Session

From Harbor to Kubernetes: A GitOps-Driven Journey for Secure CI/CD

Join for an immersive workshop for a journey through a complete cloud-native CI/CD pipeline, powered by CNCF tools. Starting with Harbor as the central container registry, we’ll build a secure workflow that includes vulnerability scanning with Trivy, efficient image distribution using Dragonfly, and GitOps-driven deployments to Kubernetes with ArgoCD or Flux. You’ll learn how to integrate these tools into a seamless pipeline, from code commit to production deployment. By the end of this session, you’ll have a clear understanding of how to build, secure, and deploy applications in a modern, cloud-native environment.

- Master Harbor as Your Container Registry: Learn how to use Harbor for secure image storage, vulnerability scanning, and access control.
- Secure Your CI/CD Pipeline: Integrate Trivy for vulnerability scanning and ensure your container images are safe before deployment.
- Efficient Image Distribution: Discover how Dragonfly optimizes image distribution across Kubernetes clusters.
- GitOps in Action: Experience the power of GitOps for declarative, auditable, and automated Kubernetes deployments.
- Hands-On Learning: Gain practical experience with a live demo and walk away with actionable insights for your own workflows.

Prerequisites: Basic familiarity with Kubernetes, Docker, and Git is recommended.
Tools Used: Harbor, Trivy, Dragonfly, ArgoCD/Flux, and Gitea.
Format: Live demo with optional hands-on participation. Bring your laptop if you’d like to follow along.
Duration: 60-90 minutes (adjustable based on audience interaction).
Audience: Developers, DevOps engineers, and platform operators interested in cloud-native CI/CD and security.
Resources: All code, configurations, and slides will be shared with attendees after the workshop.

Fabrizio Sgura

Chief Engineer (Platform Product Business, Distributed Architecture) at Veritas Automata

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top