Enlightning

Learn CNCF projects with Whitney and her lightboard.

  • ⚡️ Enlightning - Observability 2.0: Not Just Another Buzzword1:14:45

    ⚡️ Enlightning - Observability 2.0: Not Just Another Buzzword

    Many organizations have embraced Observability in one form or another, which is a great start… but they’re not quite there yet. In order to effectively achieve everything that Observability has to off

    Watch Video
  • ⚡️ Enlightning - Exploring Distributed Tracing with Jaeger1:25:04

    ⚡️ Enlightning - Exploring Distributed Tracing with Jaeger

    On this episode of ⚡️ Enlightning, learn how distributed tracing can help you understand your complex microservices interactions. Jaeger is the most popular open source distributed tracing system t

    Watch Video
  • ⚡️ Enlightning - An Introduction to Fluentd and Fluent Bit1:49:13

    ⚡️ Enlightning - An Introduction to Fluentd and Fluent Bit

    An Introduction to Fluentd and Fluent Bit: How to Collect Data from Any Source and Send It to Any Location In this session, Whitney Lee and Fluent Bit creator and maintainer Eduardo Silva Pererira

    Watch Video
  • ⚡️ Enlightning - Evolving Multi-tenant Kubernetes Log Collection with the Logging Operator2:05:54

    ⚡️ Enlightning - Evolving Multi-tenant Kubernetes Log Collection with the Logging Operator

    The Logging Operator has long been addressing a gap in Kubernetes log collection. Its primary aim is to provide an API that cluster admins and tenant users - typically developer teams - can use in col

    Watch Video
  • ⚡️ Enlightning - Keeping Your Secrets Secure with SOPS1:25:46

    ⚡️ Enlightning - Keeping Your Secrets Secure with SOPS

    SOPS (Secrets OPerationS) is an editor of encrypted files and is a simple way to secure and manage sensitive assets. SOPS supports YAML, JSON, ENV, INI, and binary formats. By being able to integrate

    Watch Video
  • ⚡️ Enlightning - Flexible Authorization with OpenFGA1:41:17

    ⚡️ Enlightning - Flexible Authorization with OpenFGA

    OpenFGA is a flexible authorization engine built for developers and designed to make it easy for them to model their application permissions and add and integrate fine-grained authorization into their

    Watch Video
  • ⚡️ Enlightning - Open Policy Containers: The What, Why, and How1:20:21

    ⚡️ Enlightning - Open Policy Containers: The What, Why, and How

    The Open Policy Containers project provides a secure software supply chain for Open Policy Agent (OPA) policies, enabling a policy-as-code workflow for maintainers and consumers of policies to easily

    Watch Video
  • ⚡️ Enlightning - Service Identity Authentication and Authorization Using Athenz2:03:45

    ⚡️ Enlightning - Service Identity Authentication and Authorization Using Athenz

    Yahoo developed and open sourced a service authentication and role-based authorization system called Athenz to address the core zero trust principles. Yahoo uses Athenz to bootstrap their instances de

    Watch Video
  • ⚡️ Enlightning - Understanding Network Service Mesh2:06:06

    ⚡️ Enlightning - Understanding Network Service Mesh

    Network Service Mesh takes concepts from traditional L7 application service meshes and brings them down to L3 payloads, enabling your workloads to get the connectivity, security, and observability the

    Watch Video
  • ⚡️ Enlightning - Cloud Native Confidential Computing with Confidential Containers1:49:25

    ⚡️ Enlightning - Cloud Native Confidential Computing with Confidential Containers

    Confidential Containers allow users to run sensitive cloud native workloads in an untrusted cloud. We'll explore how this is possible and how you can use the project with your own workloads. Join h

    Watch Video
  • ⚡️ Enlightning - Solving for the Bottom Turtle with SPIFFE and SPIRE1:53:41

    ⚡️ Enlightning - Solving for the Bottom Turtle with SPIFFE and SPIRE

    Explore SPIFFE (Secure Production Identity Framework For Everyone), a CNCF project revolutionizing identity management in cloud-native systems. This session introduces you to SPIFFE’s approach to

    Watch Video
  • ⚡️ Enlightning - Hello Paralus, Goodbye RBAC Stress!1:16:11

    ⚡️ Enlightning - Hello Paralus, Goodbye RBAC Stress!

    As Kubernetes becomes the backbone of modern infrastructure, securing multi-tenant clusters becomes a top priority for platform engineering teams. In this lightboard session, we will delve into the

    Watch Video
  • ⚡️ Enlightning - Keycloak: The Open Source IAM for Modern Applications1:56:36

    ⚡️ Enlightning - Keycloak: The Open Source IAM for Modern Applications

    Keycloak is an open source Identity and Access Management (IAM) solution for modern applications and services. It is designed to secure applications with modern industry standards like OAuth2, OpenID

    Watch Video
  • ⚡️ Enlightning - What Is Access Policy Orchestration? What Is Hexa?1:14:09

    ⚡️ Enlightning - What Is Access Policy Orchestration? What Is Hexa?

    Hexa Policy Orchestration enables you to manage disparate access policy formats across cloud providers, IAM systems, networks, and data. Join host Whitney Lee and guest Gerry Gebel to learn more!

    Watch Video
  • ⚡️ Enlightning - Be a Security Hero with Kubescape as Your Sidekick1:45:59

    ⚡️ Enlightning - Be a Security Hero with Kubescape as Your Sidekick

    Security is something we all need, and something we would all love to forget about. 🙂 Kubescape is a CNCF project that helps to secure your clusters easily and quickly. It helps you validate the c

    Watch Video
  • ⚡️Enlightning - What Is Dex?1:43:57

    ⚡️Enlightning - What Is Dex?

    Many kinds of identity providers utilize different architectures and protocols existing in this world. The commonly-spread standard among cloud native applications (including Kubernetes) is now the Op

    Watch Video
  • ⚡️ Enlightning - Cilium Networking, Security and Observability2:38:33

    ⚡️ Enlightning - Cilium Networking, Security and Observability

    Now that we have learned so much about networking and service mesh solutions, let’s look at what Cilium can do. Cilium has an answer for each use case that folks adopt a service mesh for, as well as a

    Watch Video
  • ⚡️ Enlightning - Sailing Into a Sea of Microservices With Istio2:12:10

    ⚡️ Enlightning - Sailing Into a Sea of Microservices With Istio

    Istio is a Graduated CNCF Project that provides application networking for a distributed microservices architecture with built-in traffic engineering, observability, identity, policy, AAA, and encrypt

    Watch Video
  • ⚡️ Enlightning - Learn Service Mesh With Kuma2:22:38

    ⚡️ Enlightning - Learn Service Mesh With Kuma

    Service mesh is the future of application connectivity, offering immediate enhancements to your application traffic’s security, reliability, and observability. In this episode of ⚡️ Enlightning, disc

    Watch Video
  • ⚡️ Enlightning - Linkerd: The Stress-Free Service Mesh2:19:51

    ⚡️ Enlightning - Linkerd: The Stress-Free Service Mesh

    Linkerd is the first service mesh, and it is still - by far - the least stressful way to add security, reliability, and observability to any Kubernetes cluster. Using a mesh to add these critical func

    Watch Video
  • loading
    Loading More...