logo

2022-06-21 ~ 2022-06-24

Presentations (with video): 29 (21)

CloudOpen provides valuable content across cloud native and cloud infrastructure technologies. It is where cloud developers, engineers and operations teams can discover new tools, projects, platforms and technologies across cloud native and cloud infrastructure.

Sort by:  

Conference:  CloudOpen 2022
Authors: Huamin Chen, Yuval Lifshitz
2022-06-24

tldr - powered by Generative AI

The presentation discusses using machine learning and entropy calculation to detect ransomware in a Ceph cluster without Rook. The speaker demonstrates a live demo of the code and explains the logic behind it.
  • The speaker uses entropy calculation to detect ransomware in a Ceph cluster without Rook
  • The code is demonstrated live and explained in detail
  • The quarantine mechanism helps to reduce false positives
  • An external system can be used to address false negatives
Conference:  CloudOpen 2022
Authors: Sean Pomeroy, Jesse Goodier
2022-06-24

tldr - powered by Generative AI

The presentation discusses the use of open source tools for cost optimization in Kubernetes deployments.
  • Open source tools like Kube Cost and Open Cost can help with cost optimization in Kubernetes deployments
  • Kube Cost provides recommendations for reducing costs and improving efficiency
  • Open Cost provides raw cost data that can be used to develop custom cost optimization algorithms
  • Discipline is required to adhere to labeling strategies for accurate cost information
  • Kube CTL Cost is a useful tool for querying cost information based on namespaces and labels
Conference:  CloudOpen 2022
Authors: Sven Trieflinger
2022-06-23

tldr - powered by Generative AI

Carbyne Stack is an open-source project that integrates Computing On Encrypted Data (COED) technology with cloud-native technology to enable scalable, resilient, and easy to operate COED deployments.
  • COEDs enable encryption in use to protect valuable data
  • Carbyne Stack integrates Secure Multiparty Computation (MPC) technology with cloud-native technology
  • Carbyne Stack uses Kubernetes, Istio, and Knative to solve the specific challenges of deploying MPC in the cloud
  • Carbyne Stack has four services for offline and online phases, including customer, Klitschko, Nitro, and Ephemeral
  • Kubernetes provides scalability and resiliency, K-native allows users to concentrate on their code, and Istio helps with networking and security
Conference:  CloudOpen 2022
Authors: Adam Sayah
2022-06-23

tldr - powered by Generative AI

The presentation discusses the use of eBPF programs in cybersecurity and DevOps, specifically in collecting and analyzing metrics for monitoring purposes.
  • eBPF programs can be used to collect valuable data from traffic operating on a system
  • Bumblebee is an example of a service that provides metrics directly on the server once run
  • Prometheus can be used to collect and analyze metrics from various sources, including eBPF programs
  • eBPF programs can be reused and deployed on multiple clusters to collect data from traffic going from a service to another
  • The Book Info demo application is used as an example to demonstrate the deployment of Prometheus to collect metrics
Conference:  CloudOpen 2022
Authors: Ketan Gangatirkar
2022-06-23

Cloud products have generated remarkable value over the last two decades. Ironically much of this value doesn’t benefit the software engineers while they code those products. We’re still tediously constructing our workspaces by hand, just like we did in 1994.That is finally changing – software engineering is entering the cloud era. The key is remote workspaces that use consistent images so your code truly runs on everyone’s machine. You can check out, edit, compile, test, run, debug, and do almost everything else you can do on a local machine except trip over the power cord. Remote workspaces can provide superb performance no matter what device is in your hand, on your lap, or under your desk.These platforms are now possible because of an ecosystem rich with open source components like Docker, VS Code Remote, and Infrastructure-as-Code. There’s now a remote workspace option for almost everyone, whether working for someone else, on an open source project, or for yourself. These products are already capable enough for many, but some obstacles remain before adoption by most software engineers.The good news is that all those obstacles will be overcome – the problems are well understood, so it’s just a matter of time. Join Ketan Gangatirkar, VP of Engineering and Product for Coder, tolearn the current state of the art, what obstacles stand in the way of mainstream adoption, and why your future workstation will be in the cloud. You may not be using a cloud workspace today, but in just a few more years you won’t consider using anything else.
Conference:  CloudOpen 2022
Authors: Hema Veeradhi
2022-06-23

tldr - powered by Generative AI

The presentation discusses the importance of a data-driven approach in DevOps and how to effectively use metrics to measure success.
  • Aggregating data from various sources is important to make correlations and provide meaningful insights
  • Test-driven development is similar to using metrics to answer questions quickly and make quicker decisions
  • Metrics should be categorized based on outcomes and grouped accordingly
  • Operate First is an open-source community cloud environment that allows users to test and influence software in a production-grade environment
  • The presentation provides references and resources for getting started with data-driven DevOps
Conference:  CloudOpen 2022
Authors: Tim Hinrichs
2022-06-23

tldr - powered by Generative AI

Introduction to Open Policy Agent (OPA) and its flexibility in policy language and deployment options
  • OPA is a decision point for authorization decisions made by any service
  • Policy queries can be any arbitrary JSON value and the policy language is purpose-built to handle deeply nested JSON data
  • Context-aware policies can be created by injecting arbitrary data into OPA
  • Policy decisions can also be arbitrary JSON objects
  • OPA is flexible in deployment options, including running as a CLI, embedded library, or centralized authorization service
  • The policy language is expressive but not as complex as a programming language
Conference:  CloudOpen 2022
Authors: Jaehyun Sim
2022-06-23

tldr - powered by Generative AI

The presentation discusses the challenges faced in managing a Python Package Index (PyPI) server in a cloud-native environment and explores different options for hosting a PyPI server.
  • The speaker discusses the challenges of managing a PyPI server in a cloud-native environment
  • The speaker explores different options for hosting a PyPI server, including public PyPI, self-hosted PyPI, and cloud-based PyPI solutions
  • The speaker emphasizes the importance of portability, security, resiliency, and speed in a PyPI hosting solution
  • The speaker shares an anecdote about the challenges of managing a tangled codebase with embedded machine learning models in multiple services
  • The speaker suggests separating the machine learning model portion of the codebase into different repositories and managing them separately as packages in a PyPI server
Conference:  CloudOpen 2022
Authors: Ran Regenstreif
2022-06-22

tldr - powered by Generative AI

The talk focuses on utilizing open source security tools to reduce threats and risks in cloud systems, environments, and products. The speaker emphasizes the importance of a programmatic approach to security and shifting left.
  • Shift left movement empowers developers with security tools and processes
  • Open source security tools are important in minimizing risks
  • A broader set of risks should be considered when selecting tools
  • Utilizing a toolkit and tool belt can help minimize risks
  • Programmatic approach to security is crucial
Conference:  CloudOpen 2022
Authors: Colin Murphy
2022-06-22

tldr - powered by Generative AI

The presentation discusses the use of WebAssembly and edge computing for machine learning models to improve user experience and reduce network costs.
  • WebAssembly and edge computing can be used to run machine learning models in the browser and reduce network costs
  • Edge computing is ideal for running small models that are single-threaded and require low latency
  • WebAssembly can improve user experience by reducing load times and allowing for more memory in the browser
  • The content authenticity initiative uses machine learning models to fingerprint images