Weave AI Controllers (Weave GitOps Office Hours)Weaveworks
LLMs are one of the rising workloads on Kubernetes and so are the complexities of deploying, managing and fine-tuning them. With this latest extension we can offer a strong blueprint for enterprises on how to keep LLMs OCI contained with the use of Kubernetes, Flux and Weave AI Controllers.
The Highlights:
* Simplified deployment, management, and fine-tuning of LLMs on any Kubernetes infrastructure.
* Strong security and governance ensured through GitOps workflows and a robust signing and verification process.
The Whys:
* Security, Governance & Compliance: Ensures vulnerability-free and compliant deployments.
* Seamless Integration: Works with existing systems, including Red Hat OpenShift.
* GitOps for Productivity & Collaboration: Leverages the power of Flux and Kubernetes for automated, streamlined workflows.
The Weave AI Controllers are an out of the box extension for Flux and are shipped and supported with Weave GitOps Assured (https://www.weave.works/product/gitops) and Enterprise (https://www.weave.works/product/gitops-enterprise/).
Read our latest blog for more information (https://www.weave.works/blog/weave-ai-controllers) and visit GitHub to get started - https://github.com/weave-ai/weave-ai
Flamingo: Expand ArgoCD with Flux (Office Hours)Weaveworks
Flamingo is an open source tool that allows for integrated use of both Flux and ArgoCD, the two leading GitOps solutions available today.
* See how to integrate the two most used CNCF projects together to create flexible and extensible GitOps solutions.
* Learn how to use Flux’s powerful and secure controllers with ArgoCD’s web-based GUI.
* Understand how Flamingo provides a path towards Platform Engineering for ArgoCD users.
* Explore extending ArgoCD to manage Infrastructure as Code through Flux’s Terraform Controller.
For more information visit: https://github.com/flux-subsystem-argo/flamingo
Webinar: Capabilities, Confidence and Community – What Flux GA Means for YouWeaveworks
Flux, the original GitOps project, began its development in a small London office back in 2017 with the goal to bring continuous delivery (CD) to developers, platform and cluster operators working with Kubernetes. From donating the project to the CNCF, its continued growth within the cloud native community, to its achievement of passing rigorous battle tests for security, longevity and governance, it’s little wonder that Flux v2 has reached yet another celebratory milestone – General Availability (GA).
Flux is the GitOps platform of choice for many enterprise companies such as SAP, Volvo Cars, and Axel Springer; and is embedded within AKS, Azure Arc and EKS Anywhere. It provides extensive automation to CI/CD, security and audit trails, and reliability through canary deployments and rollback capabilities.
Join this webinar by Flux maintainers and creators and discover:
* Latest release features and roadmap for the future.
* Interesting use cases for Flux (e.g security).
* Flux capabilities you may not be aware of (e.g. extensions).
* Joining the vibrant Flux community.
* How to leverage Flux in a supported enterprise environment today.
Although not an entirely new concept, Platform Engineering and Internal Developer Platforms (IDPs) are all the rage due to their potential to increase development velocity and deployment frequency while boosting reliability and security.
Join Joe Dahlquist, VP of PMM and Mohamed Ahmed, VP of Developer Platforms at Weaveworks to learn the 6 tell-tale signs your company should implement a platform engineering approach. The webinar draws on hundreds of conversations with SRE’s, developers, and platform engineering teams to help you better understand what works, what doesn’t and what might be missing from your strategy. Attendees can apply these learnings to their first (or next) developer platform regardless of your build vs. buy journey.
You will learn:
* The difference between Internal Developer Platforms and Platform Engineering
* Why platform engineering now?
* How Dev and Ops benefit from an IDP
* 6 tell-tale signs to start platform engineering
* Drafting your platform engineering strategy - where to begin and what to avoid
SRE and GitOps for Building Robust Kubernetes Platforms.pdfWeaveworks
In today's technology-driven landscape, ensuring the reliability and stability of systems is critical for organizations to deliver exceptional user experiences. Site Reliability Engineering (SRE) has emerged as a proven methodology to achieve operational excellence and elevate performance.
By combining SRE and GitOps, organizations can leverage the benefits of both methodologies. GitOps provides a reliable and auditable approach to managing infrastructure and application changes, ensuring that all deployments are version-controlled and consistent across environments. This aligns with the SRE principle of implementing standardized and automated processes for maintaining system reliability.
Join our live webinar as we introduce the fundamentals and significance of SRE and GitOps, and provide actionable strategies for implementation. We’ll also explore the features of Weave GitOps that integrate SRE and GitOps practices to streamline workflows to support system reliability and stability.
You will learn:
An overview and correlation of key SRE and GitOps best practices
The 5 keys DORA metrics for measuring performance of software delivery.
How to leverage continuous delivery and progressive delivery to enhance application stability.
How Weave GitOps can reliably simplify the management of infrastructure and applications, with real-world customer examples illustrating their impact.
Webinar: End to End Security & Operations with Chainguard and Weave GitOpsWeaveworks
One of the key values of GitOps relies on its fully declarative single source of truth in Git for the desired state of your entire system – configuration that continuously reconciles with the runtime of the system.
Validating committer identity in your Git repository is a critical component towards a secure GitOps solution. Although basic capabilities are provided by Git service providers, more granular controls for governance and compliance are a requirement to satisfy most enterprise grade implementations.
How do you keep that end to end process secure, from Git to Runtime?
Join Weaveworks and Chainguard for a live webinar where we will look at how Chainguard Enforce for Git together with Weave GitOps Enterprise Policy Engine allows you to secure your end to end GitOps workflows, from Git to Runtime.
You will learn how to:
- Use Chainguard Enforce for Git to ensure only authorized GitOps tooling can modify your desired state.
- Provide a secure identity to Weave GitOps Enterprise for all Git operations.
- Use Weave GitOps Policy Engine to guarantee compliance on admission.
Flux Beyond Git Harnessing the Power of OCIWeaveworks
Watch the recap: https://youtu.be/gKR95Kmc5ac
In this KubeCon Europe 2023 session, Stefan and Hidde will talk about the latest developments of Flux around the Open Container Initiative (OCI). The focus will be on how OCI can serve as the single source of truth for both application code (container images) and configuration (OCI artifacts). We will start by explaining how Flux can be used as a package manager for distributing Kubernetes configs and Terraform modules as OCI artifacts. Afterwards, we will demonstrate how to build a secure delivery pipeline that leverages Flux integrations with GitHub Actions and keyless signatures from Sigstore Cosign. Lastly, we will touch upon the upcoming plans for 2023 and the significance of OCI in the future of continuous delivery with Flux.
Automated Provisioning, Management & Cost Control for Kubernetes ClustersWeaveworks
In today’s economic climate, IT departments are feeling the pressure to reduce costs which can have a significant effect on development teams, and more specifically, Kubernetes strategies. For many organizations, there is a good chance that many Kubernetes resources are overprovisioned, and it’s often difficult to visualize which processes are responsible for this unnecessary spend.
Weaveworks has joined forces with KubeCost to show you how to “do more with less” by easily integrating a Kubernetes FinOps solution into your existing workflows and seamlessly automating the provisioning and management of FinOps enabled Kubernetes clusters from a single UI / dashboard.
Join this webinar to discover best practices for monitoring and reducing Kubernetes spend, while balancing cost, performance, and reliability.
What you’ll learn:
- Best practices for implementing a FinOps strategy in your organization.
- Cluster management and templating capabilities using Weave GitOps for automating FinOps.
- How to use predefined, automated policies for reliable cost control across your Kubernetes environment.
How to Avoid Kubernetes Multi-tenancy CatastrophesWeaveworks
This document summarizes a webinar about implementing multi-tenancy in Kubernetes without catastrophes using GitOps. It recommends 5 easy steps: 1) implement a zero trust posture, 2) apply least privilege practices, 3) use policies to enforce governance, 4) leverage GitOps audit capabilities, and 5) reduce the blast radius. The webinar discusses how Weaveworks' Workspaces product establishes boundaries and defines access controls to securely support multiple teams deploying applications.
Building internal developer platform with EKS and GitOpsWeaveworks
An internal developer platform (IDP) is a set of standardized tools and technologies that enables development teams to self-service, offering convenient access to resources they need to create and deploy compliant code. The ultimate goal is to facilitate automation, autonomy and productivity across large teams. However, creating an IDP is highly complex, especially when bridging hybrid scenarios. In fact, build timelines can take anywhere between one to two years!
In this Techstrong Learning Experience, we will discuss how platform engineers can more efficiently build an IDP with Amazon EKS and Weave GitOps and accelerate cloud-native adoption while speeding up migration of existing applications to the cloud.
Our experts will also introduce EKS Blueprints, a collection of infrastructure-as-code (IaC) modules like Terraform and AWS Cloud Development Kit (AWS CDK) that will help you configure and deploy consistent EKS clusters across on-premises and cloud.
Key Takeaways:
- Why you should build a self-service IDP
- How to leverage EKS, GitOps and EKS Blueprints to build your IDP
- A review of use cases and benefits of an IDP
GitOps Testing in Kubernetes with Flux and Testkube.pdfWeaveworks
GitOps is amazing... until you can't apply it! This has been the case mostly for testing where it continues to be more of a push than a pull in organizations' DevOps pipelines.
Join us in this talk to learn the benefits of improving your existing testing pipeline with Testkube, an open source project that brings tests inside your Kubernetes cluster, and FluxCD adding the GitOps sprinkles to testing!
Speaker: Abdallah Abedraba, Product Leader at Testkube
Abdallah works at Testkube, a Kubernetes native testing framework. In his prior experiences, he has tried everything from software engineering to product management, and now working as a Developer Advocate, on open source (a dream of his!) evangelizing all things Testing and Kubernetes. In his free time, he enjoys attending developer conferences and meetups, as well as spending time at the movies and actively listening to music.
Intro to GitOps with Weave GitOps, Flagger and LinkerdWeaveworks
This document provides an overview of GitOps, service meshes, Linkerd, Flux, Weave GitOps and progressive delivery. It introduces the speakers and outlines the agenda which includes explanations of GitOps, service meshes, Linkerd and Weave GitOps. It then demonstrates how Weave GitOps and Linkerd can be used together for progressive delivery and provides a Q&A section at the end.
Implementing Flux for Scale with Soft Multi-tenancyWeaveworks
Soft multi-tenancy can be hard to achieve and secure. Multiple tenants sharing the same cluster means there are global objects, like Custom Resource Definitions (CRDs), namespaces, and so on, that you don’t want tenants controlling. Platform admins, cluster admins, and tenants, should be separated, with dedicated namespaces, role bindings, node groups, taints and tolerations, etc.
With Flux, tenant isolation is enforced by default, so you don’t have to worry about accidental tenant cross-over / cross-contamination.
In this session, Priyanka “Pinky” Ravi, Developer Experience Engineer at Weaveworks, will walk you through how to set up multi-tenancy on an existing Kubernetes cluster and manage several tenants within the cluster.
Take advantage of the benefits that come with infrastructure as code.
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKSWeaveworks
Join Leo Murillo, Principal Solutions Architect at Weaveworks and Rama Ponnuswami, Sr. Container Specialist at AWS, as they walk through accelerating Multi-stage delivery on GitOps. If you already have EKS-A, you are ready to automate the release of multistage delivery. Thus, allowing you to deploy more often and reliably with less overhead.
In this Webinar, we cover:
- Best practices for CI/CD, GitOps and Application Pipeline Management.
- Simple cluster management across Kubernetes hybrid infrastructure.
- Multistage deployments using Weave GitOps for EKS and EKS-A using a single UI dashboard.
The Story of Flux Reaching Graduation in the CNCFWeaveworks
This document summarizes the evolution of Flux from version 1 to version 2. It describes how Flux started as a tool to ensure cluster state matches Git config and has become a multi-tenant continuous delivery platform. It outlines key milestones such as graduating from CNCF sandbox to incubation and hitting over 4,000 stars. It also provides an overview of Flux version 2's architecture and growing set of capabilities around areas like GitOps, Helm, Kustomize, security, and support for artifacts from container registries.
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...Weaveworks
In this session, we’ve partnered with Upbound to showcase how to effectively manage application delivery while maintaining a high level of security using Weave GitOps and Upbound. Managing a stateful application deployment with a relational database, Weave GitOps can recognize if there is a policy violation and correct it before deploying the application.
Join us as we demonstrate the scenarios where:
All changes to application configuration are managed through Git workflows
Upbound’s Universal Crossplane allows you to build, deploy, and manage your cloud platforms
GitOps provides an extra layer of security by removing the need for direct access to Kubernetes clusters
Policy-as-Code guarantees security, resilience and coding standards compliance
Watch the recording: xx
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Weaveworks
In a joint webinar with Traefik Labs, we show how Traefik Hub, a SaaS-based cloud native networking platform, helps you publish your containers securely in seconds with tunnels, OIDC authentication and automated TLS certificate management. And, how you can combine that with Weave GitOps to achieve continuous application delivery using progressive delivery strategies for risk-free and reliable deployments.
Security is key, so we showcase multi-tenancy for full RBAC across the different deployment stages, and trusted delivery best practices for continuous security and compliance baked in.
Learn how:
- To utilize canary deployments for reliable and risk-free application deployments.
- GitOps lets you automate and secure the publishing of containers at the edge consistently.
- Easy it is to deploy, update and manage your application workloads on Kubernetes.
- To publish containers securely using tunnels, OIDC authentication and TLS certificate management.
Flux’s Security & Scalability with OCI & Helm Slides.pdfWeaveworks
During this session Kingdon Barrett, OSS Engineer at Weaveworks & Flux Maintainer, will show you how to quickly create scalable and Cosign-verified GitOps configurations with Flux using the same process with two demo environments: one will be a Kustomize Environment and the other a Helm-based environment.
Flux Security & Scalability using VS Code GitOps Extension Weaveworks
Recently Flux has released two new features (OCI and Cosign) for scalable and secure GitOps. Juozas Gaigalas, a Developer Experience Engineer at Weaveworks, will demonstrate how developers and platform engineers can quickly create scalable and Cosign-verified GitOps configurations using VS Code GitOps Tools extension. New and experienced Flux users can learn about Flux’s OCI and Cosign support through this demo.
Deploying secure, cloud native stateful applications requires a high level of performance across hybrid and multi-cloud environments.
Using the scalable, highly performant storage provided by Ondat in combination with Weave GitOps Trusted Delivery, you can shift left security and accelerate software development.
Watch this on-demand webinar as we demonstrate how:
- All changes to application configuration are managed through Git workflows
GitOps provides an extra layer of security by removing the need for direct access to Kubernetes clusters.
- Policy-as-Code guarantees security, resilience and coding standards compliance.
- To dynamically provision highly available persistent volumes by simply deploying Ondat anywhere with a simple operator profile.
- All data services such as replication, compression and encryption, are optimized and accelerated to scale on any platform with Ondat’s low latency data plane.
Robust Network Security and Observability with GitOps and CiliumWeaveworks
While GitOps is known as a paradigm for managing cloud native applications, not many know it fits within platform management as well. Automating the provisioning and management of Kubernetes clusters abstracts away the issue of inconsistency that you get with cluster sprawl, all while shortening provisioning time by consistent automation.
But that’s not enough. A networking layer is a standard requirement when managing Kubernetes environments, yet traditional IT networking and security methods do not work. By default, Kubernetes environments allow any pod to connect to any other pod, creating security risks. Furthermore, legacy approaches to network security visibility do not allow for performance of threat detection, compliance monitoring, or incident investigations for Kubernetes workloads. Cilium is a zero-trust cloud-native networking layer providing the necessary security and observability of your Kubernetes environments.
What if you were to add your network and security operations into your GitOps workflows?
In our webinar with Isovalent, we walk through how to easily add Cilium as a robust Container Network Interface solution using GitOps, and explore some of the Observability and Security features it provides.
You'll learn how:
- GitOps helps you manage cloud native chaos
- To save time creating secure, “user-ready” Kubernetes clusters
- To apply Weave GitOps to Kubernetes platform management
- To improve network security and network observability using Cilium
The document provides an introduction to GitOps and Flux. It discusses what GitOps is, how it utilizes version control as a single source of truth for continuous delivery. It then summarizes what Flux is and its key components like the source, kustomize, helm and notification controllers. The document highlights benefits of Flux like reducing developer burden and being extensible. It also briefly mentions new Flux features like OCI support and related tools like the terraform controller, flamingo and Weave GitOps.
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...Weaveworks
Weave GitOps 2022.09 Features Launch Event
The latest release of Weave GitOps introduces new features enabling progressive delivery, policy as code, and accelerated application onboarding.
Weave GitOps is the leading full-stack GitOps platform to automate trusted application delivery and secure infrastructure operations on premise, in the cloud and at the edge. Trusted by Customers, including Deutsche Telekom and The Department of Defense, Platform and Application Teams, Weave GitOps unlocks the benefits of increased efficiency and compliance, while boosting deployment velocity and confidence.
Join us where we’ll do a live demo of Weave GitOps showcasing:
- Advanced Deployment Patterns—Progressive Delivery has never been easier
- Multi-tenancy and Application Portability—More collaboration and control
- Strengthened GitOps Security—If you can code it, you can secure it.
Building a Security First Approach Across Hybrid Cloud with GitOps and Policy...Weaveworks
In this webinar, Darren Madams, Weaveworks Solution Architect and Steve Waterworth, Weaveworks Technical Marketing Manager demonstrate how to shift security best practices further left. They’ll walk through a practical example of how Weave GitOps helped a financial services organization move to a hybrid cloud environment for fully automated deployment and cluster provisioning that met their strict security, governance and compliance requirements.
Learn:
- The need for deploying clusters in on-premise environments because of compliance requirements such as PCI-DSS
- How to shift from manual to automated cluster provisioning with policy and security checks in place
- How to seamlessly expand automated processes across environments using Weave GitOps
- How Weave GitOps features 100+ policies out-of-the box for shifting security further left in your SDLC
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Weaveworks
Cloud-native applications are increasingly spanning across hybrid and multi-cloud environments such as on-premise data centers, in the cloud (Amazon EKS, Azure AKS, Google Cloud GKE) and at the edge. Customers need to ensure security and resiliency for their cloud-native applications while managing releases through reliable, consistent deployment and runtime policies.
In this session, we’ve partnered with Tetrate to showcase how to effectively manage advanced deployments using Weave GitOps. Managing application configurations by different teams across multiple Kubernetes clusters is made possible with Weave GitOps and Tetrate Service Bridge. Using familiar Git workflows, Weave Policy-as-Code enables application engineers to quickly deliver new features safely.
Join us as we demonstrate the scenarios where:
- All changes to application configuration are managed through Git workflows.
- GitOps provides an extra layer of security by removing the need for direct access to Kubernetes clusters.
- Policy-as-Code guarantees security, resilience and coding standards compliance.
- Tetrate Service Bridge provides dynamic configuration of application workloads and failover across multiple Kubernetes clusters.
DevOps Automation with GitOps: Consistent and Secure End to End DeploymentsWeaveworks
Time is always at a premium for software developers and DevOps teams who are constantly evolving their practices to deliver software more efficiently and frequently. Weave GitOps and Flagger enables DevOps teams to build continuous and progressive delivery pipelines that accelerate release frequency without compromising stability and security.
In this on-demand webinar, Steve Waterworth, Technical Marketing Manager at Weaveworks shows how simple it is to set up CI/CD automation across various stages in your software lifecycle. He will walk you through building an automated deployment pipeline that easily handles canary releases, feature flagging or other progressive release patterns.
Topics we cover:
- How Weave GitOps enables CICD automation to manage the workflow from staging to production.
- Why progressive delivery is a catalyst for security, stability and speed.
- How to set up a progressive deployment pipeline with Weave GitOps and Flagger.
The document discusses securing application delivery on Amazon EKS. It begins with an overview of the AWS shared responsibility model and EKS security best practices. This includes identity and access management, host and container image hardening, network segmentation, auditing and logging, and data encryption. The presentation then discusses how Weave GitOps can be used to achieve declarative and secure continuous delivery on EKS, enhancing security by creating an immutable barrier between CI and CD and guaranteeing trusted configuration and artifacts at runtime through policy as code and continuous reconciliation.
Terraform and Weave GitOps: Build a Fully Automated Application StackWeaveworks
This document discusses using GitOps and the Weaveworks Terraform Controller to manage AWS Lambda functions on Kubernetes. Key points include:
- Flux is used to bootstrap the Terraform Controller on Kubernetes which then reconciles any changes to the Terraform manifest stored in Git.
- The Terraform manifest defines an AWS Lambda resource and references the Git repo, AWS credentials secret, and outputs secret.
- AWS access keys are stored as a Kubernetes secret referenced by the Terraform configuration to provision the Lambda function.
How to Avoid Kubernetes Multi-tenancy CatastrophesWeaveworks
This document summarizes a webinar about implementing multi-tenancy in Kubernetes without catastrophes using GitOps. It recommends 5 easy steps: 1) implement a zero trust posture, 2) apply least privilege practices, 3) use policies to enforce governance, 4) leverage GitOps audit capabilities, and 5) reduce the blast radius. The webinar discusses how Weaveworks' Workspaces product establishes boundaries and defines access controls to securely support multiple teams deploying applications.
Building internal developer platform with EKS and GitOpsWeaveworks
An internal developer platform (IDP) is a set of standardized tools and technologies that enables development teams to self-service, offering convenient access to resources they need to create and deploy compliant code. The ultimate goal is to facilitate automation, autonomy and productivity across large teams. However, creating an IDP is highly complex, especially when bridging hybrid scenarios. In fact, build timelines can take anywhere between one to two years!
In this Techstrong Learning Experience, we will discuss how platform engineers can more efficiently build an IDP with Amazon EKS and Weave GitOps and accelerate cloud-native adoption while speeding up migration of existing applications to the cloud.
Our experts will also introduce EKS Blueprints, a collection of infrastructure-as-code (IaC) modules like Terraform and AWS Cloud Development Kit (AWS CDK) that will help you configure and deploy consistent EKS clusters across on-premises and cloud.
Key Takeaways:
- Why you should build a self-service IDP
- How to leverage EKS, GitOps and EKS Blueprints to build your IDP
- A review of use cases and benefits of an IDP
GitOps Testing in Kubernetes with Flux and Testkube.pdfWeaveworks
GitOps is amazing... until you can't apply it! This has been the case mostly for testing where it continues to be more of a push than a pull in organizations' DevOps pipelines.
Join us in this talk to learn the benefits of improving your existing testing pipeline with Testkube, an open source project that brings tests inside your Kubernetes cluster, and FluxCD adding the GitOps sprinkles to testing!
Speaker: Abdallah Abedraba, Product Leader at Testkube
Abdallah works at Testkube, a Kubernetes native testing framework. In his prior experiences, he has tried everything from software engineering to product management, and now working as a Developer Advocate, on open source (a dream of his!) evangelizing all things Testing and Kubernetes. In his free time, he enjoys attending developer conferences and meetups, as well as spending time at the movies and actively listening to music.
Intro to GitOps with Weave GitOps, Flagger and LinkerdWeaveworks
This document provides an overview of GitOps, service meshes, Linkerd, Flux, Weave GitOps and progressive delivery. It introduces the speakers and outlines the agenda which includes explanations of GitOps, service meshes, Linkerd and Weave GitOps. It then demonstrates how Weave GitOps and Linkerd can be used together for progressive delivery and provides a Q&A section at the end.
Implementing Flux for Scale with Soft Multi-tenancyWeaveworks
Soft multi-tenancy can be hard to achieve and secure. Multiple tenants sharing the same cluster means there are global objects, like Custom Resource Definitions (CRDs), namespaces, and so on, that you don’t want tenants controlling. Platform admins, cluster admins, and tenants, should be separated, with dedicated namespaces, role bindings, node groups, taints and tolerations, etc.
With Flux, tenant isolation is enforced by default, so you don’t have to worry about accidental tenant cross-over / cross-contamination.
In this session, Priyanka “Pinky” Ravi, Developer Experience Engineer at Weaveworks, will walk you through how to set up multi-tenancy on an existing Kubernetes cluster and manage several tenants within the cluster.
Take advantage of the benefits that come with infrastructure as code.
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKSWeaveworks
Join Leo Murillo, Principal Solutions Architect at Weaveworks and Rama Ponnuswami, Sr. Container Specialist at AWS, as they walk through accelerating Multi-stage delivery on GitOps. If you already have EKS-A, you are ready to automate the release of multistage delivery. Thus, allowing you to deploy more often and reliably with less overhead.
In this Webinar, we cover:
- Best practices for CI/CD, GitOps and Application Pipeline Management.
- Simple cluster management across Kubernetes hybrid infrastructure.
- Multistage deployments using Weave GitOps for EKS and EKS-A using a single UI dashboard.
The Story of Flux Reaching Graduation in the CNCFWeaveworks
This document summarizes the evolution of Flux from version 1 to version 2. It describes how Flux started as a tool to ensure cluster state matches Git config and has become a multi-tenant continuous delivery platform. It outlines key milestones such as graduating from CNCF sandbox to incubation and hitting over 4,000 stars. It also provides an overview of Flux version 2's architecture and growing set of capabilities around areas like GitOps, Helm, Kustomize, security, and support for artifacts from container registries.
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...Weaveworks
In this session, we’ve partnered with Upbound to showcase how to effectively manage application delivery while maintaining a high level of security using Weave GitOps and Upbound. Managing a stateful application deployment with a relational database, Weave GitOps can recognize if there is a policy violation and correct it before deploying the application.
Join us as we demonstrate the scenarios where:
All changes to application configuration are managed through Git workflows
Upbound’s Universal Crossplane allows you to build, deploy, and manage your cloud platforms
GitOps provides an extra layer of security by removing the need for direct access to Kubernetes clusters
Policy-as-Code guarantees security, resilience and coding standards compliance
Watch the recording: xx
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Weaveworks
In a joint webinar with Traefik Labs, we show how Traefik Hub, a SaaS-based cloud native networking platform, helps you publish your containers securely in seconds with tunnels, OIDC authentication and automated TLS certificate management. And, how you can combine that with Weave GitOps to achieve continuous application delivery using progressive delivery strategies for risk-free and reliable deployments.
Security is key, so we showcase multi-tenancy for full RBAC across the different deployment stages, and trusted delivery best practices for continuous security and compliance baked in.
Learn how:
- To utilize canary deployments for reliable and risk-free application deployments.
- GitOps lets you automate and secure the publishing of containers at the edge consistently.
- Easy it is to deploy, update and manage your application workloads on Kubernetes.
- To publish containers securely using tunnels, OIDC authentication and TLS certificate management.
Flux’s Security & Scalability with OCI & Helm Slides.pdfWeaveworks
During this session Kingdon Barrett, OSS Engineer at Weaveworks & Flux Maintainer, will show you how to quickly create scalable and Cosign-verified GitOps configurations with Flux using the same process with two demo environments: one will be a Kustomize Environment and the other a Helm-based environment.
Flux Security & Scalability using VS Code GitOps Extension Weaveworks
Recently Flux has released two new features (OCI and Cosign) for scalable and secure GitOps. Juozas Gaigalas, a Developer Experience Engineer at Weaveworks, will demonstrate how developers and platform engineers can quickly create scalable and Cosign-verified GitOps configurations using VS Code GitOps Tools extension. New and experienced Flux users can learn about Flux’s OCI and Cosign support through this demo.
Deploying secure, cloud native stateful applications requires a high level of performance across hybrid and multi-cloud environments.
Using the scalable, highly performant storage provided by Ondat in combination with Weave GitOps Trusted Delivery, you can shift left security and accelerate software development.
Watch this on-demand webinar as we demonstrate how:
- All changes to application configuration are managed through Git workflows
GitOps provides an extra layer of security by removing the need for direct access to Kubernetes clusters.
- Policy-as-Code guarantees security, resilience and coding standards compliance.
- To dynamically provision highly available persistent volumes by simply deploying Ondat anywhere with a simple operator profile.
- All data services such as replication, compression and encryption, are optimized and accelerated to scale on any platform with Ondat’s low latency data plane.
Robust Network Security and Observability with GitOps and CiliumWeaveworks
While GitOps is known as a paradigm for managing cloud native applications, not many know it fits within platform management as well. Automating the provisioning and management of Kubernetes clusters abstracts away the issue of inconsistency that you get with cluster sprawl, all while shortening provisioning time by consistent automation.
But that’s not enough. A networking layer is a standard requirement when managing Kubernetes environments, yet traditional IT networking and security methods do not work. By default, Kubernetes environments allow any pod to connect to any other pod, creating security risks. Furthermore, legacy approaches to network security visibility do not allow for performance of threat detection, compliance monitoring, or incident investigations for Kubernetes workloads. Cilium is a zero-trust cloud-native networking layer providing the necessary security and observability of your Kubernetes environments.
What if you were to add your network and security operations into your GitOps workflows?
In our webinar with Isovalent, we walk through how to easily add Cilium as a robust Container Network Interface solution using GitOps, and explore some of the Observability and Security features it provides.
You'll learn how:
- GitOps helps you manage cloud native chaos
- To save time creating secure, “user-ready” Kubernetes clusters
- To apply Weave GitOps to Kubernetes platform management
- To improve network security and network observability using Cilium
The document provides an introduction to GitOps and Flux. It discusses what GitOps is, how it utilizes version control as a single source of truth for continuous delivery. It then summarizes what Flux is and its key components like the source, kustomize, helm and notification controllers. The document highlights benefits of Flux like reducing developer burden and being extensible. It also briefly mentions new Flux features like OCI support and related tools like the terraform controller, flamingo and Weave GitOps.
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...Weaveworks
Weave GitOps 2022.09 Features Launch Event
The latest release of Weave GitOps introduces new features enabling progressive delivery, policy as code, and accelerated application onboarding.
Weave GitOps is the leading full-stack GitOps platform to automate trusted application delivery and secure infrastructure operations on premise, in the cloud and at the edge. Trusted by Customers, including Deutsche Telekom and The Department of Defense, Platform and Application Teams, Weave GitOps unlocks the benefits of increased efficiency and compliance, while boosting deployment velocity and confidence.
Join us where we’ll do a live demo of Weave GitOps showcasing:
- Advanced Deployment Patterns—Progressive Delivery has never been easier
- Multi-tenancy and Application Portability—More collaboration and control
- Strengthened GitOps Security—If you can code it, you can secure it.
Building a Security First Approach Across Hybrid Cloud with GitOps and Policy...Weaveworks
In this webinar, Darren Madams, Weaveworks Solution Architect and Steve Waterworth, Weaveworks Technical Marketing Manager demonstrate how to shift security best practices further left. They’ll walk through a practical example of how Weave GitOps helped a financial services organization move to a hybrid cloud environment for fully automated deployment and cluster provisioning that met their strict security, governance and compliance requirements.
Learn:
- The need for deploying clusters in on-premise environments because of compliance requirements such as PCI-DSS
- How to shift from manual to automated cluster provisioning with policy and security checks in place
- How to seamlessly expand automated processes across environments using Weave GitOps
- How Weave GitOps features 100+ policies out-of-the box for shifting security further left in your SDLC
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Weaveworks
Cloud-native applications are increasingly spanning across hybrid and multi-cloud environments such as on-premise data centers, in the cloud (Amazon EKS, Azure AKS, Google Cloud GKE) and at the edge. Customers need to ensure security and resiliency for their cloud-native applications while managing releases through reliable, consistent deployment and runtime policies.
In this session, we’ve partnered with Tetrate to showcase how to effectively manage advanced deployments using Weave GitOps. Managing application configurations by different teams across multiple Kubernetes clusters is made possible with Weave GitOps and Tetrate Service Bridge. Using familiar Git workflows, Weave Policy-as-Code enables application engineers to quickly deliver new features safely.
Join us as we demonstrate the scenarios where:
- All changes to application configuration are managed through Git workflows.
- GitOps provides an extra layer of security by removing the need for direct access to Kubernetes clusters.
- Policy-as-Code guarantees security, resilience and coding standards compliance.
- Tetrate Service Bridge provides dynamic configuration of application workloads and failover across multiple Kubernetes clusters.
DevOps Automation with GitOps: Consistent and Secure End to End DeploymentsWeaveworks
Time is always at a premium for software developers and DevOps teams who are constantly evolving their practices to deliver software more efficiently and frequently. Weave GitOps and Flagger enables DevOps teams to build continuous and progressive delivery pipelines that accelerate release frequency without compromising stability and security.
In this on-demand webinar, Steve Waterworth, Technical Marketing Manager at Weaveworks shows how simple it is to set up CI/CD automation across various stages in your software lifecycle. He will walk you through building an automated deployment pipeline that easily handles canary releases, feature flagging or other progressive release patterns.
Topics we cover:
- How Weave GitOps enables CICD automation to manage the workflow from staging to production.
- Why progressive delivery is a catalyst for security, stability and speed.
- How to set up a progressive deployment pipeline with Weave GitOps and Flagger.
The document discusses securing application delivery on Amazon EKS. It begins with an overview of the AWS shared responsibility model and EKS security best practices. This includes identity and access management, host and container image hardening, network segmentation, auditing and logging, and data encryption. The presentation then discusses how Weave GitOps can be used to achieve declarative and secure continuous delivery on EKS, enhancing security by creating an immutable barrier between CI and CD and guaranteeing trusted configuration and artifacts at runtime through policy as code and continuous reconciliation.
Terraform and Weave GitOps: Build a Fully Automated Application StackWeaveworks
This document discusses using GitOps and the Weaveworks Terraform Controller to manage AWS Lambda functions on Kubernetes. Key points include:
- Flux is used to bootstrap the Terraform Controller on Kubernetes which then reconciles any changes to the Terraform manifest stored in Git.
- The Terraform manifest defines an AWS Lambda resource and references the Git repo, AWS credentials secret, and outputs secret.
- AWS access keys are stored as a Kubernetes secret referenced by the Terraform configuration to provision the Lambda function.
Terraform and Weave GitOps: Build a Fully Automated Application StackWeaveworks
Simplifying Hybrid Kubernetes with Weaveworks and EKS.pdf
1. 1
Confidential do not distribute 1
September 2022
Simplifying Hybrid
Kubernetes with
Weaveworks and EKS
Leonardo Murillo
Principal Partner Solutions Architect, Weaveworks
@murillodigital ⬝ [email protected]
2. 2
Confidential do not distribute 2
Leo brings wide-ranging industry perspective, with over 20 years
of experience building technology and leading teams all the way
from Startups to Fortune 500s.
He is passionate about cloud native technologies, organizational
transformation and open source.
As former CTO of Qwinix Technologies he led worldwide teams
building cloud native software for large enterprises. In his role as
Principal Partner Solutions Architect at Weaveworks, he focuses
on helping solve application and infrastructure delivery
challenges on Kubernetes at scale.
Leonardo Murillo
Principal Partner Solutions Architect, Weaveworks
@murillodigital ⬝ [email protected]
3. 3
Confidential do not distribute 3
What we’ll talk about today
● The GitOps Principles
● How GitOps helps with
○ Increasing Kubernetes reliability
○ Recovering EKS clusters in case of disaster
○ Governance, risk and compliance
● Hybrid Kubernetes simplified by GitOps
● EKS as foundation for Hybrid Solutions
● GitOps, development and the SDLC of containerized workloads on Kubernetes
5. 5
Confidential do not distribute 5
The GitOps Principles
Declarative configuration only
describes, it does not provide
instructions the way imperative
systems do.
1
6. 6
Confidential do not distribute 6
The GitOps Principles
State does not change,
it evolves. The only way to
introduce changes to the
description is creating a
new version.
2
7. 7
Confidential do not distribute 7
The GitOps Principles
Declared state is automatically
pulled, there is no external push
into the target system.
3
8. 8
Confidential do not distribute 8
The GitOps Principles
State is maintained at all times,
and all necessary actions are
abstracted by the agents that
interpret it.
4
9. 9
Confidential do not distribute 9
How does Weave GitOps apply these principles
Kubernetes manifests
as declarative
configuration
Weave GitOps Watches the repository and
agents continuously introspect the runtime state
and reconcile it with the described configuration
Stored in Git, every change
producing a new unique version
that is immutable
10. 10
Confidential do not distribute 10
How does Weave GitOps apply these principles
The same pattern applies for
applications and infrastructure.
You can create and operate many
clusters from a management
cluster using declarative
configuration and Weave GitOps
continuous reconciliation.
“Leaf Clusters” can run EKS in
AWS, or EKS Distro anywhere
else!
11. 11
Confidential do not distribute 11
Declarative EKS Provisioning
Cluster Provider
Describes the configuration of the cluster,
not the actions or resources specific to
satisfy that desired state within a specific
infrastructure provider
Interprets the cluster configuration and
takes the necessary, infrastructure specific
actions, required to materialize that desired
state.
Provisioning complexity is abstracted away.
Cluster configuration is generically applicable.
Declare once, apply everywhere (see the value to hybrid?)
12. 12
Confidential do not distribute 12
Continuous Reconciliation towards Reliability
Reliability:
Probability that a system
performs correctly during
a specific time duration.
Probability that a system
performs correctly a user will
receive the expected and
acceptable experience during a
specific time duration.
(Think error budgets and site reliability
engineering)
What’s one of the easiest ways to
guarantee low error budgets and
satisfactory availability?
Automate: deployment, scaling
and recovery.
An agent’s continuous
reconciliation process
does just that.
13. 13
Confidential do not distribute 13
Continuous Reconciliation towards Reliability
Update
Kubernetes
Objects
Pods
Services
Watch
Watch
Update
Controller
System
Resources
Containers
Volume
iptables
rules
14. 14
Confidential do not distribute 14
GitOps and Disaster Recovery
Your entire system is declared in a
versioned and immutable source
of truth.
(Entire system = infrastructure,
applications, cloud resources,
everything)
Using GitOps, disaster recovery
means small configuration changes if
necessary to apply the full desired
state to a new provider or region.
This may not even be necessary if
disruption is not as vast that the
recovery itself did not happen fully
automatically by the GitOps
Reconciliation Loop.
1 2
15. 15
Confidential do not distribute 15
GitOps and Disaster Recovery
Pull makes it easier
Since the target environments are
pulling configuration from a source of
truth, access controls and network
permissions are dramatically
simplified, no need to punch holes
into new environments or handle
ad-hoc credentials
What about data?
You will still need to apply best
practices in terms of data backups
and replication!
3 4
16. 16
Confidential do not distribute 16
Environment Consistency and HA
The boundary between cluster
and underlying provider allows
you to create consistent
environments in terms of
configuration, while freely
switching the underlying
infrastructure provider.
It also becomes simpler to
establish redundancy and high
availability, by applying the
same configuration to multiple
providers or across regions
within the same infrastructure
provider.
Scalability becomes part of
your described desired state,
covering workloads (using
Kubernetes native objects such
as Deployments) as well as the
clusters themselves (using
Cluster Auto Scaler)
17. 17
Confidential do not distribute 17
Immutability and traceability towards compliance
By using Git, every change
applied to a system can be
uniquely identified. Each
identifier is tied to a specific
user, and it represents the
unique and immutable state
at a point in time.
This has worked wonderfully in
application development and
with GitOps it applies to entire
systems.
18. 18
Confidential do not distribute 18
Immutability and traceability towards compliance
What about compliance?
Declarative policy will continuously
inspect and validate runtime, and
reject, notify or otherwise take
actions to guarantee compliance.
19. 19
Confidential do not distribute 19
How does this all tie together for simple Hybrid EKS?
20. 20
Confidential do not distribute 20
The relevance of EKS (Managed, Distro, Anywhere)
● Observe
● Upgrade
● Patch
● Secure
Kubernetes does around 3
releases a year, your chosen
distro will need to track them.
Picking a Kubernetes
distribution is critical towards
reducing complexity down the
road.
Once your cluster(s) are running,
you will need to:
EKS Distro gives you a common Kubernetes platform with
secure opinions and built for scale, that you can run across any
target environments
21. 21
Confidential do not distribute 21
Delivering Workloads to Hybrid Environments
Development
Team
Autonomy
Release
Promotion
Environment
Security
Advanced
Delivery
Pattern
22. 22
22
1. Whitepaper: Best Practices for Hybrid Cloud Kubernetes
with EKS and Weave GitOps
https://bit.ly/hybrid-EKS
2. Contact us for a demo:
[email protected]
3. Join other events with us:
www.weave.works/events
Thank You