.
CHECK OUT THE MARCH 17 UPDATE > https://www.slideshare.net/rhirschfeld/joint-openstack-kubernetes-environment-march-17-update/
Presented at the OpenStack summit, this presentation discusses the practical reality & timing of using Kubernetes as an underlay for OpenStack.
This document discusses Istio, an open source service mesh that provides traffic management, telemetry and security for microservices applications. It describes Istio's architecture including its data and control planes. The data plane uses Envoy proxies that are injected as sidecars to intercept and manage traffic between services. The control plane includes Pilot for service discovery and traffic management and Mixer for policy enforcement. The document provides examples of how Istio manages issues like ingress, egress, security and provides a sample BookInfo application.
Azure and Kubernetes go together like peanut butter and jelly with Azure offering many options to host Kubernetes. In this session, we'll show you how to mix the Open Source tools you already use with the powerful Kubernetes hosting options on Azure. Take your deployment and orchestration to the next level!
This document discusses various topics related to Kubernetes including rolling updates, networking using CNI, affinity and anti-affinity, persistent storage, monitoring and troubleshooting tools like Prometheus and Grafana, deploying Kubernetes on cloud platforms, and certifications for Kubernetes like CKA and CKAD. Key aspects of monitoring Kubernetes clusters include metrics on cluster state, node status, pod availability, and resource utilization of memory, disk, and CPU as well as API request latency.
Reduce Risk with End to End Monitoring of Middleware-based ApplicationsSL Corporation
Kafka communicates within a larger complex and evolving environment. The current modular approach to the integration means that the structure of the software stack is much more dynamic than in the past and operators no longer have the time to become intimate with how dependent components interact. The number of dependencies combined with lack of familiarity can create significant risks to the business including increased outages and longer time to resolve incidents. Both can result in loss of revenue and customers.
These risks are significantly reduced by applying best-practice monitoring. Monitoring can provide a complete end-to-end view of the touch points within the application flow, so they are presented in comprehensive service-based views. This provides the user with a true single-pane of glass for monitoring and alerting for Kafka and its dependent technologies.
This presentation was made as part of the Container Conference 2018 - www.containerconf.in
"Containers have gained lot of attention ever since it came into existence. And why not? With the speed and ease it provides for running user application, it is definitely the most preferred solution for many of the real world use cases.
OpenStack, on the other hand is a cloud solution which has always evolved in supporting newer technologies. OpenStack have many projects around containers that tries to cater the practical use cases. Some of the real world use cases that OpenStack fulfils are:
OpenStack deployment could be very complex and so is its upgrade. OpenStack Helm, Triple-O and Kolla uses Kubernetes, Docker that helps its users to easily deploy and upgrade their cloud.
Containers lacks the security as compared to VMs, so many users want to run their application on secure environment. OpenStack Zun enables Clear Containers and Kata Containers that provides the security of VMs and speed of containers.
Other use cases include running Kubernetes cluster on OpenStack, CI/CD, managing applications using microservices which can be done by Magnum, Zuul, Zun respectively. In this presentation, we will talk about the practical use cases where containers can help us and what OpenStack provides to fulfill those requirements."
Production ready tooling for microservices on kubernetesChandresh Pancholi
This document provides an overview of various production-ready tools for building and managing microservices on Kubernetes, including tools for service discovery, request routing and load balancing, monitoring and visualization, configuration management, security, centralized logging, package management, and more. It discusses common tools like Prometheus, Kubernetes Ingress, ConfigMaps, and Istio, and also introduces tools like Kubeless, Kubewatch, and Kube-monkey.
Slides from the April 27th, 2016 Milwaukee Java Meetup held at DigitalMeasures in Milwaukee WI.
Example code and configuration at:
https://github.com/shall11672/mkej-config
https://github.com/shall11672/mkej-configServer
https://github.com/shall11672/mkej-eurekaService
https://github.com/shall11672/mkej-greetingService
https://github.com/shall11672/mkej-menuService
https://github.com/shall11672/mkej-apiGateway
https://github.com/shall11672/mkej-monitoringApplication
Building Cloud Native Applications Using Spring Boot and Spring CloudGeekNightHyderabad
Nowadays enterprises as well as startups are looking to build their software applications leveraging Cloud Platforms so that they can greatly reduce their go to market time and infrastructure setup costs. However, Cloud Native Applications (NCA) should be designed with cloud computing architecture in mind which involves thinking about dynamic provisioning of resources, service downtimes, data redundancy etc. Spring Boot provides a robust platform for building microservices and Spring Cloud provides the capabilities to build Cloud Native Applications by abstracting the low level details. In this talk, we will learn how to develop Cloud Native Applications using Spring Boot and Spring Cloud frameworks.
Storage os kubernetes clusters need persistent dataLibbySchulze
Kubernetes clusters require persistent storage to unlock their full potential. Without persistent storage, workarounds are needed that sacrifice Kubernetes benefits. StorageOS provides persistent storage through storage classes, allowing multi-tenancy, data encryption, and migration of legacy apps to Kubernetes without additional scaffolding. It also enables features like read-write-many volumes through orchestrating user space NFS.
Live Event Debugging With ksqlDB at Reddit | Hannah Hagen and Paul Kiernan, R...HostedbyConfluent
Convincing developers to write tests for new code is hard; convincing developers to write tests for new event data is even harder. At Reddit, engineers have often deployed new app versions, only to find out later that the event wasn’t firing at all, or it was missing critical fields. So this begs the question, “How can engineers at Reddit be confident that the events they instrument are accurate and complete?”
In this session, we will learn about an internal tool developed at Reddit to QA events in real-time. This KSQL-powered web app streams events from our pipeline, allowing developers to filter events they care about using criteria like User ID, Device ID or the type of user interaction. With a backbone of KSQL and Kafka Streams, engineers can get real-time feedback on how accurate (or how erroneous) their event data is.
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
With the growing adoption of Kubernetes, organizations want to take advantage of containerized Microsoft SQL Server 2019 to optimize transactional performance and accelerate time-to-insights from their business-critical data. However, as enterprises embrace hybrid cloud strategy, they need to consider several aspects based on the performance, cost and data protection requirements for running enterprise-grade SQL Server databases.
In this webinar, we will compare and contrast various cloud-native platforms for SQL Server that would help CIOs, DevOps engineers, database administrators and applications architects to determine the most suitable platform that fits their business needs.
Join us as we explore some exciting results from a recent performance benchmark study conducted by McKnight Consulting Group, an independent consulting firm, to compare the performance of Microsoft SQL Server 2019 on the best possible configurations of the following Kubernetes platforms:
Diamanti Enterprise Kubernetes Platform
Amazon Web Services Elastic Kubernetes Service (AWS EKS)
Azure Kubernetes Service (AKS)
Topics will include:
Platform considerations and requirements for running Microsoft SQL Server 2019
Performance comparison and analysis of running SQL Server on various platform
Best practices for running containerized SQL Server databases in Kubernetes environment
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...Davide Benvegnù
[SLIDES FROM MICROSOFT ONLINE TECH FORUM SESSION]
Kubernetes is the open source container orchestration system that supercharges applications with scaling and reliability and unlocks advanced features, like A/B testing, Blue/Green deployments, canary builds, and dead-simple rollbacks.
In this session, see how Tailwind Traders took a containerized application and deployed it to Azure Kubernetes Service (AKS).
You’ll walk away with a deep understanding of major Kubernetes concepts and how to put it all to use with industry standard tooling.
Stateless and Stateful Services in Kubernetes - Mohit Saxena - Citrix - CC18CodeOps Technologies LLP
This document discusses stateless and stateful services in Kubernetes. It defines core Kubernetes concepts like pods, deployments, labels and label selectors. It explains services, the difference between stateless and stateful services, and the role of Kubernetes proxy and DNS. It provides examples of defining stateful sets, services, and load balancing stateful services. It also discusses using Citrix ADC (CPX) for load balancing microservices and providing security and visibility.
Kubernetes as Orchestrator for A10 Lightning ControllerAkshay Mathur
The document discusses using Kubernetes as an orchestrator for A10 Lightning Controller. Some key points:
1) Kubernetes allows for automatic recovery of pods on failure, easy rolling upgrades of code, and automated scaling of microservices.
2) Using Kubernetes allows the controller to be deployed on-premise and scaled across multiple VMs, with automated launching and scaling. Installation is also now independent of the underlying infrastructure.
3) The journey involved moving from a manual deployment to a Kubernetes deployment, which simplified overlay networking, environment variable passing, and simplified adding/replacing nodes.
How kubernetes operators can rescue dev secops in midst of a pandemic updatedShikha Srivastava
This document discusses how Kubernetes operators can help automate DevSecOps processes. It begins by explaining why organizations adopt containers and Kubernetes. It then discusses the challenges of managing containerized workloads at scale and how Kubernetes operators can provide orchestration and management. It provides an overview of what operators are, how the Operator Framework works, and the phases of building an operator. It demonstrates building a sample memcached operator in Golang using the Operator SDK tools. Finally, it discusses different options for installing operators like Helm, Ansible, and custom operators and provides some useful links for learning more.
Federation of Kubernetes clusters allows for high availability, application migration, policy enforcement, and vendor lock-in avoidance by connecting multiple Kubernetes clusters. It treats clusters as independent control planes that can discover and load balance applications. The implementation extends Kubernetes APIs to support federation while keeping per-cluster state isolated. Early versions will support multi-zone clusters while full federation of independent clusters is planned for 2016.
In this session, we will show how to simplify the deployment, management, and operations of Kubernetes using Azure Container Service (AKS). We will demonstrate how to use Brigade - a framework for scripting together multiple tasks and executing them inside of containers and Kashti - an open source reporting dashboard web interface to easily manage and visualize their Brigade events and projects through a web browser. Additionally, we will provide comparisons of the wide variety of tools in the Kubernetes ecosystem for CI/CD, observability, storage and networking.
CHECK OUT THE MARCH 17 UPDATE > https://www.slideshare.net/rhirschfeld/joint-openstack-kubernetes-environment-march-17-update/
Presented at the OpenStack summit, this presentation discusses the practical reality & timing of using Kubernetes as an underlay for OpenStack.
This document discusses Istio, an open source service mesh that provides traffic management, telemetry and security for microservices applications. It describes Istio's architecture including its data and control planes. The data plane uses Envoy proxies that are injected as sidecars to intercept and manage traffic between services. The control plane includes Pilot for service discovery and traffic management and Mixer for policy enforcement. The document provides examples of how Istio manages issues like ingress, egress, security and provides a sample BookInfo application.
Azure and Kubernetes go together like peanut butter and jelly with Azure offering many options to host Kubernetes. In this session, we'll show you how to mix the Open Source tools you already use with the powerful Kubernetes hosting options on Azure. Take your deployment and orchestration to the next level!
This document discusses various topics related to Kubernetes including rolling updates, networking using CNI, affinity and anti-affinity, persistent storage, monitoring and troubleshooting tools like Prometheus and Grafana, deploying Kubernetes on cloud platforms, and certifications for Kubernetes like CKA and CKAD. Key aspects of monitoring Kubernetes clusters include metrics on cluster state, node status, pod availability, and resource utilization of memory, disk, and CPU as well as API request latency.
Reduce Risk with End to End Monitoring of Middleware-based ApplicationsSL Corporation
Kafka communicates within a larger complex and evolving environment. The current modular approach to the integration means that the structure of the software stack is much more dynamic than in the past and operators no longer have the time to become intimate with how dependent components interact. The number of dependencies combined with lack of familiarity can create significant risks to the business including increased outages and longer time to resolve incidents. Both can result in loss of revenue and customers.
These risks are significantly reduced by applying best-practice monitoring. Monitoring can provide a complete end-to-end view of the touch points within the application flow, so they are presented in comprehensive service-based views. This provides the user with a true single-pane of glass for monitoring and alerting for Kafka and its dependent technologies.
The document discusses Istio, an open source service mesh that provides traffic management, resilience, and security for microservices applications. It begins with an overview of microservices and common challenges in managing microservices applications. It then introduces Istio and its components that address these challenges, such as intelligent routing, policy enforcement, and telemetry collection. Specific Istio features like traffic control, splitting, and mirroring are demonstrated. Finally, it provides instructions for getting started with Istio and links for additional information.
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
This document discusses how to track performance and faults in a multi-layer software-defined network (SDN) environment. It outlines the challenges of assuring SDN/NFV networks due to their complex layering, vulnerability, need for automation/migration, and velocity. It introduces CA's Virtual Network Assurance solution, which provides multi-vendor normalization, relationship mapping between network layers, and an open collector to flexibly monitor SDN environments. Some key features highlighted are overlay-underlay topology visibility, service chain awareness, and integration with CA products like Performance Management and Spectrum. Early adopter use cases are also discussed.
Learn all about microservices from Product Marketing Manager Dan Giordano. We'll cover how to get started, the benefits, potential challenges, and how SmartBear can help.
Cloudify your applications: microservices and beyondUgo Landini
The document discusses moving applications to a microservices architecture using Cloudify and Istio. It begins by describing typical customer landscapes today with complex, heterogeneous environments running across virtual and physical infrastructure. It then introduces Cloudify and Istio as platforms that can help modernize existing applications and develop new ones using microservices. Key capabilities of Cloudify and Istio are described such as container platforms, developer tools, and services for integration, automation, security and management.
The introduction of microservices, Node.js, Cloud Foundry, Docker containers, etc. are adding a new layer of complexity to an already complex application environment. When application issues arise, it becomes difficult to pinpoint the source and, too often, you find yourself in lengthy war rooms or assigning experts to triage every issue. As a result, brand loyalty, customer satisfaction and innovation are negatively impacted. The old approach to application performance management just isn’t working. A new approach is needed. In this session you will learn how to monitor these new modern applications to ensure the customer experience.
For more information, please visit http://cainc.to/Nv2VOe
HL7 Survival Guide - Chapter 10 – Process and WorkflowCaristix
This guide is for healthcare integration analysts and their managers. In this chapter, learn about mapping out your processes and workflows to understand how your interface can support them.
When we get water, electricity, or gas delivered to our home or place of work we expect it to have predictable quality. Why isn't this also true of broadband? The answer is we don't (yet) have the "glue" to integrate performance in digital supply chains.
Microservices - Hitchhiker's guide to cloud native applicationsStijn Van Den Enden
Microservices are a true hype these days. Netflix, Amazon, eBay, … are all using microservices, but why? The idea is simple; split your application into multiple services which can evolve autonomously through time. The name suggests to keep these services small. Conceptually this seems not all that different from a classical Service Oriented Architecture (SOA). Nonetheless, microservices do offer a new perspective. A monolithic application is divided into a couple small services which can be independently developed, deployed and scaled. Flexibility is increased, but using this model also has some pitfalls.This session sheds a light on the microservices landscape; the key drivers for using the pattern, tooling to support development and maintenance, and the pros and cons that go with it. We’ll also introduce some key design principles that can be used in creating and modelling these modular enterprise applications.
The document discusses middleware and microservices architectures. Middleware makes it easier for developers to implement communication and input/output between applications and systems. It gained popularity in the 1980s as a way to connect newer apps to older legacy systems. Microservices architectures break applications into smaller, independent pieces that can be updated independently. While this improves scalability and maintainability, it also increases complexity and the security surface. The document provides examples of middleware and microservices architectures used by companies like Netflix and Twitter.
Clues for Solving Cloud-Based App Performance NETSCOUT
The document discusses potential causes ("suspects") of performance issues for cloud-based apps running on AWS: 1) Issues with the development process due to lack of visibility between teams; 2) Performance impacts from routing app services across different AWS regions; 3) Insufficient security visibility as apps integrate new data sources; 4) Limitations of only monitoring the user interface and not overall network traffic. It promotes NETSCOUT solutions for providing comprehensive network visibility across hybrid cloud environments to identify and address the root causes of poor performance.
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...InfoSeption
The document discusses how VMware IT drives systems stability and delivery agility through DevOps practices. It summarizes how VMware IT automated instance provisioning to reduce provisioning time from 4-6 weeks to under 22 hours. It also discusses how VMware IT uses a cloud operations management platform for instance monitoring and management to improve operational efficiency. Finally, it outlines how VMware IT leverages a continuous delivery platform and service virtualization to improve application delivery agility.
Adrian Cockcroft on his top predictions for the cloud computing industry in 2015 and beyond, as well as how cloud-native applications, continuous-delivery and DevOps techniques, will speed the pace of innovation and disruption.
For more about Adrian be sure to check out his page on Battery Ventures:
https://www.battery.com/our-team/member/adrian-cockcroft/
Follow Adrian on Twitter: @adrianco
As more applications are being developed as a set of microservices, containers and platforms such as Kubernetes make many things much easier, but still leave untouched many operational issues such as traffic management and visibility, service authentication, security and policy. Istio, is a new service mesh that attempts to address many of these. We will discuss the architecture of Istio and the benefits it may offer to new microservice-based systems in a multicloud world.
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
Welcome to the application economy, where every company is a software company. You are challenged to build applications faster, cheaper and better, but can't seem to achieve all three goals at the same time. In this presentation, you will learn where the bottlenecks occur in application development and how you spot defects earlier in the process, automate your testing and build better apps. CA Continuous Application Insight provides deep transaction insight into your Web and mobile applications, allowing developers to identify issues much earlier, make changes and produce cleaner code. The result is a better app and a dramatically improved customer experience.
For more information, please visit http://cainc.to/Nv2VOe
Building Cloud-Native App Series - Part 5 of 11
Microservices Architecture Series
Microservices Architecture,
Monolith Migration Patterns
- Strangler Fig
- Change Data Capture
- Split Table
Infrastructure Design Patterns
- API Gateway
- Service Discovery
- Load Balancer
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapatibuildacloud
Nuage Networks provides an SDN solution called the Virtualized Services Platform that abstracts physical network infrastructure and automates network provisioning through centralized policy-based controls. Nuage has integrated its VSP with CloudStack to enhance CloudStack's networking capabilities with advanced virtual networking, improved scalability, and automated provisioning based on Nuage's policy engine. The Nuage-CloudStack plugin maps CloudStack networking constructs to corresponding constructs in the VSP to provide services like isolated networks, firewalls, and load balancing across multiple hypervisors.
Case Study: Datalink—Manage IT monitoring the MSP wayCA Technologies
Increasing infrastructure complexity is causing IT operations teams to re-think their monitoring approach. In this presentation with Datalink, learn how to build and evolve a proactive IT monitoring strategy geared towards the modern, dynamic IT landscape. Learn how Datalink proactively manages IT environments of leading Fortune 500 companies by leveraging analytics, intelligent alarms, a unified architecture and advanced process automation to achieve operational efficiencies. You will also learn how to make monitoring look easy to your end users while delivering the flexibility required to monitor just about anything they throw at you.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Similar to Developing reliable applications with .net core and AKS (20)
The document discusses Docker and Kubernetes tools for Visual Studio code. It provides an overview of Docker, how to build Docker images using Dockerfiles, and how to use the Docker extension in VS Code. It also covers developing applications inside Docker containers using the Remote - Containers extension. Finally, it gives a basic introduction to Kubernetes, including nodes, pods, deployments, and services. The presenter demonstrates creating a Dockerfile and deploying to Kubernetes.
Azure Search is a search-as-a-service cloud solution
that gives developers APIs and tools for adding a rich search experience
over private, heterogenous content in web, mobile, and enterprise applications.
This document provides an overview of Kubernetes and microservices architecture. It discusses the challenges with monolithic applications and benefits of microservices. Key Kubernetes concepts are explained like masters, nodes, objects, pods, services and deployments. Azure Kubernetes Service (AKS) is introduced as a way to simplify deploying and managing Kubernetes clusters on Azure without having to self-host the Kubernetes infrastructure.
This document provides an introduction to searching with Elasticsearch. It demonstrates how to perform basic searches on an indexed Twitter dataset using curl commands. It also summarizes Elasticsearch concepts like inverted indexes, analyzers, tokenization, normalization, and filters. Elasticsearch.NET and NEST clients for .NET Core are briefly compared.
This document provides an overview of Azure Dev Spaces, which allows developers to share an Azure Kubernetes Service (AKS) cluster for building and testing applications. It discusses challenges with manually hosting Kubernetes clusters and benefits of AKS, which simplifies Kubernetes deployment and management. Azure Dev Spaces enables developers to test code end-to-end on an AKS cluster without needing to replicate or simulate dependencies. It also allows easy onboarding of new team members with minimal machine setup required. The document concludes with a demonstration of Azure Dev Spaces.
Azure functions: from a function to a whole application in 60 minutesAlessandro Melchiori
This document discusses Azure Functions and serverless computing. It describes how Azure Functions evolved from WebJobs and provides a lightweight way to run .NET code on Azure without having to manage infrastructure. Functions can be triggered by events and use bindings to integrate with data sources. The document demonstrates how to create Function Apps locally or on Azure using the CLI or portal, and how to configure runtime versions and bindings. It also introduces the Durable Functions extension for orchestrating function workflows and chaining or fan out/fan in functions.
This document provides an overview of Kubernetes and microservices architectures. It discusses the differences between monolithic and microservices applications and the advantages and disadvantages of each. It then introduces Kubernetes, including its origins at Google, components like the master, nodes, and objects. It covers management techniques like imperative commands, imperative object configuration, and declarative object configuration. Finally, it discusses key Kubernetes concepts like pods, services, and deployments. It also compares manually hosting a Kubernetes cluster to using Azure Kubernetes Service.
How to build a monitoring system for docker from scratch and how to use Azure Operations Management Suite (aka OMS) to collect info about docker cluster deployment
This document discusses cooking Akka.Net and Service Fabric together. It provides an overview of Service Fabric architecture including its cluster model and application model. It describes Service Fabric Reliable Actors and Reliable Collections. It demonstrates Service Fabric Reliable Actors, integrating Service Fabric and Akka.Net, and using Service Fabric for persistence with Akka.Net. It also covers upgrading Service Fabric applications.
Azure SQL Database is a relational database-as-a-service hosted in the Azure cloud that reduces costs by eliminating the need to manage virtual machines, operating systems, or database software. It provides automatic backups, high availability through geo-replication, and the ability to scale performance by changing service tiers. Azure Cosmos DB is a globally distributed, multi-model database that supports automatic indexing, multiple data models via different APIs, and configurable consistency levels with strong performance guarantees. Azure Redis Cache uses the open-source Redis data structure store with managed caching instances in Azure for improved application performance.
The document discusses Docker and Azure. It provides an overview of Docker's architecture including registries, images and containers. It describes how Docker can be used to implement microservices with a layered architecture. It then discusses using private registries like Docker Hub or building your own, as well as Azure Container Registry. It demonstrates running dockerized applications on a single VM, cluster with orchestrator, or Azure Container Service. It also demonstrates a CI/CD pipeline and questions are taken at the end.
Introduzione al protocollo websocket e come implementarlo "manualmente" in un'applicazione asp.net
SignalR: architettura di base, come utilizzare la libreria nei nostri progetti e come configurare i "backplane" per scenari di scale-out.
Quick-overview sulla nuova versione di SignalR per dot.net core
This document provides an overview of Azure Service Fabric, including:
1) Service Fabric is a distributed systems platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers.
2) It allows applications to be composed of small, independent processes called microservices that can communicate with each other.
3) Service Fabric handles deployment, scaling and management of microservice applications and containers, enabling developers to focus on writing code without having to deal with infrastructure details.
This document discusses functional reactive programming (FRP). It defines FRP as a programming paradigm oriented around data flows and propagation of change. Reactive programming describes systems that are responsive, resilient, elastic and message-driven. The document introduces reactive extensions (Rx) as a library for composing asynchronous and event-based programs using observable sequences and LINQ-style query operators. It provides examples of how Rx can be used to map, filter, scan and zip observable sequences.
This document discusses functional domain-driven design and the use of monads. It begins by stating that functional domain-driven design is still a work in progress. It then provides definitions of monads and functions as they relate to category theory. The document discusses how monads can be used with a functional approach to domain-driven design. It also includes brief biographical information about the software developer who posted this content.
This document summarizes a presentation about ASP.NET SignalR, a framework for adding real-time web functionality to applications. The presentation discusses event-driven architecture and how SignalR supports it. It also covers scaling out SignalR applications across multiple servers and improving performance. The presenter is identified as Alessandro Melchiori, a software architect, and demos of SignalR functionality are included.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
2. What does “reliable” mean?
Reliable applications are:
● Resilient and recover gracefully from failures, and they continue to function with minimal
downtime and data loss before full recovery.
● Highly available (HA) and run as designed in a healthy state with no significant downtime.
3. What does “reliable” mean?
Reliable applications are:
● Resilient and recover gracefully from failures, and they continue to function with minimal
downtime and data loss before full recovery.
● Highly available (HA) and run as designed in a healthy state with no significant downtime.
4. Instead of trying to prevent failures altogether, the goal
is to minimize the effects of a single failing component.
5. With the network of microservices - service-to-service communication
can become challenging
22. Pod overview
● Is the basic building block of Kubernetes
● Represents a running process on the cluster
● Consists of either a single container or a small
number of containers that are tightly coupled
and that share resources
23. Pod overview
● Is the basic building block of Kubernetes
● Represents a running process on the cluster
● Consists of either a single container or a small
number of containers that are tightly coupled
and that share resources
24. The sidecar pattern consists of a main application plus a helper container with a responsibility
that is essential to your application, but is not necessarily part of the application itself.
SIDECAR PATTERN
25. Sidecar pattern
The most common sidecar containers are logging utilities, sync services,
watchers, and monitoring agents.
LOGGING MONITORING
WATCHERSSYNC
26. Traefik
An open-source reverse proxy and load balancer for
HTTP and TCP-based applications that is easy, dynamic,
automatic, fast, full-featured, production proven, provides
metrics, and integrates with every major cluster
technology... No wonder it's so popular!
31. Others Traefik middlewares
● RATELIMIT:
The RateLimit middleware ensures that services will receive a fair number of requests,
and allows you define what is fair
● RETRY:
The Retry middleware is in charge of reissuing a request a given number of times to a
backend server if that server does not reply.
32. Cross-cutting concerns
● Logs
● Metrics
● Datadog
● InfluxDB
● Prometheus
● StatsD
● Tracing: the tracing system allows developers to
visualize call flows in their infrastructure.
● Zipkin
● Datadog
● Instana
● ...