YoVDO

Secure Your Cluster-to-Cluster Traffic, the Agnostic Way

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses Kubernetes Courses Helm Courses Consul Courses Istio Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk on securing cluster-to-cluster traffic in a cloud-agnostic manner. Discover Workday's multi-cloud approach and their Kubernetes platform, Scylla, which can be deployed across public cloud providers and private data centers. Learn about the challenges of routing tenant data across different regions and cloud environments, and the collaborative solution developed by infrastructure, platform, and application development teams. Gain insights into the use of Kubernetes operators, Istio, Consul, and Helm-delivered application configuration to achieve secure, cross-cloud data migration. Understand the tools and technologies employed, review key learnings, and get a glimpse of future developments in this field. Delve into topics such as legacy communication, multi-cloud strategy, Console networking, and the advantages of using Consul for secure cluster-to-cluster communication.

Syllabus

Introduction
Why clustertocluster communication
Legacy communication
Why istio
Secure your traffic the agnostic way
Multicloud strategy
Console networking
Why Console
Advantages
Notes about Console
Console use case
Communication
Communication works
Summary


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Learn DevOps: Advanced Kubernetes Usage
Udemy
Containers 101
Udemy
Packaging Applications with Helm for Kubernetes
Pluralsight
Azure for DevOps: Application Infrastructure
LinkedIn Learning
Kubernetes: Native Tools
LinkedIn Learning