SpringOne 2021
Session Title: Microservices Testing at Scale
Speakers: Kishore Kota, Sr Architect at Discover Financial Services; Sindhu Nair, Principal Value Stream Architect at Discover Financial Services; Ying Zhe, Director, Application Development at Discover Financial Services
Istio is a service mesh, and it's a cool new project from Google, IBM, Lyft and others. This talk describes at a high level how Istio works as a sidecar, and how it works great with Weave Cloud, which provides visualization to understand what's going on when you deploy Istio, and long-term Prometheus metrics storage with its built-in Prometheus service.
Setting up an ONAP development environment is not easy. Development tools and practices are not collected in a single place. This project pretends to collect and standardize that process.
SpringOne 2021
Session Title: Microservices Testing at Scale
Speakers: Kishore Kota, Sr Architect at Discover Financial Services; Sindhu Nair, Principal Value Stream Architect at Discover Financial Services; Ying Zhe, Director, Application Development at Discover Financial Services
Istio is a service mesh, and it's a cool new project from Google, IBM, Lyft and others. This talk describes at a high level how Istio works as a sidecar, and how it works great with Weave Cloud, which provides visualization to understand what's going on when you deploy Istio, and long-term Prometheus metrics storage with its built-in Prometheus service.
Setting up an ONAP development environment is not easy. Development tools and practices are not collected in a single place. This project pretends to collect and standardize that process.
Talk presented by Matt McNeeney and Alex Ley at Cloud Foundry Summit Europe 2017 in Basel, Switzerland. Learn how to build services for cloud-native platforms like Cloud Foundry and Kubernetes using the Open Service Broker API.
How to contribute to an open source project and don’t die during the Code Rev...Victor Morales
Reviewing changes is an essential part of the software development. This process involves the collaboration of several team members who ensure to keep quality standards. In open source projects, the process can be overwhelming for newbies. Along this presentation, I will share experiences and best practices acquired a long of my years contributing to different open source projects, like OpenStack, Kubernetes, CNCF and OPNFV and how to improve that collaboration between contributors and reviewers.
Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...Sonatype
George Parris III, Capital One
In many companies, the cornerstone of their continuous integration and continuous deployment strategy is a few, well known pieces of automation software that are absolutely vital to the way companies are building software these days using agile methodologies. Many times though, someone with some infrastructure experience will just spin up a server and install the packages, building and iterating upon that same install for the following years that they're using it, which puts them in a shaky place every time they have to make changes to it.
On the Online Account Opening project at Capital One, we’ve strived to maintain our entire infrastructure as immutable as possible. In doing so, it was decided that we should apply that principle to our core CI/CD automation tools as well. By using Config As Code, Implementing a useful backup and testing strategy, and utilizing some AWS capabilities, we’re able to make that happen.
Building CI/CD Pipelines with Jenkins and KubernetesJanakiram MSV
Learn how to configure CI/CD pipelines with Jenkins and Kubernetes. We will show you to how to automate deployments from source code to production clusters.
In this session, Steef-Jan Wiggers and Eldert Grootenboer will provide you an overview over all the different extensibility points and will demonstrate a few of them in demo’s.
This presentation was presented to the Fachhochschule Bern. The course was part of the Master program and we covered the topics of Cloud Native & Docker
Modernize applications and reduce TCO with Windows containers on Azure Servic...Microsoft Tech Community
Join us to learn how Accenture is using Windows containers on Service Fabric for their existing .NET legacy apps. Containers greatly improve server utilization and management while enabling your developers to spin up an environment to run without the need of infrastructure. In this session, we introduce—through a real-world customer example—the use of containers on Azure Service Fabric to modernize, deploy and operate .NET applications at scale.
Continuous Delivery on Kubernetes Using SpinnakerWSO2
Continuous delivery helps development teams to deliver faster and safer. WSO2 Continuous delivery for Kubernetes provides the tools and pipelines required to continuously deliver WSO2 products to Kubernetes environments. Using tools like Jenkins, ELK, and Prometheus, WSO2 Kubernetes Pipeline is able to provide an end to end solution for development teams to deliver changes and WSO2 updates effortlessly.
This deck explores:
- Installing the Kubernetes pipeline chart with pre-configured pipelines using helm.
- Deploying development, staging and production environment.
- Deploying changes and WSO2 updates across environments.
- Centralized logging using ELK.
- Monitoring using Prometheus and Grafana.
Webinar: Introduction to CloudBees Jenkins PlatformKiratech
Il Webinar a cura di Kiratech e CloudBees si è tenuto il giorno 04 Aprile 2017.
Il webinar andrà ad introdurre CloudBees Jenkins Enterprise, una delle principali soluzioni Enterprise che consente di implementare sistemi di Continuous Integration e Continuous Delivery per software. La piattaforma è basata su Jenkins, uno dei più importanti server open source per l’automation al mondo.
Durante il Webinar, potrete approfondire le funzionalità aggiuntive offerte dalla CloudBees Jenkins Platform, rispetto alla comune piattaforma Jenkins Open source. Approfondiremo in particolare i seguenti aspetti:
Produttività di Developer e Administrator
Scalabilità ed ottimizzazione dell’infrastruttura per installazioni su larga scala
High-availability e tolleranza ai guasti
Sicurezza avanzata e gestione dei Team
Build e Performance Analytics
Eseguire Applicazioni Cloud-Native con Pivotal Cloud Foundry su Google Cloud ...VMware Tanzu
Eseguire Applicazioni Cloud-Native con Pivotal Cloud Foundry su Google Cloud Platform (Pivotal Cloud-Native Workshop: Milan)
Fabio Marinelli
7 February 2018
How to Scale Operations for a Multi-Cloud Platform using PCFVMware Tanzu
What’s in a cloud platform? Turns out, often several clouds! Companies automate operations in a cloud by treating all components as commodities. However, at enterprise- scale, different business requirements dictate deploying multiple clouds including:
- Hybrid infrastructures and multiple cloud providers
- Compliance with country privacy laws and different security standards
- Specialization requests
The most advanced Pivotal Cloud Foundry (PCF) customers engineer their entire cloud platform, including their multitude of PCF instances, as a product. They create pervasive automation, treat their infrastructure as code, and continuously test and update their platform with delivery pipelines.
In this webinar we’ll discuss how companies are scaling operations of their multi-cloud platforms with Pivotal Cloud Foundry.
We’ll cover:
- Why enterprises deploy multiple clouds
- What operational challenges this causes
- How PCF customers are applying DevOps techniques and tools to platform automation
- An idealized tool stack for a engineering a multi-cloud platform at scale
- How to improve your platform engineering
We thank you in advance for joining us.
The Pivotal Team
Presenter : Greg Chase, James Ma, Caleb Washburn, Pivotal
Talk presented by Matt McNeeney and Alex Ley at Cloud Foundry Summit Europe 2017 in Basel, Switzerland. Learn how to build services for cloud-native platforms like Cloud Foundry and Kubernetes using the Open Service Broker API.
How to contribute to an open source project and don’t die during the Code Rev...Victor Morales
Reviewing changes is an essential part of the software development. This process involves the collaboration of several team members who ensure to keep quality standards. In open source projects, the process can be overwhelming for newbies. Along this presentation, I will share experiences and best practices acquired a long of my years contributing to different open source projects, like OpenStack, Kubernetes, CNCF and OPNFV and how to improve that collaboration between contributors and reviewers.
Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...Sonatype
George Parris III, Capital One
In many companies, the cornerstone of their continuous integration and continuous deployment strategy is a few, well known pieces of automation software that are absolutely vital to the way companies are building software these days using agile methodologies. Many times though, someone with some infrastructure experience will just spin up a server and install the packages, building and iterating upon that same install for the following years that they're using it, which puts them in a shaky place every time they have to make changes to it.
On the Online Account Opening project at Capital One, we’ve strived to maintain our entire infrastructure as immutable as possible. In doing so, it was decided that we should apply that principle to our core CI/CD automation tools as well. By using Config As Code, Implementing a useful backup and testing strategy, and utilizing some AWS capabilities, we’re able to make that happen.
Building CI/CD Pipelines with Jenkins and KubernetesJanakiram MSV
Learn how to configure CI/CD pipelines with Jenkins and Kubernetes. We will show you to how to automate deployments from source code to production clusters.
In this session, Steef-Jan Wiggers and Eldert Grootenboer will provide you an overview over all the different extensibility points and will demonstrate a few of them in demo’s.
This presentation was presented to the Fachhochschule Bern. The course was part of the Master program and we covered the topics of Cloud Native & Docker
Modernize applications and reduce TCO with Windows containers on Azure Servic...Microsoft Tech Community
Join us to learn how Accenture is using Windows containers on Service Fabric for their existing .NET legacy apps. Containers greatly improve server utilization and management while enabling your developers to spin up an environment to run without the need of infrastructure. In this session, we introduce—through a real-world customer example—the use of containers on Azure Service Fabric to modernize, deploy and operate .NET applications at scale.
Continuous Delivery on Kubernetes Using SpinnakerWSO2
Continuous delivery helps development teams to deliver faster and safer. WSO2 Continuous delivery for Kubernetes provides the tools and pipelines required to continuously deliver WSO2 products to Kubernetes environments. Using tools like Jenkins, ELK, and Prometheus, WSO2 Kubernetes Pipeline is able to provide an end to end solution for development teams to deliver changes and WSO2 updates effortlessly.
This deck explores:
- Installing the Kubernetes pipeline chart with pre-configured pipelines using helm.
- Deploying development, staging and production environment.
- Deploying changes and WSO2 updates across environments.
- Centralized logging using ELK.
- Monitoring using Prometheus and Grafana.
Webinar: Introduction to CloudBees Jenkins PlatformKiratech
Il Webinar a cura di Kiratech e CloudBees si è tenuto il giorno 04 Aprile 2017.
Il webinar andrà ad introdurre CloudBees Jenkins Enterprise, una delle principali soluzioni Enterprise che consente di implementare sistemi di Continuous Integration e Continuous Delivery per software. La piattaforma è basata su Jenkins, uno dei più importanti server open source per l’automation al mondo.
Durante il Webinar, potrete approfondire le funzionalità aggiuntive offerte dalla CloudBees Jenkins Platform, rispetto alla comune piattaforma Jenkins Open source. Approfondiremo in particolare i seguenti aspetti:
Produttività di Developer e Administrator
Scalabilità ed ottimizzazione dell’infrastruttura per installazioni su larga scala
High-availability e tolleranza ai guasti
Sicurezza avanzata e gestione dei Team
Build e Performance Analytics
Eseguire Applicazioni Cloud-Native con Pivotal Cloud Foundry su Google Cloud ...VMware Tanzu
Eseguire Applicazioni Cloud-Native con Pivotal Cloud Foundry su Google Cloud Platform (Pivotal Cloud-Native Workshop: Milan)
Fabio Marinelli
7 February 2018
How to Scale Operations for a Multi-Cloud Platform using PCFVMware Tanzu
What’s in a cloud platform? Turns out, often several clouds! Companies automate operations in a cloud by treating all components as commodities. However, at enterprise- scale, different business requirements dictate deploying multiple clouds including:
- Hybrid infrastructures and multiple cloud providers
- Compliance with country privacy laws and different security standards
- Specialization requests
The most advanced Pivotal Cloud Foundry (PCF) customers engineer their entire cloud platform, including their multitude of PCF instances, as a product. They create pervasive automation, treat their infrastructure as code, and continuously test and update their platform with delivery pipelines.
In this webinar we’ll discuss how companies are scaling operations of their multi-cloud platforms with Pivotal Cloud Foundry.
We’ll cover:
- Why enterprises deploy multiple clouds
- What operational challenges this causes
- How PCF customers are applying DevOps techniques and tools to platform automation
- An idealized tool stack for a engineering a multi-cloud platform at scale
- How to improve your platform engineering
We thank you in advance for joining us.
The Pivotal Team
Presenter : Greg Chase, James Ma, Caleb Washburn, Pivotal
Show and Tell: Building Applications on Cisco Open SDN Controller Cisco DevNet
The Cisco Open SDN Controller is based on the OpenDaylight SDN Controller and meets the need of Service Providers for a flexible, powerful, and commercially-supported multi-protocol controller. In this 60 minute session we will give an overview of the Cisco Open SDN Controller, explaining how the controller is packaged and the features it supports, and showing examples of applications that are supported by the controller. We will also outline the new features and applications that will be introduced in the next release of the controller. Taught by Giles Heron.
Presentation to the Perth MS Cloud Computing User Group on November 14, 2017. Covered off on how Chef, InSpec, Habitat and Chef Automate work with Windows, Azure and the Microsoft ecosystem.
DevOps Basics
DevOps Practices
What is CI/CD?
How to design CI/CD pipeline on AWS
Demo-1 Manually create a CI/CD on AWS
Demo-2 Manage cloudformation templates using CI/CD tools on AWS
It includes a link to a step-by-step guide to implementing demo.
Speakers:Gonzalo Bas, Amir Khan, Ivan Z., Angel Alberici
Host: Angel Alberici
Youtube: Virtual Muleys (https://www.youtube.com/c/VirtualMuleysOnline/videos)
Session 1: Integration for Sustainability: Leveraging the Anypoint Platform in Sustainability Scenarios
https://youtu.be/0vXgNU47HyM
Session 2: new MuleSoft Tools for DevOps 2021: the Anypoint Provider for Cloudhub Automation + Terraform Template; the Governance REST gSpreadsheet and the Postman collections for MuleSoft PlatformsAPIs
https://youtu.be/tqgoFmPgl7Y
In this marketing meeting, OpenStack Foundation COO Mark Collier discusses plans to consolidate the number of commercial logos, and how companies offering OpenStack products can participate.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
2. Overview
SSO Integration
Generate all keys/certs needed
Setup Openshift Client in Keycloak
Modify ocp config scripts
Integrate into single vm and ha ref arch
3. Why SSO
While ocp support integration of a variety of providers
for single sign-on, all require modifications of config
files
A Federated solution that can be used for both OCP
and OCP Applications is prefered
Keycloak gives a complete single-sign on solution
across mulitiple providers with a easy to user user-
interface
4. Automation
While a existing ref-arch does exist, on the manual
setup, it requires significant keys, and muliple manual
steps
Using a ansible script, keycloak can be auto
deployed, and integrated with existing reference
architecture(s)