YoVDO

Secure Your Cluster-to-Cluster Traffic, the Agnostic Way

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses Kubernetes Courses Helm Courses Consul Courses Istio Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk on securing cluster-to-cluster traffic in a cloud-agnostic manner. Discover Workday's multi-cloud approach and their Kubernetes platform, Scylla, which can be deployed across public cloud providers and private data centers. Learn about the challenges of routing tenant data across different regions and cloud environments, and the collaborative solution developed by infrastructure, platform, and application development teams. Gain insights into the use of Kubernetes operators, Istio, Consul, and Helm-delivered application configuration to achieve secure, cross-cloud data migration. Understand the tools and technologies employed, review key learnings, and get a glimpse of future developments in this field. Delve into topics such as legacy communication, multi-cloud strategy, Console networking, and the advantages of using Consul for secure cluster-to-cluster communication.

Syllabus

Introduction
Why clustertocluster communication
Legacy communication
Why istio
Secure your traffic the agnostic way
Multicloud strategy
Console networking
Why Console
Advantages
Notes about Console
Console use case
Communication
Communication works
Summary


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Helm Deep Dive V3
A Cloud Guru
Helm Deep Dive V3
A Cloud Guru
Kubernetes Integration and Advanced Orchestration Techniques
LearnQuest via Coursera
Kubernetes Operators Intermediate
IBM via Cognitive Class
Continuous Delivery Pipelines with Spinnaker and Kubernetes Engine
Google via Google Cloud Skills Boost