Devops and Security: An Interview with Seth Vargo and Liz Rice
3r3-3549. 3r3-31. Containers today will not surprise anyone. Surprise the question about the safety of containers. It is especially interesting to ask about colleagues who use containers and microservices in production quite seriously: I often see surprised faces and a puzzled question, saying, “What, why is it?” It turns out that we already know about technology (and how not to know here: it seems that soon even schoolchildren will build a Kubernetes cluster in technology classes), but they have not yet learned how to protect its component parts. Perhaps there was simply no one to teach. 3r? 3529. 3r3-3549. 3r? 3529. 3r3-3549. This article and on DevOops 3r33537. we will have speakers who have eaten a dog on the topic of safety-friendly container solutions. We go to them for answers to the simplest cloud security questions. It is necessary to start self-education with something? 3r? 3529. 3r3-3549. 3r? 3529. 3r3-3549. Participants: 3r318. 3r? 3529. 3r3-3549. 3r33521. 3r? 3522. Seth Vargo is running Developer Advocate on Google. He previously worked at HashiCorp, Chef Software, CustomInk and several other startups in Pittsburgh. He is the author of
Learning Chef and advocates for reducing inequalities in technology. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r? 3529. 3r3-3549. 3r33521. 3r33512. Liz Rice is a technical evangelist for Aqua Security, a security company deploying cloud applications and container enterprise solutions. Liz is a very well-known person in the community, chairman of 3r3334. KubeSonov
. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r? 3529. 3r3-3549. 3r33521. 3r?500. 3r301501. Oleg Chirukhin, edited by JUG.ru Group 3r3353523. 3r3-3549. 3r3502. 3r? 3529. 3r3-3549. CNCF 3r33537. graduated status, which basically means that the product has become stable, that CNCF recommends that companies use it. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r33528. 3r? 3529. 3r3-3549. 3r33521. 3r?500. 3r301501. As a developer, I’m wondering: why not generate all these YAML files using a higher level description language, while we can use static error checking, etc. We can even run this description in dynamic simulation mode and check for security errors and then compile in YAML and use in Kubernetes. 3r3502. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r33528. 3r? 3529. 3r3-3549. 3r33521. 3r33512. Yes, there are certain tools for generating YAML, and for general purpose, and not only from a security point of view, and there is a tool that can find problems in the YAML file. In general, I think there will be more and more tools, and in two or three years we will not have to mess around with YAML directly. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r33528. 3r? 3529. 3r3-3549. 3r? 3529. 3r3-3549. 3r33521. 3r?500. 3r301501. By the way, how do you see the future of Kubernetes, for example, for the next three years? 3r3502. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r33528. 3r? 3529. 3r3-3549. 3r33521. 3r33512. Good question. In fact, you need to look not only at it, but also at the rapidly growing landscape of components and projects around that create a reliable platform for deploying cloud products, including the implementation of such things as security. As an excellent example, this is Istio (and other service mesh options), it has recently come to version 1.0. I think this is a good example of a really powerful tool that adds a level of security and allows you to do things that are understandable and necessary, such as deploying a canary. 3r? 3529. 3r3-3549. 3r? 3529. 3r3-3549. I think that in two or three years we will have a fairly solid platform that will cover many different uses. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r33528. 3r? 3529. 3r3-3549. 3r33521. 3r?500. 3r301501. If you had a chance to give readers only one piece of advice, what would you say to them? 3r3502. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r33528. 3r? 3529. 3r3-3549. 3r33521. 3r33512. Scan your container images for vulnerabilities. You will be surprised to know how many people are deploying the code without knowing what is inside! 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r33528. 3r? 3529. 3r3-3549. 3r33521. 3r? 3522. Constantly learn! Returning to the earlier question that robots occupy our jobs: the only way to prevent this is to never relax and learn all the time. 3r33535. 3r3-3549. 3r33525. 3r? 3529. 3r3-3549. 3r33528. 3r? 3529. 3r3-3549. 3r? 3531. Next Sunday, at the DevOops 2018 conference, Seth will give a presentation on 3-333532 "Modern security with microservices and the cloud" , and Liz will present 3r3-3344. “Practical steps for securing your container deployment”
. Tickets can be purchased
on the official website 3-333537. . 3r33538. 3r33545. 3r3-3549. 3r3-3549. 3r33542. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e.parentNode.insertBefore (r, e)}; "[object Opera]" == e.opera? a.addEventListener? a.addEventListener ("DOMContentLoaded", d,! 1): e.attachEvent ("onload", d ): d ()}}} t ("//mediator.mail.ru/script/2820404/"""_mediator") () (); 3r? 3543. 3r3-3549. 3r33545. 3r3-3549. 3r3-3549. 3r3-3549. 3r3-3549.
It may be interesting
weber
Author7-10-2018, 04:26
Publication DateServer Administration / Programming / Conferences / DevOps
Category- Comments: 0
- Views: 375
entegrasyon programları
entegrasyon programları
Corvus Health provides medical training services as well as recruiting high quality health workers for you or placing our own best team in your facility. Check Out: Health Workforce Recruitment
I.T HATCH offers a wide range of IT services including remote access setup, small business servers, data storage solutions, IT strategy services, and more. Check Out: IT strategy services