
Ali ihsan Kaya
ANKASOFT, Head of Engineering, Cloud Native, DevOps, Platform Engineering
Istanbul, Turkey
Actions
I have been consulting in Europe for more than seven years as a consultant. I am the leader of an engineering team. I work at ANKASOFT as Head of Engineering and participate in projects as a Solutions & DevOps Architect.
I produce solutions for my customers using CNCF software. I also designed the Internal Development Platform within the company. Our software is also deployed through the Supply Chain, which I will explain in the session. I have 2 Kubernetes Administrator Certificates.
Policy-Based State Management for Microservice Applications: Empowering Control and Scalability
Microservice applications are a popular software architecture that offers many advantages, such as flexibility, scalability, and modularity. However, managing microservice applications can be complex. Policy-based state management is an approach that can simplify the management of microservice applications by defining the application's behavior using policies.
This talk will introduce the basics of policy-based state management for microservice applications. We will discuss the advantages of policy-based state management, how to implement it, and how it supports important topics such as control and scalability.
By the end of this talk, you will be able to:
- Understand the basics of policy-based state management for microservice applications
- Apply policy-based state management to your microservice applications
Crossplane: Your Gateway to Hybrid Cloud Management
Hybrid cloud management is a complex task that can be challenging to manage with traditional tools. Crossplane is an open-source project that provides a unified control plane for provisioning, managing, and operating cloud resources across multiple providers. This makes it easier to manage hybrid cloud infrastructure and simplifies multi-cloud operations.
Adjusting Resource Limits in Kubernetes
In Kubernetes, optimizing resource limits is crucial for achieving optimal performance and resource utilization. This guide walks you through the process of adjusting resource limits in a Kubernetes cluster effectively. Learn how to allocate CPU and memory resources to your containers, set resource requests and limits, and handle scenarios such as pod resource constraints. Gain insights into best practices for adjusting resource limits to ensure your applications run efficiently and smoothly within the dynamic and scalable Kubernetes environment.
Secure Software Supply Chain
In line with what I will explain, I will describe an architecture where a developer can write code without leaving their ecosystem, provide debugging processes in seconds on the like production environment, and integrate them into DevOps processes. Continuing the architecture, I will explain the advantages of having a Secure Software Supply Chain by determining the responsibilities of DevOps and Platform Engineers. I will explain that they can easily adapt to all the processes they have difficulty in by positioning them and their architectures with CNCF products.
All companies have a Developer Team. Companies need a Secure Software Supply Chain to develop software with the same quality at all times, to adapt to a new team member quickly, to automate everything from writing code to a working system in production, and to provide the same reliable service to outsourced software. The companies can easily automate their DevOps processes with Secure Software Supply Chain.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top