Operations | Monitoring | ITSM | DevOps | Cloud

Rancher

Kubernetes Master Class Security & Observability feat. Tigera

In this RKE-focused workshop for networking, security, and observability on containers, Kubernetes, and Calico, you will work with a Calico and RKE expert to learn how to design, deploy, and observe security and networking policies in an RKE environment. This 90-minute hands-on lab comes with your own provisioned Calico Cloud environment, designed to provide more complete knowledge on how to implement:– Workload access controls– Compliance and reporting– Run-time visualization of traffic flow and security policies– Service-level observability– Anomaly detection and live troubleshooting You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes, container and cloud security, and observability in RKE, and how you can implement it in your own organization.

Kubernetes Master Class Managing Cluster Security at Scale

A Kubernetes cluster has various attack surfaces, from the API server to application traffic. It's important to understand what these potential areas of attack are, and from there, work out the best ways to mitigate the risks. This is especially important when managing multiple clusters. You want to ensure that you are following the right methods, and then standardizing those security approaches to be applied to all your clusters. In this session, we will cover some of the Kubernetes attack vectors and detail how to secure your clusters.