Secure Your Cluster-to-Cluster Traffic, the Agnostic Way
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk on securing cluster-to-cluster traffic in a cloud-agnostic manner. Discover Workday's multi-cloud approach and their Kubernetes platform, Scylla, which can be deployed across public cloud providers and private data centers. Learn about the challenges of routing tenant data across different regions and cloud environments, and the collaborative solution developed by infrastructure, platform, and application development teams. Gain insights into the use of Kubernetes operators, Istio, Consul, and Helm-delivered application configuration to achieve secure, cross-cloud data migration. Understand the tools and technologies employed, review key learnings, and get a glimpse of future developments in this field. Delve into topics such as legacy communication, multi-cloud strategy, Console networking, and the advantages of using Consul for secure cluster-to-cluster communication.
Syllabus
Introduction
Why clustertocluster communication
Legacy communication
Why istio
Secure your traffic the agnostic way
Multicloud strategy
Console networking
Why Console
Advantages
Notes about Console
Console use case
Communication
Communication works
Summary
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Helm Deep Dive V3A Cloud Guru Helm Deep Dive V3
A Cloud Guru Kubernetes Integration and Advanced Orchestration Techniques
LearnQuest via Coursera Kubernetes Operators Intermediate
IBM via Cognitive Class Continuous Delivery Pipelines with Spinnaker and Kubernetes Engine
Google via Google Cloud Skills Boost