We're excited for our February 2019 Cloud Native Computing meetup, which will take place Thursday, 28 February from 6-9PM at ezCater--101 Arch St, 4th floor, Boston, MA 02110. Thank you, ezCater for being both our event space sponsor as well as our food and drink sponsor for the evening!
Thank you to Turbonomic for being our first presenter:
Endre Sara, VP Advanced Engineering
Istio tells me my service has slow response time, now what?
With telemetry service provided by Istio, containerized application performance monitoring has never been easier. But what do you do with slow response time when you have application deploying at scale? Slow response time is just a symptom, the root causes might be incorrect CPU/Mem limit configuration, incorrect number of replicas, underlying infrastructure congestion, or, a combination of the above. The corresponding way to solve it could be vertical scale the container, horizontal scale the pod, or reschedule the pod to a different node. In this presentation, we are going to share our lesson and knowledge about managing containerized application performance by leveraging the telemetry information from Istio to assure the application SLA
Thank you to Threat Stack for being our second presenter:
Tim Buntel, VP of Application Security
Cloud Security in A Microservice World
Modern cloud application development involves breaking applications up into smaller microservices deployed in containers. In this microservice world, teams focus on the higher, more abstracted tiers of the stack - the application, the container, and the orchestrator - with the cloud infrastructure provider handling everything else. That may make it seem like security should be easier for these apps; after all, there are fewer tiers in the stack to monitor. In reality, it can actually be more challenging because they rely on frequently changing, de-coupled ephemeral services communicating over unreliable networks. Security for these apps requires an understanding of the movement of data into and out of the application from the internet, the movement of information between services at runtime, and the way the services run atop the abstracted layers of infrastructure (container host, container orchestrator). This talk will explain these challenges and suggest steps that application security teams can take to overcome them.
As always, we're always looking for sponsors for
-- Event Space and food and drink sponsors
-- Lightning Talk Speakers (5 minutes)
Please ping Jonas, Chris, or Michelle if you have any questions or suggestions.