Monitoring Java apps running inside containers can be hard:
- What are the system metrics that matter?
- How does JVM behave inside Docker and why are JVMs killed by the OOM killer?
- Can we collect all the metrics we care about like heap, stack, garbage collection, threads or JMX custom metrics more easily than exporting ports all the time?
In this session, we will reveal all our monitoring secrets on how to collect and use these metrics to resolve common issues.Jorge Salamero Sanz - Engineer, Sysdig
Dan will demonstrate how development and test teams are using Skytap Cloud, Docker, and DevOps to accelerate modernizing traditional applications.
As cloud buzz continues to proliferate in all directions, we’re hosting a session to cut through the chatter. This demonstration will focus on the technology developers, system administrators, and architects leverage to get organizations into the cloud - and use it effectively.
While some on-premises applications easily migrate to containers, many applications that power enterprises today are complex, monolithic applications running on older operating systems, like AIX. Modernizing these applications requires more than magic, but with Skytap Cloud, it’s achievable and realistic.
Dan will detail how you can combine Skytap Cloud, automation tools including Jenkins, Chef, Puppet, and UrbanCode, and the magic of Docker containers plus Kubernetes, to release more frequently, increase test coverage, and make the most of cloud’s benefits.
After Dan’s magic act, please join us at the Skytap booth for more fun and carnival games!Dan Jones - VP of Product, Skytap
Join the DockerCon opening general session as Docker CEO Steve Singh kicks off the conference and speaks about how Docker works for you, your team and your company. You'll also hear from enterprise companies on their Docker success stories, and what would a DockerCon be without tech demos by the Docker engineering team.Steve Singh - CEO, Docker, Docker
Doing a POC, building a container DevOps pipeline, or deploying Docker containers at large scale? HPE got you covered with our range of solutions, services, and support that can ease your transition to containers and provide you with a flexible choice of options. HPE PointNext services can help you modernize, containerize, and shorten your Docker production readiness to days. You can deploy a production ready Docker cluster with Express Containers. Or you can build an Enterprise CaaS platform on composable systems with the ability to flex your compute, storage, and networking resources. Building container applications that need persistent storage? You have your choices of software defined container storage or leverage HPE 3PAR and Nimble storage offerings.Ka Wai Leung - Solutions Product Management, HPE
You've spun up Kubernetes in your DockerEE cluster, but what are all these new components? Where's Libnetwork? What is this cute Calico cat doing here? I just turned on this "network policy thing" and now nothing is talking - What is going on?
In 15 minutes, I will explain Kubernetes networking basics, how it works in DockerEE, what network policy is and what you can use it for, a real-world use-case from the front lines of containerized network security, and even who that insufferably cute kitten is, and what it's doing in your cluster.
A lot of (justified) attention has been given to managing vulnerabilities and securing the build pipeline. While avoiding known vulnerabilities and ensuring that only trusted images are used are necessary building blocks of any secure Docker deployment, this is not where security ends. Malicious code can be introduced in other ways, and unknown vulnerabilities (zero days) might be exploited. Rather than looking for complex patterns or trying to guess what an attacker might do, there is a relatively simple way of protecting containers against many such attacks – enforcing immutability. In this talk, Liz will demonstrate how Aqua can block attacks by preventing image-container drift and ensuring that containers only perform their intended functions.Liz Rice - Technology Evangelist, Aqua Security
Atlassian's CI/CD product, Pipelines, runs a Docker container of your own construction on our Kubernetes cluster. Find out how we safeguard your code even as others have the ability to run arbitrary code of their own. This talk will be heavily security focused.Ben Walther - Senior Security Engineer
The ascendance of Docker has helped bring about about a new focus on some software development values that are dear to our heart at CircleCI—consistency, automation, and continuity; that is, developing software within a consistent build environment, testing it in an automated fashion, and deploying it with a focus on continuous delivery of new code.
We released CircleCI 2.0 with these values in mind, placing Docker at the core of our Continuous Integration platform and allowing customers to build projects on CircleCI using any combination of Docker images as build environments.
CircleCI’s images for popular languages + frameworks have over 38M+ pulls on DockerHub. Docker images are an incredible asset for ensuring that your dev and production environments are mirrors. But, with every new technology comes added complexity and management overhead.
In this session, CircleCI CTO Rob Zuber will share some lessons learned in running Docker at scale, across thousands of customers, their language + technology choices, and their environments. With over 350,000 users and 10M+ jobs per month, we’ve seen up close how customers can succeed with Docker, and how to avoid potential issues.Angel Rivera - Developer Advocate, CircleCI
Azure offers great experiences for building anything from simple to very complex applications using Docker and containers. If its modernizing a .NET application for migration to the cloud, using containers to process workloads on demand with Container Instances, or using open source tools like Helm and Draft to create and deploy apps; Azure has it covered. In this session, stop by and see how you can take advantage of Azure's offerings alongside open source tools to get your app into the cloud and your organization more productive.Bryan Liston - Cloud Developer Advocate, Microsoft
Join us at DockerCon as Datadog shares findings from our 2018 Docker and Orchestrator Adoption study. As a SaaS monitoring solution specializing in containers and cloud, Datadog has a unique vantage point into the world of Docker, orchestration, and containers. Join us as we open up the data and discuss surprising facts about real world Docker usage. Is Docker usage making it into production or are we all dabblers? Which deployment patterns most often lead to successful rollouts? Are containers really short lived? Join us as we bust myths, review usage statistics, and make a few predictions.Ilan Rabinovitch - Vice President, Product, Datadog
Join Trend Micro security architects to see how DevOps teams can secure applications while maintaining fast time to value with continuous delivery.
From image creation to runtime deployment, this session will explore detailed demonstrations and use cases for building security into the build and deployment of applications deployed to a Kubernetes cluster. Learn how vulnerability and malware detection can be integrated to your container build process, securing images as they move through the CI/CD pipeline with tools like Jenkins. We will also show examples of how automated agent provisioning and runtime controls deliver ongoing container and host level protection for your Docker environments.
Our detailed use cases will provide a better understanding of how you can ensure application integrity with properly integrated security that meets compliance and mission-control requirements for better business outcomes.
Service mesh is the missing piece in most container deployments. Many organizations have seen increased agility by Dockerizing their applications and deploying in Kubernetes. Service mesh enables more complex deployment scenarios (A/B, circuit breaker), stricter security (mTLS), and better visibility. In it's current state service mesh is difficult to leverage and adds a lot more concepts to your deployments. In this talk we will present a new tool that builds on the simplicity of Docker Compose to deploy and run your service mesh.Darren Shepherd - Co-founder and Chief Architect, Rancher Labs, Inc.
For engineers and sysadmins, multi-cloud strategies usually imply complexity: multiple APIs, multiple endpoints, opaque workflows, data scattered across services with increased security threats. These are all issues Zenko tries to address by providing a unified API endpoint compatible with S3, support for multiple storage backends, full metadata search and a workflow engine.
Zenko gives users the freedom to manage data across all the main public clouds (including Azure and Google) and private clouds using a single endpoint and the S3 API. Zenko also lets you replicate data across all these backends based on programmable logic and do metadata search across all of them. All the data managed by Zenko is not mangled in any way and remains accessible natively. Developers save headaches, gain freedom of choice and users keep control of their data.
This talk will assess the current state of multi-cloud, the enterprises need for more transparency on how their data is managed, and the solutions brought to them by Zenko. We will also touch on business challenges of using Docker in production at large customer, and on our own deployment process with Kubernetes on bare metal. It will include a live demo of Zenko’s replication capabilities.Stefano maffulli - Dir. Community Marketing, Scality
DevOps organizations are increasing turning to container environments to meet the demand for faster, more agile software delivery. Container orchestration platforms like Kubernetes present the most effective way to manage the operational challenges as these production environments scale. However, large-scale container deployments present a new array of security challenges, including how to properly manage open source security risk. A 2017 451 research report recently identified security as the single biggest hurdle to container adoption.
The challenges of managing security risk increase in scope and complexity with the size of your deployment and the number of open source software components that are a part of your application code base. In 2017, dozens of new CVEs were reported every day, making it essential to have good visibility into and control over the open source in use in order to understand if any known vulnerabilities are present.
Black Duck open source and container management expert Tim Mackey shares the latest insights and recommendations for securing open source in your containers, including:
The role of containers in addressing some of the problems faced by teams moving to DevOps
How Kubernetes enhances that solution by answering questions of networking, image registries, deployment automation, application lifecycle, etc.
Why container environments present new application security challenges, including those posed by open source
How to scan applications running in containers to identify open source and map against known vulnerabilities Best practices and methodologies for deploying secure containers with trustTim Mackey - Sr Technical Evangelist, Black Duck by Synopsys