Janakiram MSV , Janakiram & Associates
Kubernetes security is challenging! Pod Security Policy (PSP) is now replaced by Pod Security Admission (PSA) to help provide secure defaults. While PSP allowed granular controls, PSA operates at the namespace level. Let's discuss how you can configure security constraints for specific pods or controls using PSA and Kyverno.
Parikshit Samant Principal Engineer, Nirmata
Kubernetes security is challenging! Pod Security Policy (PSP) is now replaced by Pod Security Admission (PSA) to help provide secure defaults. While PSP allowed granular controls, PSA operates at the namespace level. Let's discuss how you can configure security constraints for specific pods or controls using PSA and Kyverno.
Swapnil Babladkar Customer Success Engineer, Nirmata
A unified platform is a secret to achieve robustness, resilience, and agility. In this talk, the speaker will share their journey of building an open-source unified platform that empowers developers with monitoring, debugging, logging, and giving control to deploy their code over Kubernetes in just a few clicks.
Shivani ,
In this talk I'll talk about the influence of Product Management in SRE and the future of SRE. We've come a long way from Ops to DevOps to SRE, what will the next step in this path?
JayaGanesh Kalyanasundaram Tech Lead, Google
It's rare to find someone from cloud-native or DevOps or SRE space, who hasn’t heard of Terraform and its capabilities. Today, we will go through one of the ways you can use this tool to make your life easy around Github. The one basic skill that everyone in the IT industry starts to learn first is using Git and moreover Github. Sometimes people use them interchangeably. In any big organization, GitHub is the single source of truth where resides the entire code for all the teams. Organizing that huge code is a challenge and automating it is a demanding need. Onboarding new users, creating teams, managing their permissions and creating new repositories every now and then becomes a BAU task. This all can be automated by a single tool TERRAFORM, which has been a popular choice being cloud agnostic in the IaaC field. Using the GitHub provider of Terraform can make it possible. Create new repositories, new teams, add users, archive a repository, and add or remove webhooks from repositories all these types of mundane but critical tasks we can automate using terraform. We will walk together to learn how we can create a self-service Infrastructure for Github.
Pooja Dhoot Senior Site Reliability Engineer, InfraCloud Technologies
80% of the queries on logs are aggregation queries in Uber. Running on-demand aggregates on your data-rich events with the power to slice and dice the data based on hypothesis creates the backbone of an observability system. In the talk, I will present challenges in observability data management and how a distributed columnar database fits the needs.
Ankit Nayan Co-founder & CTO, SigNoz
Learn how to automate the signing and verification of container images using cloud native tools like Sigstore and Kyverno to secure your Kubernetes pipelines.
Anushka Mittal Intern, CNCF
Learn how to automate the signing and verification of container images using cloud native tools like Sigstore and Kyverno to secure your Kubernetes pipelines.
Kumar Mallikarjuna Software Engineer, Niramata
Arihant Hirawat Software Engineer, InfraSpec
High-performing teams usually ship faster, better, secure and often! Organizations irrespective of their level, focusing on stability and continuous delivery ( CD ), will deploy frequently. Hundreds of continuous integration ( CI ) build run for every organization on a typical day. This means your code and system is more prone to bugs, accidental data exposure, third party vulnerabilities and hence open doors for attackers. Hence to ensure that we are shipping quality and secure code, we should integrate security checking in our CI. This talk will be about enforcing security best practices using CI
Nancy Chauhan Developer Relations Engineer, Gitpod
High-performing teams usually ship faster, better, secure and often! Organizations irrespective of their level, focusing on stability and continuous delivery ( CD ), will deploy frequently. Hundreds of continuous integration ( CI ) build run for every organization on a typical day. This means your code and system is more prone to bugs, accidental data exposure, third party vulnerabilities and hence open doors for attackers. Hence to ensure that we are shipping quality and secure code, we should integrate security checking in our CI. This talk will be about enforcing security best practices using CI
Aseem Shrey Security Engineer, Rippling
Distributed Tracing is the core part of the modern observability stack. In this talk, I will introduce the audience to Distributed Tracing and what it is. How does it work? And how they can instrument applications and set up open source distributed tracing databases.
Suraj Nath Software Engineer, Grafana Labs
There has been 12,286% rise in Bug bounty reports related to Cloud Misconfigurations (HackerOne Report 2021). This can be solved by implementing a rich context graph across our CI/CD pipeline, which maps the exact relationships and dependencies of infrastructure across the entirety of the product lifecycle - starting from infrastructure creation (IaC) all the way to applications running in the cloud.
Nishant Mittal Founder & CTO, PingSafe