Gives an overview about MEC application requirements and microservice patters. Provides a sample app and application of patterns to better design the MEC app. Provides an overview about state management of MEC app
Provided an overview about Hybrid Networking including Containers and VM. It also touches upon opensource solutions like Openstack Kuryr, Opendaylight.
Cloud native microservices for systems and applications ieee rev2Prem Sankar Gopannan
This presentation gives an overview about the need for Microservices and business drivers that demands such architecture. Provides an overview about Kubernetes, Istio and Prometheus
This slide deck was presented in OpenNetworkingSummit 2017. The theme is building microservices based VNF using Opensource tools and ecosystem. This also covers Design patterns that are relevant to the VNF context. Overview of COE project in Opendaylight and deployment scenarios it addresses.
Containers are changing the compute landscape and for NFVi support of Containers is key. Kubernetes is a well known Container Cluster Management software and this is slide deck from a talk given in Opendaylight Summit 2016. This slide gives an insight about Microservice architecture, Kuberentes and how it can be integrated with ODL. Session Video can be found at https://www.youtube.com/watch?v=a4_pkp2qiX8&list=PL8F5jrwEpGAiRCzJIyboA8Di3_TAjTT-2
Istio: Using nginMesh as the service proxyLee Calcote
With microservices and containers becoming mainstream, container orchestrators provide much of what the cluster (nodes and containers) needs. With container orchestrators' core focus on scheduling, discovery, and health at an infrastructure level, microservices are left with unmet, service-level needs, such as:
- Traffic management, routing, and resilient and secure communication between services
- Policy enforcement, rate-limiting, circuit breaking
- Visibility and monitoring with metrics, logs, and traces
- Load balancing and rollout/canary deployment support
Service meshes provide for these needs. In this session, we will dive into Istio - its components, capabilities, and extensibility. Istio envelops and integrates with other open source projects to deliver a full-service mesh. We'll explore these integrations and Istio's extensibility in terms of choice of proxies and adapters, such as nginMesh.
Provided an overview about Hybrid Networking including Containers and VM. It also touches upon opensource solutions like Openstack Kuryr, Opendaylight.
Cloud native microservices for systems and applications ieee rev2Prem Sankar Gopannan
This presentation gives an overview about the need for Microservices and business drivers that demands such architecture. Provides an overview about Kubernetes, Istio and Prometheus
This slide deck was presented in OpenNetworkingSummit 2017. The theme is building microservices based VNF using Opensource tools and ecosystem. This also covers Design patterns that are relevant to the VNF context. Overview of COE project in Opendaylight and deployment scenarios it addresses.
Containers are changing the compute landscape and for NFVi support of Containers is key. Kubernetes is a well known Container Cluster Management software and this is slide deck from a talk given in Opendaylight Summit 2016. This slide gives an insight about Microservice architecture, Kuberentes and how it can be integrated with ODL. Session Video can be found at https://www.youtube.com/watch?v=a4_pkp2qiX8&list=PL8F5jrwEpGAiRCzJIyboA8Di3_TAjTT-2
Istio: Using nginMesh as the service proxyLee Calcote
With microservices and containers becoming mainstream, container orchestrators provide much of what the cluster (nodes and containers) needs. With container orchestrators' core focus on scheduling, discovery, and health at an infrastructure level, microservices are left with unmet, service-level needs, such as:
- Traffic management, routing, and resilient and secure communication between services
- Policy enforcement, rate-limiting, circuit breaking
- Visibility and monitoring with metrics, logs, and traces
- Load balancing and rollout/canary deployment support
Service meshes provide for these needs. In this session, we will dive into Istio - its components, capabilities, and extensibility. Istio envelops and integrates with other open source projects to deliver a full-service mesh. We'll explore these integrations and Istio's extensibility in terms of choice of proxies and adapters, such as nginMesh.
Simple, Scalable and Secure Networking for Data Centers with Project CalicoEmma Gordon
Traditional overlay networks using VXLAN are more complicated to setup and diagnose than is necessary for the majority of data centers. Calico offers an alternative Layer 3 solution - aside from simplicity, this also offers benefits in terms of improved scale and security.
These are the Calico slides from the SDN Switzerland meetup on 13/11/2015,
Istio Triangle Kubernetes Meetup Aug 2019Ram Vennam
It's been two years since we introduced the Istio project to the Triangle Kubernetes Meetup group. This presentation will be a brief re-introduction of the Istio project, and a summary of the updates to the Istio project since its 1.0 release.
5 lessons learned for Successful Migration to Confluent CloudNatan Silnitsky
Confluent Cloud makes Devops engineers lives a lot more easier.
Yet moving 1500 microservices, 10K topics and 100K partitions to a multi-cluster Confluent cloud can be a challenge.
In this talk you will hear about 5 lessons that Wix has learned in order to successfully meet this challenge.
These lessons include:
1. Automation, Automation, Automation - all the process has to be completely automated at such scale
2. Prefer a gradual approach - E.g. migrate topics in small chunks and not all at once. Reduces risks if things go bad
3. First migrate test topics with relayed real traffic - So data will be real but will not effect production.
4. Cleanup first - avoid migrating unused topics or topics with too many unnecessary partitions
5. Adapt to Confluent Cloud APIs - e.g. lag monitoring
The Simply Complex Task of Implementing Kubernetes Ingress - Velocity NYCAmbassador Labs
Getting traffic into a Kubernetes cluster should be simple, but it’s not. Richard Li explains how software architectures have evolved to take advantage of Kubernetes and discusses the implications that these changes have on ingress. Richard then covers some of the nuances of modern ingress, including authentication, resilience, and observability at the edge, explores how Kubernetes handles ingress today, with NodePorts, LoadBalancers, and ingress controllers, and shares his experience and lessons learned from using several real-world implementations of ingress on Kubernetes.
Distributed Enterprise Monitoring and Management of Apache Kafka (William McL...HostedbyConfluent
Managing a distributed system like Apache Kafka can be extremely challenging, especially when you try to approach monitoring and managing from a single centralized GUI approach. In this talk come here and see a demo of a more decoupled approach to Kafka management and Kafka Monitoring where data is centralized but access is is distributed to scale to enterprise deployments, CICD pipelines and much much more.
Polyglot, fault-tolerant event-driven programming with kafka, kubernetes and ...Natan Silnitsky
At Wix, we have created a universal event-driven programming infrastructure on top of the Kafka message broker.
This infra makes sure messages are eventually successfully consumed and produced no matter what failure it encounters.
In this talk, you will learn about the features we introduced in order to make sure our distributed system can safely handle an ever growing message throughput in a fault tolerant manner.
You will be introduced to such techniques as retry topics, local persistent queues, and cooperative fibers that help make your flows more resilient and performant.
You will also learn how to make this infra work for all programming languages tech stacks with optimal resource manage using the power of Kubernetes and gRPC.
When to use a client library, and when to deploy an external pod (DaemonSet) or even deploy a sidecar.
linker∙d is a transparent proxy that adds service discovery, routing, failure handling, and visibility to modern software applications which can be used with grpc/json application based.
Service Discovery and Registration in a Microservices ArchitecturePLUMgrid
Microservices, Service Discovery and Registration have been heading towards the peak of inflated expectations on the Gartner Hype cycle for over the last year or so, but there has often been a lack of clarity as to what these are, why are they needed or how to implement them well.
Service discovery and registration are key components of most distributed systems and service oriented architectures. In this session we will talk about what, why and how of service registration and discovery in distributed systems in general and OpenStack in particular.
We will talk about some of the technologies that address this challenge like Zookeeper, Etcd, Consul, Mesos-DNS, Minuteman, SkyDNS, SmartStack or Eureka. We will also address how these technologies as well as existing OpenStack projects can be used to solve this problem inside OpenStack environments.
Stop reinventing the wheel with Istio by Mete Atamel (Google)Codemotion
#Codemotion Rome 2018 - Containers provide a consistent environment to run services. Kubernetes help us to manage and scale our container cluster. Good start for a loosely coupled microservices architecture but not enough. How do you control the flow of traffic & enforce policies between services? How do you visualize service dependencies & identify issues? How can you provide verifiable service identities, test for failures? You can implement your own custom solutions or you can rely on Istio, an open platform to connect, manage and secure microservices.
Kernel advantages for Istio realized with CiliumCynthia Thomas
Istio brings a myriad of options to provide routing rules, encryption, and monitoring for microservices, typically in container environments. Cilium provides accelerated network security using a modern kernel technology called BPF. Put the two together and what do you get? A distributed security solution enabling microservices traffic management, security, and monitoring while enforcing policy as close to the microservices as possible.
Cynthia Thomas and Romain Lenglet discuss the architectural and performance benefits of using Cilium with Istio and provide a demo of this BPF-based, Linux kernel technology. Cilium provides an API-aware security solution that can make a decision on every single microservice flow, with the ability to enforce protocols such as HTTP, Kafka, and gRPC. By addressing security policy at the API layer, you can enforce policy efficiently with kernel capabilities while reducing the attack surface in a microservices deployment.
Jax london - Battle-tested event-driven patterns for your microservices archi...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
Battle-tested event-driven patterns for your microservices architecture - Sca...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
Istio - A Service Mesh for Microservices as ScaleRam Vennam
Manage microservices on Kubernetes using the open source Istio service mesh from IBM, Google, and Lyft. In this presentation we explore the overall value and architecture of Istio and walk through key mechanisms for using Istio to drive highly secure microservices. We will also demonstrate the various features of Istio showing how to intelligently load balance traffic between services, conduct A/B tests, release canaries, and more.
An Open-Source Platform to Connect, Manage, and Secure MicroservicesDoiT International
Services are at the core of modern software architecture. Deploying a series of modular, small (micro-)services rather than big monoliths gives developers the flexibility to work in different languages, technologies and release cadence across the system; resulting in higher productivity and velocity, especially for larger teams.
With the adoption of microservices, however, new problems emerge due to the sheer number of services that exist in a larger system. Problems that had to be solved once for a monolith, like security, load balancing, monitoring, and rate limiting need to be handled for each service.
Istio, announced at GlueCon 2017, addresses these problems in a fundamental way through a service mesh framework. With Istio, developers can implement the core logic for the microservices, and let the framework take care of the rest – traffic management, discovery, service identity and security, and policy enforcement. Better yet, this can be also done for existing microservices without rewriting or recompiling any of their parts. Istio uses Envoy as its runtime proxy component and provides an extensible intermediation layer which allows global cross-cutting policy enforcement and telemetry collection.
In early March, Harbour IT hosted a breakfast session in conjunction with VMware – “vForum Wrap – All the best bits from VMware’s vForum 2010”.
Held in both the Norwest and Sydney offices, local customers were given a VMware update from guest speaker, Bo Leksono. The presentation covered the latest VMware technology and the steps to follow on your journey to the cloud
Simple, Scalable and Secure Networking for Data Centers with Project CalicoEmma Gordon
Traditional overlay networks using VXLAN are more complicated to setup and diagnose than is necessary for the majority of data centers. Calico offers an alternative Layer 3 solution - aside from simplicity, this also offers benefits in terms of improved scale and security.
These are the Calico slides from the SDN Switzerland meetup on 13/11/2015,
Istio Triangle Kubernetes Meetup Aug 2019Ram Vennam
It's been two years since we introduced the Istio project to the Triangle Kubernetes Meetup group. This presentation will be a brief re-introduction of the Istio project, and a summary of the updates to the Istio project since its 1.0 release.
5 lessons learned for Successful Migration to Confluent CloudNatan Silnitsky
Confluent Cloud makes Devops engineers lives a lot more easier.
Yet moving 1500 microservices, 10K topics and 100K partitions to a multi-cluster Confluent cloud can be a challenge.
In this talk you will hear about 5 lessons that Wix has learned in order to successfully meet this challenge.
These lessons include:
1. Automation, Automation, Automation - all the process has to be completely automated at such scale
2. Prefer a gradual approach - E.g. migrate topics in small chunks and not all at once. Reduces risks if things go bad
3. First migrate test topics with relayed real traffic - So data will be real but will not effect production.
4. Cleanup first - avoid migrating unused topics or topics with too many unnecessary partitions
5. Adapt to Confluent Cloud APIs - e.g. lag monitoring
The Simply Complex Task of Implementing Kubernetes Ingress - Velocity NYCAmbassador Labs
Getting traffic into a Kubernetes cluster should be simple, but it’s not. Richard Li explains how software architectures have evolved to take advantage of Kubernetes and discusses the implications that these changes have on ingress. Richard then covers some of the nuances of modern ingress, including authentication, resilience, and observability at the edge, explores how Kubernetes handles ingress today, with NodePorts, LoadBalancers, and ingress controllers, and shares his experience and lessons learned from using several real-world implementations of ingress on Kubernetes.
Distributed Enterprise Monitoring and Management of Apache Kafka (William McL...HostedbyConfluent
Managing a distributed system like Apache Kafka can be extremely challenging, especially when you try to approach monitoring and managing from a single centralized GUI approach. In this talk come here and see a demo of a more decoupled approach to Kafka management and Kafka Monitoring where data is centralized but access is is distributed to scale to enterprise deployments, CICD pipelines and much much more.
Polyglot, fault-tolerant event-driven programming with kafka, kubernetes and ...Natan Silnitsky
At Wix, we have created a universal event-driven programming infrastructure on top of the Kafka message broker.
This infra makes sure messages are eventually successfully consumed and produced no matter what failure it encounters.
In this talk, you will learn about the features we introduced in order to make sure our distributed system can safely handle an ever growing message throughput in a fault tolerant manner.
You will be introduced to such techniques as retry topics, local persistent queues, and cooperative fibers that help make your flows more resilient and performant.
You will also learn how to make this infra work for all programming languages tech stacks with optimal resource manage using the power of Kubernetes and gRPC.
When to use a client library, and when to deploy an external pod (DaemonSet) or even deploy a sidecar.
linker∙d is a transparent proxy that adds service discovery, routing, failure handling, and visibility to modern software applications which can be used with grpc/json application based.
Service Discovery and Registration in a Microservices ArchitecturePLUMgrid
Microservices, Service Discovery and Registration have been heading towards the peak of inflated expectations on the Gartner Hype cycle for over the last year or so, but there has often been a lack of clarity as to what these are, why are they needed or how to implement them well.
Service discovery and registration are key components of most distributed systems and service oriented architectures. In this session we will talk about what, why and how of service registration and discovery in distributed systems in general and OpenStack in particular.
We will talk about some of the technologies that address this challenge like Zookeeper, Etcd, Consul, Mesos-DNS, Minuteman, SkyDNS, SmartStack or Eureka. We will also address how these technologies as well as existing OpenStack projects can be used to solve this problem inside OpenStack environments.
Stop reinventing the wheel with Istio by Mete Atamel (Google)Codemotion
#Codemotion Rome 2018 - Containers provide a consistent environment to run services. Kubernetes help us to manage and scale our container cluster. Good start for a loosely coupled microservices architecture but not enough. How do you control the flow of traffic & enforce policies between services? How do you visualize service dependencies & identify issues? How can you provide verifiable service identities, test for failures? You can implement your own custom solutions or you can rely on Istio, an open platform to connect, manage and secure microservices.
Kernel advantages for Istio realized with CiliumCynthia Thomas
Istio brings a myriad of options to provide routing rules, encryption, and monitoring for microservices, typically in container environments. Cilium provides accelerated network security using a modern kernel technology called BPF. Put the two together and what do you get? A distributed security solution enabling microservices traffic management, security, and monitoring while enforcing policy as close to the microservices as possible.
Cynthia Thomas and Romain Lenglet discuss the architectural and performance benefits of using Cilium with Istio and provide a demo of this BPF-based, Linux kernel technology. Cilium provides an API-aware security solution that can make a decision on every single microservice flow, with the ability to enforce protocols such as HTTP, Kafka, and gRPC. By addressing security policy at the API layer, you can enforce policy efficiently with kernel capabilities while reducing the attack surface in a microservices deployment.
Jax london - Battle-tested event-driven patterns for your microservices archi...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
Battle-tested event-driven patterns for your microservices architecture - Sca...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
Istio - A Service Mesh for Microservices as ScaleRam Vennam
Manage microservices on Kubernetes using the open source Istio service mesh from IBM, Google, and Lyft. In this presentation we explore the overall value and architecture of Istio and walk through key mechanisms for using Istio to drive highly secure microservices. We will also demonstrate the various features of Istio showing how to intelligently load balance traffic between services, conduct A/B tests, release canaries, and more.
An Open-Source Platform to Connect, Manage, and Secure MicroservicesDoiT International
Services are at the core of modern software architecture. Deploying a series of modular, small (micro-)services rather than big monoliths gives developers the flexibility to work in different languages, technologies and release cadence across the system; resulting in higher productivity and velocity, especially for larger teams.
With the adoption of microservices, however, new problems emerge due to the sheer number of services that exist in a larger system. Problems that had to be solved once for a monolith, like security, load balancing, monitoring, and rate limiting need to be handled for each service.
Istio, announced at GlueCon 2017, addresses these problems in a fundamental way through a service mesh framework. With Istio, developers can implement the core logic for the microservices, and let the framework take care of the rest – traffic management, discovery, service identity and security, and policy enforcement. Better yet, this can be also done for existing microservices without rewriting or recompiling any of their parts. Istio uses Envoy as its runtime proxy component and provides an extensible intermediation layer which allows global cross-cutting policy enforcement and telemetry collection.
In early March, Harbour IT hosted a breakfast session in conjunction with VMware – “vForum Wrap – All the best bits from VMware’s vForum 2010”.
Held in both the Norwest and Sydney offices, local customers were given a VMware update from guest speaker, Bo Leksono. The presentation covered the latest VMware technology and the steps to follow on your journey to the cloud
Enabling the Deployment of Edge Services with the Open Network Edge Services ...Liz Warner
The Open Network Edge Services Toolkit (OpenNESS) is an open-source software toolkit for the enablement of orchestration and management of edge services on a diverse range of platforms. This talk will present the problem statement that OpenNESS aims to solve, the use-cases in which OpenNESS can be deployed, and a top-level description of its architecture.
Kubernetes based Cloud-region support in ONAP to bring up VM and container ba...Victor Morales
This material was used during the ONAP DDF + OPNFV Plugfest 2019 in Paris to share the progress made on this project and the plans for next coming releases
Modern Cloud-Native Streaming Platforms: Event Streaming Microservices with K...confluent
Microservices, events, containers, and orchestrators are dominating our vernacular today. As operations teams adapt to support these technologies in production, cloud-native platforms like Cloud Foundry and Kubernetes have quickly risen to serve as force multipliers of automation, productivity and value. Kafka is providing developers a critically important component as they build and modernize applications to cloud-native architecture. This talk will explore:
• Why cloud-native platforms and why run Kafka on Kubernetes?
• What kind of workloads are best suited for this combination?
• Tips to determine the path forward for legacy monoliths in your application portfolio
• Running Kafka as a Streaming Platform on Container Orchestration
OPNFV VIM integrates control and management components from upstream projects such as openstack, ONOS, ODL, etc. While huge success has been achieved in OPNFV for integration, automated build and deployment, the performance of VIM for controlling and managing virtual network has received little attention. This presentation is to address the VIM performance related to the network part of the infrastructure. Based on a Telco use case, we define performance metrics for SDN controller, northbound communication channels, and network provisioning. ONOSFW and OpenStack are two components for VIM. Test data is collected and analyzed for performance evaluation and suggestions for future improvements. China Unicom, ON.LAB and Huawei jointly define the use case and methodology, do analysis, and produce results.
Edge Computing Platforms and Protocols - Ph.D. thesisNitinder Mohan
Introductory presentation for Ph.D. thesis of Nitinder Mohan titled "Edge Computing Platforms and Protocols". The defense took place at the University of Helsinki, Finland on 8th November 2019.
The video of the presentation is available at https://youtu.be/dDVZozTwreE
The thesis can be found on https://helda.helsinki.fi/handle/10138/306041
Modern Cloud-Native Streaming Platforms: Event Streaming Microservices with A...confluent
Microservices, events, containers, and orchestrators are dominating our vernacular today. As operations teams adapt to support these technologies in production, cloud-native platforms like Pivotal Cloud Foundry and Kubernetes have quickly risen to serve as force multipliers of automation, productivity and value.
Apache Kafka® is providing developers a critically important component as they build and modernize applications to cloud-native architecture.
This talk will explore:
• Why cloud-native platforms and why run Apache Kafka on Kubernetes?
• What kind of workloads are best suited for this combination?
• Tips to determine the path forward for legacy monoliths in your application portfolio
• Demo: Running Apache Kafka as a Streaming Platform on Kubernetes
Empowering Customer Centric NFV - by Sean Chen @ Openstack Summit Paris 2014Sean Chen
Presented at Openstack Summit Paris 2014
During our pursuit of customer-centric innovations through the NFV evolution in the past few years, Huawei has strived to create long-term values for our telco customers by collaborating very closely. We are now at a stage with clear understanding and are promoting an open solution based on OpenStack. Along the journey, we ve encountered several challenges and identified several opportunities. In this presentation, we d like to share our experience and findings, as well as some of our NFV visions that OpenStack community may be motivated to help evolve the telco industry further.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Using Microservices Architecture and Patterns to Address Applications Requirements on MEC
1.
2. Using Microservices Architecture and
Patterns to address application
requirements on MEC
Presented by Cloud Architects: Prem Sankar Gopannan (E///) and Prakash Ramchandran (DellEMC)
3. Agenda – Part 1 – Prem Sankar G, Ericsson
• MEC Application requirements
• Microservices architecture and patterns
• Walkthrough – Sample app
4. • Offline applications
• Fat Client
• Processing done locally at UE
• Data feed from cloud
Application Types
• Online Applications
• Presentation layer
• All processing done online
• Requires connectivity
5. • Bandwidth
• Latency, Jitter and Delay
• Location and Presence
Key requirements for Applications
7. Network E2E with Edge Apps – An example Traffic flow
Device Edge
RU/DU
UPF (App
Routing)
NEF
ONAP
Value Added
Services
POP
BRAS, PE
Network Edge
Edge Cloud
(tens of thousands) Core Cloud (EPC)
AMF
UDM AUSF
UPF
PCF
Application Functions
AF1 AF2 AF3
Dyn
APP
Dyn
APP
Dyn
APP
Static APPs (eg. Caching,
CDN, Security)
UE APP
UE APP
UE APP
SMF
1
4
2
5
6
3
DN
Local
DN
1. UE APP requests AF to create
compute for it (Eg. AR/VR, Gaming
offload). UE provides information
such as ‘coordinates’, ‘max cost’,
‘max latency’ etc…
2. AF requests ONAP to create VNFs
in edge that is closer to UE that
satisfies UE request(ONAP figures
out the best region out of
thousands of clouds)
3. ONAP brings up VNFs on the Edge
Cloud using VIM API
4. AF informs NEF/SMF to create
traffic rule (to enable redirection
of UE APP traffic to new VNFs
created).
5. SMF informs UPF in the edge
cloud (Programs UE classifier of
UPF).
6. When the traffic comes from UE
APP, right application in the edge
cloud receives the traffic.
OOF
MC
DCAE
Reference – ONAP Edge working group – Srinivas Addepalli, Intel
8. Sample application – Pothole fixer
• Dashboard app – Control app for
the equipment that connects with
edge network/Dispatcher app
• Dispatcher app –Dispatches jobs
to equipment
• Potholefix app – App that is in
core cloud has info about pothole,
location and other information
9. • System functions
1. AF Request
2. Select VIM and triggers VNF
request
3. Bring up VNF on the selected
edge and establish transport
path
4. Redirect job to payload
Sample application – Pothole fixer
• Application functions
1. Require Fix – Pothole Image,
City Authority (for budget)
2. Response to bobcat
dashboard application
…
3. Terminate application
12. • Database per Service
• Replaces 2 Phase Commit
• Uses Event streams to co-ordinate between the distributed database
• Co-ordination via two ways
• Choreography - each local transaction publishes domain events that trigger local
transactions in other services
• Orchestration - an orchestrator (object) tells the participants what local transactions to
execute
SAGA Patterns
13. Agenda – Part 2 by R.Prakash (Openstack)
• MEC – Architecture
• Cloudlet and Statelet
• Statelet Design and Flow
• Statelet proposed APIs
• Admin API for Persistent Volume (PV)
• User API for Persistent Volume (PV)
• Deployment options – OpenStack Zun micro services for PV
14. MEC reference architecture in a NFV environment
• UE uses Cloudlet(C) API over Mx2: UE App
to User/App Proxy (Ambassador Pattern)
• MEPM manages MEP over Mm5
• MEP manages (A) App VNF over Mp1
• Statelet(S) is a state management service to
MEP & ME App VNFM LCM over Mm6/Vi-
Vnfm
C
A
S
15. Mobile Edge Computing Standard V1 to V2
Cloudlet Application
Statelet
Openstack
Zun
LFN (CNI)
16. State Management for Edge Cloud on Server Side
UE talks to Cloudlet VM or container through Proxy for running Application
MEP Manager manages MEP
MEP manages Application
Statelet Support Cloudlet and Application to manage Application State using
Shared Persistent Volume pools with mount and unmount calls.
17. Persistent Volume for state management at Edge
Admin
hostPath, Cinder or
CephFS
PV Pools
1.Create PV
User
2. Request PV Claim
Claim
32
3.Grant PV Claim.
4. Mount PVC to VM or Conatiner
4
...4
Host
Volume
VM
/mt
VM
/mt
Host
Volume
POD
/mt
POD
/mt
1
1
18. State Management using Persistent Volume for Edge Cloud
• A Persistent Volume (PV) is a network attached storage in the cluster, which is
provisioned by the administrator and user claims them from the Pools to mount them in
PODs or VMs and finally used by the applications contained in them.
• PVs based on the Storage Class resource. A StorageClass contains pre-defined
provisioners and parameters to create a Persistent Volume.
• Volume Types that support managing storage using Persistent Volumes are several but
we will limit it to hostPath, CephFS or Cinder as in Openstack for Cloudlet. For minikube
demo we use hostPath. Note for VMs use Cinder/CephS.
• So the Object PV will have C,RC,GC,MT(attach), UMT(detach) REST Calls for Cloudlets
to support State mangement for both Openstack VMs and Containers.
19. Admin APIs
PV Pool,PV/PVExtend
Object Action Type Attributes
PV_Pool Create Defalut PV of Type hostPath
PV_Pool Delete Defalut PV of Type hostPath
PV Create hostPath /Default Adapt from k8s
PV Create Cinder / BlockStore Adapt from Openstack
PV Create CephFS/ FileStore Adpat from Ceph
PVExtend Create Host Volume k8s Worker Node
PVExtend Create Host Volume Openstack compute Node
PV Delete PV Name PV_Pool
PV_Pool Delete PV_Pool Name PV list
20. User APIs
PV Claim, Grant, Mount, UnMount
Object Action Type Attributes
PV Claim PV_Pool Capacity
PV Grant PV_Pool Capacity
PV Mount PV Name Mount Device
PV UnMount Mount Device PV Name
PV Assign PV Name PV_Pool
PV_Pool Assign PV_Pool Name PV list
21. References
MEC: Cloudlet, Statelet, ME Applications
• http://www.etsi.org/technologies-clusters/technologies/multi-access-edge-computing
• http://www.etsi.org/deliver/etsi_gr/MEC/001_099/017/01.01.01_60/gr_MEC017v010101p.pdf
• https://www.cncf.io/blog/2017/05/23/cncf-hosts-container-networking-interface-cni/
• https://docs.openstack.org/queens/api/
• Refer APIs for Zun, Senlin, manila to define and design Statelet
• First add Statelet API for PV (Admin/User) to Zun for Containers
• Use Senlin to form container clusters using Zun and use Senlin Profile and Policy for placement
• Use Shared File Systems service (manila) if you use CephFS
• https://www.openstack.org/edge-computing/
• https://www.openstack.org/assets/edge/slides/2017-09-07-a-satya-opendev-keynote.pdf
• https://docs.openstack.org/kolla/latest/
• https://wiki.opnfv.org
• https://wiki.onap.org
• http://microservices.io/
• Contacts: Prem Sanka Gopannan (premsankar@gmail.com)/ Prakash Ramchandran (cloud24x7@ieee.org)
22. Network EdgeTelco Cloud
OSS
Transformation
Next Generation
Access
5G
Networks
SD-WAN,
vCPE/uCPE
NFV, SDN
SAS, Big Data,
Real-Time Visibility
CORD, MEC, MDC
C-RAN, CUPS,
Network Slicing
Solutions and Ecosystem Advanced Architecture