OpenShift Commons Briefing: Network Security with OpenShift and Tigera CNX with Amita Gupta
April 18, 2018 | by
OpenShift Commons Briefing Summary
In an earlier Commons briefing (#65), we discussed Tigera’s open source Project Calico, and how it enables simplified networking with secure network policies. In this briefing, Tigera's Amit Gupta expanded on that topic today with an exploration of the additional features enabled by Tigera’s flagship CNX product, and a preview of capabilities in the forthcoming 2.1 release, including even closer integration with OpenShift.
Amit covered practical workflows demanded by enterprises including meeting compliance requirements for network isolation with auditing, monitoring and alerting. He talked about how CNX enables multiple teams (e.g. security, network and development/ops) to easily and collaboratively define hierarchical security policies with role-based access controls and graphical management of policies (at last, yaml is purely optional!), and drew from examples of real-world users adopting both CNX and OpenShift.
Learn More at the Next OpenShift Commons Gathering in San Francisco on May 7th at Red Hat Summit!
Red Hatters, CNCF/Kubernetes project leads, community members with production deployments, and numerous other members of the OpenShift Commons will be gathering together in London for the upcoming OpenShift Commons Gathering at the QE II Centre.
Don't forget to leave your feedback and suggestions for each video on YouTube or in the comments section below. This will be incredibly important to shape this Special Interest Group and create sessions that fit the demands of all the OpenShift developers in the community.
About OpenShift Commons
OpenShift Commons is the place for organizations that are part of the OpenShift community to connect with peers and other related open source technology communities to communicate and collaborate across all OpenShift projects and stakeholders.
The Commons' goal is to foster collaboration and communication between OpenShift stakeholders to drive success for all members, and expand & facilitate points of connection between members for sharing knowledge and experience to help drive success for the platform and for participants: customers, users, partners, and contributors.
Network emulation is the process of imitating certain aspects of the behavior of network equipment without actually using any target real-world networking hardware. While there are many different use ...
With Red Hat Quay 3.8 DevSecOps teams now have a solution available to contain ubiquitous container image sprawl. This release of Quay focuses on manageability, targeting operations teams in charge ...