Cybersecurity | Cloud | DevelopmentUsing Pod Security Policies to harden your Kubernetes cluster December 16, 2020 video 2019alertingArchitectureautomatebountybugcertificatecloudclusterdefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeykuberneteslogmaliciousmanagementmanagermonitoringmultinetworkOLAPOLTPOnionOpenopenscapOSINTpodpolarDBPolicyprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemtenantTortrafficusabilityUserVitessWireshark
Cybersecurity | Cloud | DevelopmentScale MySQL beyond limits with ProxySQL November 22, 2020 video 2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark
Cybersecurity | Cloud | DevelopmentPromCon 2017: Play with Prometheus – Journey to Make “testing in Production” More Reliable July 8, 2020 video alertingmetricsmonitoringpromconprometheustelemetrytime seriestime series database