Consul is a Service Networking tool designed to connect applications and services across a multi-cloud world. With Consul, organizations can manage service discovery and health monitoring, automate their middleware and leverage service mesh to connect virtual machine environments and Kubernetes clusters.
Migrating from VMs to Kubernetes using HashiCorp Consul Service on AzureMitchell Pronschinske
DevOps tools became very popular with the adoption of public cloud, but Operational teams now realize that their benefits can be extended to enterprise data centers. In reality, cloud native tools can help bridge public clouds and private data centers by enabling a common framework to manage applications and their underlying infrastructure components.
In this session you’ll learn about the latest Cisco ACI integrations with Hashicorp Terraform and Consul to deliver a powerful solution for end-to-end on-prem and cloud infrastructure deployments.
There is a lot of talk now around the term Service Mesh. The hype is high and the promise is real. The problem is that there is not really a good definition of what service mesh really is. In this talk we are going to review the problem service meshes are trying to solve, name the core components that make up a service mesh, and discuss the benefits an organization can receive by implementing this new technology.
An important use-case for Vault is to provide short lived and least privileged Cloud credentials. In this webinar we will review specifically how Vault's Azure Secrets Engine can provide dynamic Azure credentials. We will cover details on how to configure the Azure Secrets Engine in Vault and use it in an application. If you are using Azure now or in the near future, join us for some patterns on maintaining a high security posture with Vault's dynamic credentials model!
As more applications are being developed as a set of microservices, containers and platforms such as Kubernetes make many things much easier, but still leave untouched many operational issues such as traffic management and visibility, service authentication, security and policy. Istio, is a new service mesh that attempts to address many of these. We will discuss the architecture of Istio and the benefits it may offer to new microservice-based systems in a multicloud world.
Cloud computing has won and most companies are using more than one public and private clouds. This has created challenges and complexity which are addressed by new technology such as Istio service mesh.
Monitoring Security Policies for Container and OpenStack CloudsPLUMgrid
Container and OpenStack clouds often co-exist in data centers. Monitoring both environments require views into the underlay and overlay infrastructure, but infrastructure monitoring alone is no longer sufficient and needs to be paired with security policy views as containers and microservices are constantly reshaping data center traffic and flow patterns. A visualization GUI that correlates containers and VMs with security policy views provide a powerful tool for any operations team to detect security flow violations in real-time. Enterprises and cloud providers are adopting visualization and monitoring platforms in addition to OpenStack Horizon to keep their infrastructure running with 100% uptime. New tools that help with proactive remediation of issues are being deployed to quickly bring back the system to healthy conditions.
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum ResultsRightScale
RightScale User Conference NYC 2011 -
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum Results
Peder Ulander - CMO, Cloud.com
Many companies move to the cloud before they fully understand the complexities of a solid implementation strategy. Public and private clouds each have their benefits and limitations, and it's imperative to develop a clear roadmap for success that incorporates a best-practices reference architecture. In this session, we'll share how to architect a hybrid cloud environment as part of your overall cloud strategy, how to achieve multi-cloud interoperability, and how to proactively plan to survive cloud infrastructure outages.
Consul is a Service Networking tool designed to connect applications and services across a multi-cloud world. With Consul, organizations can manage service discovery and health monitoring, automate their middleware and leverage service mesh to connect virtual machine environments and Kubernetes clusters.
Migrating from VMs to Kubernetes using HashiCorp Consul Service on AzureMitchell Pronschinske
DevOps tools became very popular with the adoption of public cloud, but Operational teams now realize that their benefits can be extended to enterprise data centers. In reality, cloud native tools can help bridge public clouds and private data centers by enabling a common framework to manage applications and their underlying infrastructure components.
In this session you’ll learn about the latest Cisco ACI integrations with Hashicorp Terraform and Consul to deliver a powerful solution for end-to-end on-prem and cloud infrastructure deployments.
There is a lot of talk now around the term Service Mesh. The hype is high and the promise is real. The problem is that there is not really a good definition of what service mesh really is. In this talk we are going to review the problem service meshes are trying to solve, name the core components that make up a service mesh, and discuss the benefits an organization can receive by implementing this new technology.
An important use-case for Vault is to provide short lived and least privileged Cloud credentials. In this webinar we will review specifically how Vault's Azure Secrets Engine can provide dynamic Azure credentials. We will cover details on how to configure the Azure Secrets Engine in Vault and use it in an application. If you are using Azure now or in the near future, join us for some patterns on maintaining a high security posture with Vault's dynamic credentials model!
As more applications are being developed as a set of microservices, containers and platforms such as Kubernetes make many things much easier, but still leave untouched many operational issues such as traffic management and visibility, service authentication, security and policy. Istio, is a new service mesh that attempts to address many of these. We will discuss the architecture of Istio and the benefits it may offer to new microservice-based systems in a multicloud world.
Cloud computing has won and most companies are using more than one public and private clouds. This has created challenges and complexity which are addressed by new technology such as Istio service mesh.
Monitoring Security Policies for Container and OpenStack CloudsPLUMgrid
Container and OpenStack clouds often co-exist in data centers. Monitoring both environments require views into the underlay and overlay infrastructure, but infrastructure monitoring alone is no longer sufficient and needs to be paired with security policy views as containers and microservices are constantly reshaping data center traffic and flow patterns. A visualization GUI that correlates containers and VMs with security policy views provide a powerful tool for any operations team to detect security flow violations in real-time. Enterprises and cloud providers are adopting visualization and monitoring platforms in addition to OpenStack Horizon to keep their infrastructure running with 100% uptime. New tools that help with proactive remediation of issues are being deployed to quickly bring back the system to healthy conditions.
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum ResultsRightScale
RightScale User Conference NYC 2011 -
Multi-Cloud Roadmap: Architecting Hybrid Environments for Maximum Results
Peder Ulander - CMO, Cloud.com
Many companies move to the cloud before they fully understand the complexities of a solid implementation strategy. Public and private clouds each have their benefits and limitations, and it's imperative to develop a clear roadmap for success that incorporates a best-practices reference architecture. In this session, we'll share how to architect a hybrid cloud environment as part of your overall cloud strategy, how to achieve multi-cloud interoperability, and how to proactively plan to survive cloud infrastructure outages.
Design and Deploy Secure Clouds for Financial Services Use CasesPLUMgrid
During this webinar Red Hat and PLUMgrid discussed how to design and deploy clouds for Financial Services in a secure and compliant way with OpenStack and SDN
See a demo of HashiCorp Consul Service (HCS) on Azure and learn how it could be used to migrate from monolithic, VM-based apps to microservices running on Kubernetes.
Cloud native microservices for systems and applications ieee rev2Prem Sankar Gopannan
This presentation gives an overview about the need for Microservices and business drivers that demands such architecture. Provides an overview about Kubernetes, Istio and Prometheus
[HashiConf 2019] "Securing Cloud Native Communication with Ambassador and Con...Daniel Bryant
Everyone building or operating cloud native applications must understand the fundamentals of security issues and modern threat models. Although this topic is vast, in this talk Nic and Daniel will focus on the end-to-end communication and higher-level networking threats, and explore how the combination of an edge proxy and service mesh using TLS and mTLS can be used to mitigate many man-in-the-middle attacks.
Key takeaways include: understand the "three pillars" of service mesh functionality - observability, reliability, and security; a service mesh is in a unique place to enforce security features like mTLS; learn how to ensure that there are no exploitable "gaps" within the end-to-end/user-to-service communication path, explore the differences in ingress/mesh control planes, with brief demonstrations using Ambassador and Consul Connect.
In this presentation we will talk about the Microservices approach and how it can be implemented in IoT ecosystem.
The microservice architectural style is an approach to developing a single application as a suite of small services, each running in its own process and communicating with lightweight mechanisms, often an HTTP resource API.
A possible solution to easily control the IoT systems is to create an intelligent platform using a microservices architecture.
Modern Network Compliance: Achieving Compliance in a Hybrid, Multi-Cloud WorldItential
Today’s enterprise networks are expected to operate according to three tenets; security, reliability, and performance. This is why implementing a comprehensive method of ensuring network compliance is important to every organization. Network compliance ensures that every network device and service is properly configured and adheres to a clearly defined standard. This builds confidence in the network’s ability to operate optimally and creates a foundation of trust for further network automation.
Today’s modern network spans the both on-prem and multi-cloud environments, which poses a new challenge for network teams who must ensure compliance for all areas of the network. Traditional tools for delivering compliance only work with on-premises, CLI-based networks and lack any support for cloud network services that are managed though APIs. Network teams need a fresh solution for this challenge, so join Glenn Gray and Rich Martin for part 3 of Itential’s Modern Network Compliance series where they will discuss how to achieve network compliance in a hybrid and multi-cloud network environment.
In this webinar, we will dive into:
• Understanding the complexity of cloud networks.
• Uncovering the methods of delivering compliance to cloud networks.
• Achieving on-prem and cloud network compliance with a demo of Itential’s Configuration Manager.
While the need for network automation is becoming a key part of the overall digital transformation agenda, the reality is that the success rate behind previous attempts to drive network automation (a.k.a NFV) is only at about 30%, where the statistics show that 70% of transformation projects fail!
Service Mesh - kilometer 30 in a microservice marathonMichael Hofmann
Distributed applications like microservices shift some of their complexities into the interaction of services. Such a service mesh, which can have hundreds of runtime instances, is very difficult to manage. You will be concerned with some of the following questions: Which service will be requested by which other services in which version and how often depending on the request content? How can you test the interaction and how can you replace single services with new ones?
These and other questions will be discussed in this session. Tools to make your live easier with a service mesh will also be introduced.
Securing Your CI Pipeline with HashiCorp Vault - P2Ashnikbiz
Today, CI/CD is becoming a practice for optimum software delivery in almost every organization. What is key is how you manage the secrets in your pipeline, especially in a large organization with multiple projects, across several teams.
Hashicorp Vault helps organizations to centrally manage secrets even in your CI/CD pipelines.
WEBINAR COVERS:
Why is it critical to secure your pipeline which needs to access a lot of important secrets in order to provision and deploy
How Vault provides a unified interface to any secret while providing tight access control and recording a detailed audit log
Customer use cases and scenarios
Demo: How to secure your CI pipeline with Vault
Watch on demand: https://bit.ly/35QCq0u
The concept of service mesh is one of the new technologies that have grown up around the container and micro-service model over the last couple of years, and Istio is the latest entry into this space. As Istio was recently included as an incubated project in the CNCF, many companies are now looking to it to provide a set of key functions to accelerate their micro-service application management model. Istio enables bi-directional authentication and security of service communication via TLS based authentication and encryption, and at the same time is able to capture application level communication statistics, improving the application development team's visibility into the otherwise difficult to track communication patterns. In this way, Istio acts like an application level network, riding across the underlying capabilities of Kubernetes CNI based networks and network policy. We will implement Istio on a GKE kubernetes cluster, and instrument a simple application to get better insight into how Istio provides its capabilities.
Speaker Bio:
With over 20 years of experience as a systems reliability engineer, and a focus on automating not only application deployments but the underlying infrastructure as well, Robert Starmer brings a wealth of knowledge to the full application enablement stack. He has applied this knowledge in fields from high-performance computing to high-frequency trading environments, and everything in between. Robert also holds patents in network, data center, and application performance and scale enhancements. He is a Founder and the CTO at Kumulus Technologies, a DevOps, Systems Reliability Engineering and cloud computing consultancy. Additionally, Robert is an incurable photography nerd and has been known to stay up until dawn in remote locations to capture celestial time-lapses.
Modern application architectures are embracing public clouds, microservices, and container schedulers like Kubernetes and Nomad. These bring complex service-to-service communication patterns, increased scale, dynamic IP addresses, ephemeral infrastructure, and higher failure rates. These changes require a new approach for service discovery, configuration, and segmentation. Service discovery enables services to find and communicate with each other. Service configuration allows us to dynamically configure applications at runtime. Service segmentations lets us secure our microservices architectures by limiting access. In this talk, we cover these challenges and how to solve them with Consul providing as a service mesh.
Presentation in IBM Cloud Meet-up of Toronto
https://www.meetup.com/IBM-Cloud-Toronto/events/253903913/?_xtd=gatlbWFpbF9jbGlja9oAJGU3NmM3ZjdmLWE2NzgtNGVlNC1iNGZiLTBlZGE5ZWM0NDZjOQ
Hybrid integration platform reference architectureChanaka Fernando
WSO2 Integration Platform allows users to integrate with on-premise as well as cloud based systems. It provides deployment options on cloud, on-premise or as a hybrid deployment.
A New Approach to Continuous Monitoring in the CloudNETSCOUT
In this #CLUS 2019 session, you will learn how NETSCOUT’s smart data platform enables continuous monitoring in hybrid cloud environments to minimize risk and accelerate customer migration to the Cloud. You will review real-life examples of how businesses optimized their Cloud migration gaining visibility and deep insights, in both physical and virtual worlds, to maintain continuity and security of the services throughout the migration process.
Design and Deploy Secure Clouds for Financial Services Use CasesPLUMgrid
During this webinar Red Hat and PLUMgrid discussed how to design and deploy clouds for Financial Services in a secure and compliant way with OpenStack and SDN
See a demo of HashiCorp Consul Service (HCS) on Azure and learn how it could be used to migrate from monolithic, VM-based apps to microservices running on Kubernetes.
Cloud native microservices for systems and applications ieee rev2Prem Sankar Gopannan
This presentation gives an overview about the need for Microservices and business drivers that demands such architecture. Provides an overview about Kubernetes, Istio and Prometheus
[HashiConf 2019] "Securing Cloud Native Communication with Ambassador and Con...Daniel Bryant
Everyone building or operating cloud native applications must understand the fundamentals of security issues and modern threat models. Although this topic is vast, in this talk Nic and Daniel will focus on the end-to-end communication and higher-level networking threats, and explore how the combination of an edge proxy and service mesh using TLS and mTLS can be used to mitigate many man-in-the-middle attacks.
Key takeaways include: understand the "three pillars" of service mesh functionality - observability, reliability, and security; a service mesh is in a unique place to enforce security features like mTLS; learn how to ensure that there are no exploitable "gaps" within the end-to-end/user-to-service communication path, explore the differences in ingress/mesh control planes, with brief demonstrations using Ambassador and Consul Connect.
In this presentation we will talk about the Microservices approach and how it can be implemented in IoT ecosystem.
The microservice architectural style is an approach to developing a single application as a suite of small services, each running in its own process and communicating with lightweight mechanisms, often an HTTP resource API.
A possible solution to easily control the IoT systems is to create an intelligent platform using a microservices architecture.
Modern Network Compliance: Achieving Compliance in a Hybrid, Multi-Cloud WorldItential
Today’s enterprise networks are expected to operate according to three tenets; security, reliability, and performance. This is why implementing a comprehensive method of ensuring network compliance is important to every organization. Network compliance ensures that every network device and service is properly configured and adheres to a clearly defined standard. This builds confidence in the network’s ability to operate optimally and creates a foundation of trust for further network automation.
Today’s modern network spans the both on-prem and multi-cloud environments, which poses a new challenge for network teams who must ensure compliance for all areas of the network. Traditional tools for delivering compliance only work with on-premises, CLI-based networks and lack any support for cloud network services that are managed though APIs. Network teams need a fresh solution for this challenge, so join Glenn Gray and Rich Martin for part 3 of Itential’s Modern Network Compliance series where they will discuss how to achieve network compliance in a hybrid and multi-cloud network environment.
In this webinar, we will dive into:
• Understanding the complexity of cloud networks.
• Uncovering the methods of delivering compliance to cloud networks.
• Achieving on-prem and cloud network compliance with a demo of Itential’s Configuration Manager.
While the need for network automation is becoming a key part of the overall digital transformation agenda, the reality is that the success rate behind previous attempts to drive network automation (a.k.a NFV) is only at about 30%, where the statistics show that 70% of transformation projects fail!
Service Mesh - kilometer 30 in a microservice marathonMichael Hofmann
Distributed applications like microservices shift some of their complexities into the interaction of services. Such a service mesh, which can have hundreds of runtime instances, is very difficult to manage. You will be concerned with some of the following questions: Which service will be requested by which other services in which version and how often depending on the request content? How can you test the interaction and how can you replace single services with new ones?
These and other questions will be discussed in this session. Tools to make your live easier with a service mesh will also be introduced.
Securing Your CI Pipeline with HashiCorp Vault - P2Ashnikbiz
Today, CI/CD is becoming a practice for optimum software delivery in almost every organization. What is key is how you manage the secrets in your pipeline, especially in a large organization with multiple projects, across several teams.
Hashicorp Vault helps organizations to centrally manage secrets even in your CI/CD pipelines.
WEBINAR COVERS:
Why is it critical to secure your pipeline which needs to access a lot of important secrets in order to provision and deploy
How Vault provides a unified interface to any secret while providing tight access control and recording a detailed audit log
Customer use cases and scenarios
Demo: How to secure your CI pipeline with Vault
Watch on demand: https://bit.ly/35QCq0u
The concept of service mesh is one of the new technologies that have grown up around the container and micro-service model over the last couple of years, and Istio is the latest entry into this space. As Istio was recently included as an incubated project in the CNCF, many companies are now looking to it to provide a set of key functions to accelerate their micro-service application management model. Istio enables bi-directional authentication and security of service communication via TLS based authentication and encryption, and at the same time is able to capture application level communication statistics, improving the application development team's visibility into the otherwise difficult to track communication patterns. In this way, Istio acts like an application level network, riding across the underlying capabilities of Kubernetes CNI based networks and network policy. We will implement Istio on a GKE kubernetes cluster, and instrument a simple application to get better insight into how Istio provides its capabilities.
Speaker Bio:
With over 20 years of experience as a systems reliability engineer, and a focus on automating not only application deployments but the underlying infrastructure as well, Robert Starmer brings a wealth of knowledge to the full application enablement stack. He has applied this knowledge in fields from high-performance computing to high-frequency trading environments, and everything in between. Robert also holds patents in network, data center, and application performance and scale enhancements. He is a Founder and the CTO at Kumulus Technologies, a DevOps, Systems Reliability Engineering and cloud computing consultancy. Additionally, Robert is an incurable photography nerd and has been known to stay up until dawn in remote locations to capture celestial time-lapses.
Modern application architectures are embracing public clouds, microservices, and container schedulers like Kubernetes and Nomad. These bring complex service-to-service communication patterns, increased scale, dynamic IP addresses, ephemeral infrastructure, and higher failure rates. These changes require a new approach for service discovery, configuration, and segmentation. Service discovery enables services to find and communicate with each other. Service configuration allows us to dynamically configure applications at runtime. Service segmentations lets us secure our microservices architectures by limiting access. In this talk, we cover these challenges and how to solve them with Consul providing as a service mesh.
Presentation in IBM Cloud Meet-up of Toronto
https://www.meetup.com/IBM-Cloud-Toronto/events/253903913/?_xtd=gatlbWFpbF9jbGlja9oAJGU3NmM3ZjdmLWE2NzgtNGVlNC1iNGZiLTBlZGE5ZWM0NDZjOQ
Hybrid integration platform reference architectureChanaka Fernando
WSO2 Integration Platform allows users to integrate with on-premise as well as cloud based systems. It provides deployment options on cloud, on-premise or as a hybrid deployment.
A New Approach to Continuous Monitoring in the CloudNETSCOUT
In this #CLUS 2019 session, you will learn how NETSCOUT’s smart data platform enables continuous monitoring in hybrid cloud environments to minimize risk and accelerate customer migration to the Cloud. You will review real-life examples of how businesses optimized their Cloud migration gaining visibility and deep insights, in both physical and virtual worlds, to maintain continuity and security of the services throughout the migration process.
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...WSO2
Stefano discusses how to augment service mesh functionality with API management capabilities, so you can create an end-to-end solution for your entire business functionality — from microservices, to APIs, to end-user applications.
For a long time APIs have largely been an exercise at the edge of complexity. They provide an engaging interface to attract developers, perhaps an underlying platform to monitor their consumption, and a means for those interested in whatever drives our backend to manage that success. That type interaction demands a certain type of interaction. But what happens in a backend world of microservices? Do we really have the same API needs and flexibility concerns at the mesh that we do at the edge and how might we best address these two worlds going forward? I will present the case for edge, the case for the mesh and try to bridge whatever space we have between them: chasm or ditch.
Join our webinar to learn how BMC enables enterprise customers to transform their organization to a digital DevOps model. In this webinar, NICE InContact will share their story of transforming from a physical data center to a hybrid environment, including data center and cloud infrastructure. They'll talk about strategies, challenges, best practices, and navigating an acquisition. Learn how NICE InContact improved service management and capacity management as well as resolution time for incidents using BMC TrueSight and AWS DevOps solutions. Join us to learn from a peer in the enterprise space to help you plan your own IT infrastructure transformation.
Microservices design principles establish some standard practices for planning, developing, and implementing a distributed architecture for your application. Read about some of the most common characteristics of design principles, its examples, and implementations carried out by various companies worldwide.
Support Software Defined Networking with Dynamic Network ArchitectureZivaro Inc
You know the value of SDN, but do you know what architecture best supports an SDN system? This presentation explains the importance of best in-class virtualized networking solutions and how those tools integrate with leading SDN systems. You’ll learn how SDN architecture components, such as Citrix Netscaler, help to converge the management of network and application services into a centralized, extensible orchestration platform. You'll also discover how to automate provisioning and configuration of the entire infrastructure to deliver new applications and services in minutes. This presentation is from a webinar presented by Michael Edwards, Principal Architect GTRI, and Jacob Rutski, Citrix, on May 12, 2016.
Webinar presentation March 9, 2017
IT environments are now fundamentally hybrid in nature – devices, systems, and people are spread across the globe, and at the same time virtualized. Achieving integration across this ever changing environment, and doing so at the pace of modern digital initiatives, is a significant challenge.
This presentation introduces a hybrid integration reference architecture published by the Cloud Standards Customer Council. Learn best practices from leading-edge enterprises that are starting to leverage a hybrid integration platform to take advantage of best of breed cloud-based and on-premises integration approaches.
This webinar draws from the CSCC's deliverable, Cloud Customer Architecture for Hybrid Integration. Read it here: http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-hybrid-integration.htm
Security and Observability of Application Traffic in KubernetesAkshay Mathur
Advance Load Balancers in containerized form can provide security and observability into traffic, improve application response time and lower down overall operational burden.
In Kubernetes env East-West traffic security and access control between microservices is very important especially when it is done effectively without imposing a lot of cost overhead.
See Consul running on Kubernetes and learn how to use Consul as a universal service mesh to securely connect your applications running on different platforms.
Business Continuity with Microservices-Based Apps and DevOps: Learnings from ...DevOps.com
In this new world of remote work, the demand for real-time cloud-based communication services has skyrocketed.
8x8, a company that provides a global cloud communications platform for its customers, moved its SaaS application from the data center to public cloud using Kubernetes and a microservices-based architecture to meet increased demand.
In this webinar, we’ll share the firsthand experience of the DevOps team at 8x8, covering key considerations and learnings from successfully migrating a VoIP offering from an on-premises environment to AWS at scale. Learnings will cover designing application delivery infrastructure, automation, analytics, security, observability, and rapid scaling.
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoThousandEyes
Learn how companies are leveraging hybrid WAN for branch, remote and main office sites while preserving visibility and insight with the ThousandEyes and Cisco integrated solution.
Similar to Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure (20)
See what deploying across polycloud environments using cross-workloads looks like in HashiCorp Nomad. And See Consul tie these workloads together with secure routing.
Empowering developers and operators through Gitlab and HashiCorpMitchell Pronschinske
Companies digitally transforming themselves into modern, software-defined businesses are building their foundation on cloud native solutions like GitLab and Hashicorp. Together, GitLab, Terraform, and Vault are empowering organizations to be more iterative, flexible, and secure. Join us in this session to learn more about how GitLab and Hashicorp are lowering the barrier of entry into industrializing the application development and delivery process across the entire application lifecycle.
Automate and simplify multi cloud complexity with f5 and hashi corpMitchell Pronschinske
In this session, Lori Mac Vittie, principal technology evangelist at F5 discusses digital transformation and how F5 and HashiCorp are working together to unlock the full potential of the cloud
In this webinar we will cover the new features in Vault 1.5. This release introduces several new improvements along with new features around the following areas: Usage Quotas for Request Rate Limiting, OpenShift Helm Support (beta), Telemetry and Monitoring Enhancements, and much more. Join Vault technical marketer Justin Weissig as he demos Vault 1.5's new features.
Integrated Storage, a key feature now available in Vault 1.4, can streamline your Vault architecture and improve performance. See demos and documentation of its use cases and migration process.
Learn how Cisco ACI and HashiCorp Terraform can help you increase productivity while reducing risks for your organization by managing infrastructure as code.
HashiCorp Nomad is an easy-to-use and flexible workload orchestrator that enables organizations to automate the deployment of any applications on any infrastructure at any scale across multiple clouds. While Kubernetes gets a lot of attention, Nomad is an attractive alternative that is easy to use, more flexible, and natively integrated with HashiCorp Vault and Consul. In addition to running Docker containers, Nomad can also run non-containerized, legacy applications on both Linux and Windows servers.
Terraform allows you to define your infrastructure as code. Variables and modules empower you to extend and reuse your Infrastructure as Code. With the Consul provider for Terraform, you can also let your Consul KV data drive your Terraform runs.
Learn from HashiCorp Vault engineer Nick Cabatoff how you can ensure that you actually use Vault effectively to allow no potential leaks of secret credentials, apis, or certs.
Watch this succinct guide to the benefits of modern scheduling and how HashiCorp Nomad can help you move your organization toward more modern deployment patterns.
Modern deployments require an environment that enables applications to operate at scale and quickly discover and securely connect to necessary services. Join this webinar to learn how HashiCorp Consul as a service mesh works with different Microsoft services to address these challenges and support strong microservice deployments.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Launch Your Streaming Platforms in MinutesRoshan Dwivedi
The claim of launching a streaming platform in minutes might be a bit of an exaggeration, but there are services that can significantly streamline the process. Here's a breakdown:
Pros of Speedy Streaming Platform Launch Services:
No coding required: These services often use drag-and-drop interfaces or pre-built templates, eliminating the need for programming knowledge.
Faster setup: Compared to building from scratch, these platforms can get you up and running much quicker.
All-in-one solutions: Many services offer features like content management systems (CMS), video players, and monetization tools, reducing the need for multiple integrations.
Things to Consider:
Limited customization: These platforms may offer less flexibility in design and functionality compared to custom-built solutions.
Scalability: As your audience grows, you might need to upgrade to a more robust platform or encounter limitations with the "quick launch" option.
Features: Carefully evaluate which features are included and if they meet your specific needs (e.g., live streaming, subscription options).
Examples of Services for Launching Streaming Platforms:
Muvi [muvi com]
Uscreen [usencreen tv]
Alternatives to Consider:
Existing Streaming platforms: Platforms like YouTube or Twitch might be suitable for basic streaming needs, though monetization options might be limited.
Custom Development: While more time-consuming, custom development offers the most control and flexibility for your platform.
Overall, launching a streaming platform in minutes might not be entirely realistic, but these services can significantly speed up the process compared to building from scratch. Carefully consider your needs and budget when choosing the best option for you.
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaYara Milbes
Discover the transformative power of the WhatsApp API in our latest SlideShare presentation, "Top 7 Unique WhatsApp API Benefits." In today's fast-paced digital era, effective communication is crucial for both personal and professional success. Whether you're a small business looking to enhance customer interactions or an individual seeking seamless communication with loved ones, the WhatsApp API offers robust capabilities that can significantly elevate your experience.
In this presentation, we delve into the top 7 distinctive benefits of the WhatsApp API, provided by the leading WhatsApp API service provider in Saudi Arabia. Learn how to streamline customer support, automate notifications, leverage rich media messaging, run scalable marketing campaigns, integrate secure payments, synchronize with CRM systems, and ensure enhanced security and privacy.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
9. Networking
Dynamically locate any
application or
infrastructure service to
simplify network
connectivity
Observability
Increased visibility to gain
insights into how services
interact with and depend
on each other at the
runtime layer
Reliability
Building redundancy
through automated
failover and replication to
minimize outages and
downtimes
13. From infrastructure to innovation
Responsibilities DIY with Kubernetes Managed Kubernetes on Azure
Containerization
Application iteration,
debugging
CI/CD
Cluster hosting
Cluster upgrade
Patching
Scaling
Monitoring and logging
Customer Microsoft
Managed Kubernetes
empowers you to achieve more
Focus on your containers and
code, not the plumbing of them
14. Azure Kubernetes momentum
Azure Kubernetes Service
usage grew 30x since it was made
generally available in June 2018
Trusted by thousands of customers
Dated November 2018
15. Manage Kubernetes with ease
• Automated provisioning,
upgrades, patches
• High reliability, availability
• Easy, secure cluster scaling
• Self-healing
• API server monitoring
• At no charge
API server
Controller
ManagerScheduler
etcd
Store
Cloud
Controller
Self-managed master node(s)
Customer VMs
App/
workload
definitionUser
Docker
Pods
Docker
Pods
Docker
Pods
Docker
Pods
Docker
Pods
Schedule pods over
private tunnel
Kubernetes
API endpoint
Azure managed control plane
Infrastructure automation
16. Manage Kubernetes with ease
Azure Monitor
AKS production cluster
Microservices
Azure Container
Instances (ACI)
Pods
Virtual node
Availability Reliability
Highly available, reliable service with serverless scaling
Auto scaling
17. Accelerate containerized development
Kubernetes and DevOps
better together
Develop
• Native containers and Kubernetes support in IDE
• Remote debugging and iteration for multi-
containers
• Effective code merge
• Automatic containerization
Deliver
• CI/CD pipeline with automated tasks in a few
clicks
• Pre-configured canary deployment strategy
• In depth build and delivery process review and
integration testing
• Private registry with Helm support
Operate
• Out-of-box control plane telemetry, log
aggregation, and container health
• Declarative resource management
• Auto scaling
Inner loop
Test
Debug
Azure
DevSpaces
AKS dev
cluster
Azure Pipelines
Source
code control
Azure
Container
Registry
Helm chart
Container
image
AKS
production
cluster
Azure
Monitor
Scale
Terraform
Develop Deliver Operate
22. Towards Service Mesh Interface
Technologists who understand
Kubernetes
Technologists
who
understand
Service Mesh
Technologists who understand Service Mesh Interface
23. But that shouldn’t really be the case
Technologists who understand
Kubernetes expect a set of
networking functionality
available to them
Services should have an identity
and should be able to
communicate securely
Communication between
services should be monitored
and logged
Traffic patterns between services
should be configurable, i.e.,
newer service versions could be
receiving less traffic, etc.
24. PolicyRouting Telemetry
Historically, this was achieved
via smart endpoints, dumb
pipes
This has worked for the past 25 years
But with so many endpoints today, how do you manage
28. Service Mesh Interface (SMI) for Kubernetes
A Kubernetes interface that provides traffic routing, traffic telemetry, and traffic policy
Apps Tooling Ecosystem
Standardized
Standard interface for
service mesh on Kubernetes
Simplified
Basic feature set to address
most common scenarios
Extensible
Support for new features as
they become widely available
…and more
Service Mesh Interface
29. Service Mesh Interface
Technologists who understand
Kubernetes expect a set of
networking functionality
available to them, and now
they can get that
functionality through SMI
Services should have an identity
and should be able to
communicate securely
Communication between
services should be monitored
and logged
Traffic patterns between services
should be configurable, i.e.,
newer service versions could be
receiving less traffic, etc.
30. This isn’t a new concept
If the SMI concept sounds familiar, that’s because it is
Apps Tooling Ecosystem
Ingress
31. So, why SMI?
Because it’s faster, simpler, and friendlier
Get started
quickly
Simpler is
better
Ecosystem
friendly