YoVDO

Secure Your Cluster-to-Cluster Traffic, the Agnostic Way

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses Kubernetes Courses Helm Courses Consul Courses Istio Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk on securing cluster-to-cluster traffic in a cloud-agnostic manner. Discover Workday's multi-cloud approach and their Kubernetes platform, Scylla, which can be deployed across public cloud providers and private data centers. Learn about the challenges of routing tenant data across different regions and cloud environments, and the collaborative solution developed by infrastructure, platform, and application development teams. Gain insights into the use of Kubernetes operators, Istio, Consul, and Helm-delivered application configuration to achieve secure, cross-cloud data migration. Understand the tools and technologies employed, review key learnings, and get a glimpse of future developments in this field. Delve into topics such as legacy communication, multi-cloud strategy, Console networking, and the advantages of using Consul for secure cluster-to-cluster communication.

Syllabus

Introduction
Why clustertocluster communication
Legacy communication
Why istio
Secure your traffic the agnostic way
Multicloud strategy
Console networking
Why Console
Advantages
Notes about Console
Console use case
Communication
Communication works
Summary


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube