logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Zbynek Roubalik, Jorge Turrado
2023-04-20

tldr - powered by Generative AI

The presentation discusses the importance of certificate management and web hook validation in Keda, a Kubernetes-based event-driven autoscaler.
  • Encrypting internal traffic inside the cluster is necessary to prevent unauthorized access and scaling issues
  • Keda introduces mechanisms for automatically generating TLS certificates and supports the use of custom CA
  • Validation webhooks prevent scaling conflicts and ensure that required metrics are present
  • Managed identities are a secure way to connect to cloud provider infrastructure
  • Exposing metrics is critical for monitoring Keda's performance
Authors: Jeff Hollan, Zbynek Roubalik
2022-10-26

tldr - powered by Generative AI

Cada is a better way to scale container applications in Kubernetes clusters by scaling based on events that cause consumption in CPU and memory, rather than reactive scaling based on CPU and memory usage.
  • Cada integrates with over 55 different event sources, including Prometheus, RabbitMQ, Kafka, AWS SQS, Azure Event Hubs, GCP Pub/Sub, and Postgres.
  • Cada allows for smarter scaling by considering the events that cause consumption in CPU and memory.
  • Cada seamlessly integrates into any architecture in any Kubernetes cluster.
  • Cada is a more efficient way to scale container applications than reactive scaling based on CPU and memory usage.
Authors: Benjamin Huo, Xiuming Lu
2022-05-18

tldr - powered by Generative AI

Cloud-native service technologies can empower autonomous driving, and a cloud-agnostic, fast platform is necessary for efficient development and scalability.
  • Autonomous driving relies heavily on artificial intelligence algorithms and data, making a cloud-agnostic platform necessary for data privacy and development flexibility.
  • The complexity of autonomous driving requires a fast platform with automatic scaling and efficient error handling.
  • Open-source cloud-native technologies like Keta can provide the necessary features for a cloud-agnostic, fast platform.
  • Efficient observability mechanisms and a robust system are crucial for troubleshooting and safety requirements.
  • Package management and an easy-to-use interface wrapper can make the platform more powerful and user-friendly.
  • An active and efficient maintenance team is necessary for the stability and prosperity of the community and product development.
Authors: Huamin Chen, Yuval Lifshitz
2021-10-14

tldr - powered by Generative AI

Real-time data anonymization can be achieved using a Cloud Native Serverless architecture that is lightweight, reliable, and scalable. This architecture uses KEDA and Rook to extend Ceph and support AWS SQS compatible APIs. The queue trigger mechanism does not require exposing external endpoints to Serverless functions, making it more secure. The solution architecture uses Rook and KEDA, and the anonymization service function reads messages from the message queue and detects personal and sensitive information such as faces and license plates and blurs the region of interest using rectangular boxes. Microshift is a lightweight implementation of OpenShifts and Kubernetes that is optimized for large computing use cases that have small factory devices with resource constraints or for environments that only serve single-purpose workloads.
  • Global legislation landscapes on data protection and privacy preservation impact the industry and require careful processing, exchange, or storage of sensitive personal identifiable information
  • Pseudonymization and anonymization are techniques used to address data protection laws, with anonymization being the preferred method as it removes private personal information completely from the original data form
  • Real-time data anonymization can be achieved using a Cloud Native Serverless architecture that is lightweight, reliable, and scalable
  • The architecture uses KEDA and Rook to extend Ceph and support AWS SQS compatible APIs, and the queue trigger mechanism does not require exposing external endpoints to Serverless functions, making it more secure
  • The solution architecture uses Rook and KEDA, and the anonymization service function reads messages from the message queue and detects personal and sensitive information such as faces and license plates and blurs the region of interest using rectangular boxes
  • Microshift is a lightweight implementation of OpenShifts and Kubernetes that is optimized for large computing use cases that have small factory devices with resource constraints or for environments that only serve single-purpose workloads