Microsoft Azure PowerShell Cloud & Infrastructure Terraform Kubernetes Azure Kubernetes Services (AKS) Cloud Native DevOps DevSecOps
Microsoft Azure MVP, HashiCorp Ambassador. Working primarily with Microsoft Azure, automation and infrastructure. Currently focusing on containers, cloud native technology, and everything-as-code. Active in the Cloud Native Computing Foundation, Founder of the Norwegian PowerShell User Group, Open Source advocate.
Microsoft Azure MVP og HashiCorp Ambassadør. Arbeider primært med Microsoft Azure, automasjon og infrastruktur. Fokuserer for øyeblikket på container, cloud native teknologi, og "everything-as-code". Aktiv i Cloud Native Computing Foundation, grunnlegger av Norwegian PowerShell User Group, og fan av Open Source.
The Kubernetes landscape is maturing and the managed offerings from cloud providers have come a long way, providing a more streamlined cluster operations experience. But we still need to make architectural decisions, set up automation, governance, and most importantly secure it. Even when the surrounding cloud platform is set up we still need to tune internal Kubernetes resources to make sure that both Dev and Ops have the best possible user experience, helping people work together without rigid processes that slows progression.
In this session we explore how to create highly available application platforms built with Azure services by using Terraform for infrastructure, FluxCD for true GitOps application delivery, all tied together using other CNCF backed projects and Azure DevOps. Expect a lot of information and much more practical examples than slides.
A Terraform child module is great to gather code that will deploy a specific service based on your needs, for instance Azure Kubernetes Service (AKS) or virtual machines. At the bare minimum, AKS can be a deployment of one node pool but at the other end it might be several pools, identity management, choices about versioning, and much more. A virtual machine can have several data disks, be backup enabled, have anywhere from one to several network interfaces, and there is even a unique resource if it's a Windows machine or Linux. Things get complicated pretty quickly.
This talk is based on battle hardened modules, which helps you adhere to best practices and standards, while is flexible enough to break patterns when you need it. For this session we will not be looking at slides, but actual code. We will deep dive into some of the functions and expressions that Terraform has to offer, so there should be something for everyone in this talk.
Target audience is Terraform professionals or individuals with prior knowledge of Terraform. This is a presentation with no slides, everything is shown through actual code. Preferred session length is 30 minutes, 45 with questions.
OpenServiceMesh (OSM) is one of the new kids on the block, but is already showing great potential. It is taking the lightweight and easy approach, and uses the standard SMI for traffic policy, telemetry and management. In this session we will explore OMS and what it brings to the table, how to install and operate it.
Users must have a general understanding of the Cloud Native landscape, but not necessarily a comprehensive understanding of how service mesh works. Preferred duration is 45/60 minutes.
Do you use one set of credentials for all your deployment automation? What would happen if it would fell into wrong hands, and how long would it take to set up all your pipelines with a new set of credentials? With dynamic credentials we can secure our deployments with new credentials for each run.
In this talk I want to show how to get started with HashiCorp Vault. You will be learning about the different deployment options, the concepts behind dynamic credentials and how to implement them in your workflows. I will also demonstrate a practical example, deploying infrastructure to Azure using Terraform and Vault.
30/45 minutes, no technical requirements. Audience for this talk is users of Infrastructure-as-Code, with a limited to no knowledge about Vault.
IaC but with the flexibility of a programming language?
The CDK (Cloud Development Kit) for Terraform is a work in progress from HashiCorp, which lets you deploy infrastructure with Terraform with traditional languages like Python, TypeScript, Java and C#. Even though the CDK team has come a long way, we still have a bit left before this is production ready.
In this talk we will look at how you can get started deploying with the CDK for Terraform and how the project is coming along.
This is a very technical discussion, and audience should probably have a little bit of prior knowledge about Infrastructure-as-Code. Preferred session duration is 30 - 45 minutes.
Operations through Git is not new but now we the technology to realise what we always wanted. The GitOps pattern has matured over the years, from the initial definition to the major adoption by the community, and the arrival of Kubernetes and the controller/operator pattern has made it possible to adopt GitOps in practice.
Although we have come far, there is still more work to be done. This is why the OpenGitOps project was created in the Cloud Native Computing Foundation, where we hope to define what it means to use GitOps and spread awareness.
This talk is aimed to explain the concept of GitOps, why we need it and how it can be implemented. It is based on the principles defined by the OpenGitOps project and is a vendor and platform neutral look at the operational model.
Preferred as a 30/45 minute session, and the target audience is everyone from developers, to operational engineers, to decision makers.