Enlightning
Learn CNCF projects with Whitney and her lightboard.
-
1:14:45
⚡️ Enlightning - Observability 2.0: Not Just Another Buzzword
Many organizations have embraced Observability in one form or another, which is a great start… but they’re not quite there yet. In order to effectively achieve everything that Observability has to off
-
1:25:04
⚡️ Enlightning - Exploring Distributed Tracing with Jaeger
On this episode of ⚡️ Enlightning, learn how distributed tracing can help you understand your complex microservices interactions. Jaeger is the most popular open source distributed tracing system t
-
1:49:13
⚡️ Enlightning - An Introduction to Fluentd and Fluent Bit
An Introduction to Fluentd and Fluent Bit: How to Collect Data from Any Source and Send It to Any Location In this session, Whitney Lee and Fluent Bit creator and maintainer Eduardo Silva Pererira
-
2:05:54
⚡️ Enlightning - Evolving Multi-tenant Kubernetes Log Collection with the Logging Operator
The Logging Operator has long been addressing a gap in Kubernetes log collection. Its primary aim is to provide an API that cluster admins and tenant users - typically developer teams - can use in col
-
1:25:46
⚡️ Enlightning - Keeping Your Secrets Secure with SOPS
SOPS (Secrets OPerationS) is an editor of encrypted files and is a simple way to secure and manage sensitive assets. SOPS supports YAML, JSON, ENV, INI, and binary formats. By being able to integrate
-
1:41:17
⚡️ Enlightning - Flexible Authorization with OpenFGA
OpenFGA is a flexible authorization engine built for developers and designed to make it easy for them to model their application permissions and add and integrate fine-grained authorization into their
-
1:20:21
⚡️ Enlightning - Open Policy Containers: The What, Why, and How
The Open Policy Containers project provides a secure software supply chain for Open Policy Agent (OPA) policies, enabling a policy-as-code workflow for maintainers and consumers of policies to easily
-
2:03:45
⚡️ Enlightning - Service Identity Authentication and Authorization Using Athenz
Yahoo developed and open sourced a service authentication and role-based authorization system called Athenz to address the core zero trust principles. Yahoo uses Athenz to bootstrap their instances de
-
2:06:06
⚡️ Enlightning - Understanding Network Service Mesh
Network Service Mesh takes concepts from traditional L7 application service meshes and brings them down to L3 payloads, enabling your workloads to get the connectivity, security, and observability the
-
1:49:25
⚡️ Enlightning - Cloud Native Confidential Computing with Confidential Containers
Confidential Containers allow users to run sensitive cloud native workloads in an untrusted cloud. We'll explore how this is possible and how you can use the project with your own workloads. Join h
-
1:53:41
⚡️ Enlightning - Solving for the Bottom Turtle with SPIFFE and SPIRE
Explore SPIFFE (Secure Production Identity Framework For Everyone), a CNCF project revolutionizing identity management in cloud-native systems. This session introduces you to SPIFFE’s approach to
-
1:16:11
⚡️ Enlightning - Hello Paralus, Goodbye RBAC Stress!
As Kubernetes becomes the backbone of modern infrastructure, securing multi-tenant clusters becomes a top priority for platform engineering teams. In this lightboard session, we will delve into the
-
1:56:36
⚡️ Enlightning - Keycloak: The Open Source IAM for Modern Applications
Keycloak is an open source Identity and Access Management (IAM) solution for modern applications and services. It is designed to secure applications with modern industry standards like OAuth2, OpenID
-
1:14:09
⚡️ Enlightning - What Is Access Policy Orchestration? What Is Hexa?
Hexa Policy Orchestration enables you to manage disparate access policy formats across cloud providers, IAM systems, networks, and data. Join host Whitney Lee and guest Gerry Gebel to learn more!
-
1:45:59
⚡️ Enlightning - Be a Security Hero with Kubescape as Your Sidekick
Security is something we all need, and something we would all love to forget about. 🙂 Kubescape is a CNCF project that helps to secure your clusters easily and quickly. It helps you validate the c
-
1:43:57
⚡️Enlightning - What Is Dex?
Many kinds of identity providers utilize different architectures and protocols existing in this world. The commonly-spread standard among cloud native applications (including Kubernetes) is now the Op
-
2:38:33
⚡️ Enlightning - Cilium Networking, Security and Observability
Now that we have learned so much about networking and service mesh solutions, let’s look at what Cilium can do. Cilium has an answer for each use case that folks adopt a service mesh for, as well as a
-
2:12:10
⚡️ Enlightning - Sailing Into a Sea of Microservices With Istio
Istio is a Graduated CNCF Project that provides application networking for a distributed microservices architecture with built-in traffic engineering, observability, identity, policy, AAA, and encrypt
-
2:22:38
⚡️ Enlightning - Learn Service Mesh With Kuma
Service mesh is the future of application connectivity, offering immediate enhancements to your application traffic’s security, reliability, and observability. In this episode of ⚡️ Enlightning, disc
-
2:19:51
⚡️ Enlightning - Linkerd: The Stress-Free Service Mesh
Linkerd is the first service mesh, and it is still - by far - the least stressful way to add security, reliability, and observability to any Kubernetes cluster. Using a mesh to add these critical func
-
Loading More...