SlideShare a Scribd company logo
1 of 78
Download to read offline
A DevOps State of Mind:
Continuous Security with Kubernetes
Chris Van Tuin
Red Hat
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.com
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
“Only the paranoid survive”
- Andy Grove, 1996
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Static &

Planned
Dynamic & 

Policy Driven
ExecutionInnovation
Old New
ExecutionInnovation
THE CHALLENGE: 

ENABLE INNOVATION AT SPEED, WHILE
EXECUTING AT SCALE WITH EFFICIENCY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
SECURITY MUST EVOLVE & KEEP UP
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Applications &
devices outside of
IT control
Cloud
computing
Software-defined
infrastructure
Dissolving
security
perimeter
Menacing threat
landscape
TRADITIONAL NETWORK-BASED DEFENSES ARE NO LONGER ENOUGH
SECURING THE ENTERPRISE IS HARDER THAN EVER
The way we develop, deploy and manage IT is changing dramatically
led by DevOps, Cloud Native Applications, and Hybrid Cloud
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
DEVSECOPS
+ +
Security
DEV
QA OPS
Culture Process Technology
Linux + Containers
IaaS
Orchestration
CI/CD
Source Control Management
Collaboration
Build and Artifact Management
Testing
Frameworks
Cloud Native Applications
Hybrid Cloud
OpenSource
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
DEVSECOPS
Continuous
Security
Improvement
Process
Optimization
Security
Automation
Dev QA Prod
Reduce Risks, Lower Costs, Speed Delivery, Speed Reaction
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
LAPTOP
Container
Application
OS dependencies
Guest VM
LINUX
BARE METAL
Container
Application
OS dependencies
LINUX
VIRTUALIZATION
Container
Application
OS dependencies
Virtual Machine
LINUX
PRIVATE CLOUD
Container
Application
OS dependencies
Virtual Machine
LINUX
PUBLIC CLOUD
Container
Application
OS dependencies
Virtual Machine
LINUX
CONTAINERS - Build Once, Deploy Anywhere
Reducing Risk and Improving Security with Improved Consistency
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
BARE METAL VIRTUAL PRIVATE CLOUD PUBLIC CLOUD
Security Platform
AUTOMATION
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Web Database
role=web role=db role=web
replicas=1, 

role=db
replicas=2, 

role=web
ORCHESTRATION
Deployment, Declarative
Pods
Nodes
Services
Controller
Manager
&
Data Store
(etcd)
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Web Database
replicas=1, 

role=db
replicas=2, 

role=web
HEALTH CHECK
Pods
Nodes
Services
role=web role=db role=web
Controller
Manager
&
Data Store
(etcd)
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Pods
Nodes
Services
Web Database
replicas=1, 

role=dbreplicas=3 

role=web
AUTO-SCALE
50% CPU
role=web role=db role=web role=web
Controller
Manager
&
Data Store
(etcd)
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Network
isolation
API & Platform
access
Federated
clusters
Storage
{}
CI/CD
Monitoring &
Logging
BuildsImages
SECURING YOUR CONTAINER ENVIRONMENT
Container
hostRegistry
CONTAINER IMAGES
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
docker.io
RegistryPrivate
Registry
FROM fedora:1.0
CMD echo “Hello”
Build file
Physical, Virtual, Cloud
Container
Image
Container
Instance
Build RunShip
CONTAINER WORKFLOW
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
JAR CONTAINER IMAGE
Application Application
Language runtimes
OS dependencies
1.2/latest
1.1
CONTAINER IMAGE
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Config Data
Kubernetes
configmaps
secrets
Container
image
Traditional 

data services,
Kubernetes 

persistent volumes
TREAT CONTAINERS AS IMMUTABLE
Application
Language runtimes
OS dependencies
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
•Authenticating authorship
•Non-repudiation
•Ensuring image integrity
CONTAINER IMAGE SIGNING
Validate what images and version are running
CONTAINER BUILDS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
A CONVERGED SOFTWARE 

SUPPLY CHAIN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
• Treat build file as a Blueprint
• Version control build file
• Don’t login to build/configure
• Be explicit with versions, not latest
• Always list registry pulling FROM
• Specify USER, default is root
• Each Run creates a new layer
BUILD FILE BEST PRACTICES
FROM registry.redhat.com/rhel7
RUN groupadd -g 999 appuser && 
useradd -r -u 999 -g appuser appuser
USER appuser
CMD echo “Hello”
Build file
CONTAINER REGISTRY SECURITY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
64% of official images in Docker Hub 

contain high priority security vulnerabilities
examples:
ShellShock (bash)
Heartbleed (OpenSSL)
Poodle (OpenSSL)
Source: Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities, Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner, BanyanOps,
May 2015 (http://www.banyanops.com/pdf/BanyanOps-AnalyzingDockerHub-WhitePaper.pdf)
WHAT’S INSIDE THE CONTAINER MATTERS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
PRIVATE REGISTRY
CONTAINER HOST SECURITY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Best Practices
• Don’t run as root
• If you must, 

limit Linux Capabilities
• Limit SSH Access
• Use namespaces
• Define resource quotas
• Enable logging
• Apply Security Errata
• Apply Security Context
and seccomp filters
• Run production 

unprivileged containers 

as read-only
http://blog.kubernetes.io/2016/08/security-best-practices-kubernetes-deployment.html
Kernel
Hardware (Intel, AMD) or Virtual Machine
Containers ContainersContainers
Unit File
Docker
Image
Container CLI
SYSTEMD
Cgroups Namespaces SELinux
Drivers seccomp Read Only mounts Capabilities
CONTAINER HOST SECURITY
CONTINUOUS INTEGRATION
WITH CONTAINERS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
SECURITY IMPLICATIONS
What’s inside matters…
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Security
CONTINUOUS INTEGRATION

WITH SECURITY SCAN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
AUTOMATED SECURITY SCANNING with OpenSCAP
ReportsScan
SCAP Security
Guide
for RHEL
CCE-27002-5
Set Password Minimum
Length
Content
Scan physical servers, virtual machines, docker images and containers

for Security Policy Compliance (CCEs) and known Security Vulnerabilities (CVEs)
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
CONTINUOUS INTEGRATION + BUILDS
CONTINUOUS DELIVERY
WITH CONTAINERS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
CONTINUOUS DELIVERY WITH CONTAINERS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
CONTINUOUS DELIVERY DEPLOYMENT STRATEGIES
DEPLOYMENT STRATEGIES
• Recreate
• Rolling updates
• Blue / Green deployment
• Canary with A/B testing
RECREATE
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Version 1Version 1
Version 1.2
`
Tests / CI
RECREATE WITH DOWNTIME
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Version 1Version 1
Version 1.2
`
Tests / CI
RECREATE WITH DOWNTIME
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1.2 Version 1.2Version 1.2
RECREATE WITH DOWNTIME
Use Case
• Non-mission critical services
Cons
• Downtime
Pros
• Simple, clean
• No Schema incompatibilities
• No API versioning
ROLLING UPDATES
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Version 1Version 1
Version 1.2
`
Tests / CI
ROLLING UPDATES with ZERO DOWNTIME
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Deploy new version and wait until it’s ready…
Version 1 Version 1 V1.2
Health Check:
readiness probe
e.g. tcp, http, script
V1
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Each container/pod is updated one by one
Version 1.2
50%
Version 1 V1 V1.2
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Each container/pod is updated one by one
Version 1.2Version 1.2Version 1.2
100%
Use Case
• Horizontally scaled
• Backward compatible
API/data
• Microservices
Cons
• Require backward
compatible APIs/data
• Resource overhead
Pros
• Zero downtime
• Reduced risk, gradual
rollout w/health checks
• Ready for rollback
BLUE / GREEN DEPLOYMENT
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1
BLUE / GREEN DEPLOYMENT
Route
BLUE
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1
BLUE / GREEN DEPLOYMENT
Version 1.2
BLUE GREEN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Tests / CI
BLUE / GREEN DEPLOYMENT
Version 1.2
BLUE GREEN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1 Version 1.2
BLUE / GREEN DEPLOYMENT
Route
Version 1.2
BLUE GREEN
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1
BLUE / GREEN DEPLOYMENT
Rollback
Route
Version 1.2
BLUE GREEN
Use Case
• Self-contained micro
services (data)
Cons
• Resource overhead
• Data synchronization
Pros
• Low risk, never
change production
• No downtime
• Production like testing
• Rollback
RAPID INNOVATION &
EXPERIMENTATION
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
”only about 1/3 of ideas improve the metrics 

they were designed to improve.”

Ronny Kohavi, Microsoft (Amazon)
MICROSERVICES
RAPID INNNOVATION & EXPERIMENTATION
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
CONTINUOUS FEEDBACK LOOP
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
A/B TESTING USING CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1.2Version 1
100%
Tests / CI
Version 1.2
Route
25% Conversion Rate ?! Conversion Rate
CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
50% 50%
Version 1.2Version 1
Route
Version 1.2
25% Conversion Rate 30% Conversion Rate
CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
25% Conversion Rate
100%
Version 1 Version 1.2
Route
Version 1.2
30% Conversion Rate
CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Version 1.2Version 1
100%
Route
Rollback
25% Conversion Rate 20% Conversion Rate
CANARY DEPLOYMENTS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Network
isolation
API & Platform
access
Federated
clusters
Storage
{}
CI/CD
Monitoring &
Logging
ImagesBuilds
Container
hostRegistry
SECURING YOUR CONTAINER ENVIRONMENT
NETWORK SECURITY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Network Namespace 

provides resource isolation
NETWORK ISOLATION
Multi-Environment Multi-Tenant
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
NETWORK POLICY
example: 

all pods in namespace ‘project-a’ allow traffic 

from any other pods in the same namespace.”
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Kubernetes 

Logical Network Model
NETWORK SECURITY
• Kubernetes uses a flat SDN model
• All pods get IP from same CIDR
• And live on same logical network
• Assumes all nodes communicate

Traditional 

Physical Network Model
• Each layer represents a Zone with

increased trust - DMZ > App > DB,

interzone flow generally one direction
• Intrazone traffic generally unrestricted
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
NETWORK SECURITY MODELS
Co-Existence Approaches
One Cluster
Multiple Zones
Kubernete Cluster
Physical Compute 

isolation based on 

Network Zones
Kubernete Cluster
One Cluster
Per Zone
Kubernete Cluster B
Kubernete Cluster A
Kubernetes Cluster B
C
D
https://blog.openshift.com/openshift-and-network-security-zones-coexistence-approaches/
MONITORING & LOGGING
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
KUBERNETES MONITORING CONSIDERATIONS
Kubernetes*
Container*
Host
Cluster services, services, pods, 

deployments metrics
Container native metrics
Traditional resource metrics
- cpu, memory, network, storage
prometheus + grafana
kubernetes-state-metrics
probes
Stack Metrics Tool
node-exporter
kuberlet:cAdvisor
Application
Distributed applications
- traditional app metrics
- service discovery
- distributed tracing
prometheus + grafana
jaeger tracing
istio
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Aggregate platform and application log access via Kibana + Elasticsearch
LOGGING
STORAGE SECURITY
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Local Storage Quota Security Context Constraints
STORAGE SECURITY
Sometimes we can also have
storage isolation requirements: 

pods in a network zone must use
different storage endpoints 

than pods in other network
zones.
We can create one storage class
per storage endpoint and 

then control which storage
class(es) a project can use
API & PLATFORM ACCESS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Authentication
via
OAuth tokens and
SSL certificate
Authorization
via
Policy Engine
checks
User/Group
Defined Roles
API & PLATFORM ACCESS
FEDERATION
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Amazon East OpenStack
FEDERATED CLUSTERS
Roles & access management (in-dev)
WHAT’S NEXT
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Monitoring & Metrics
-prometheus (logs)
-grafana (visual)
Access Control
& usage policies
-mixr (policy decisions)
Encryption & Auth
-citadel
-service 2 service
-user auth
Traffic routing
- pilot
- circuit breaker
- a/b testing
- traffic mirroring
Fault injections
-envoy
corner cases: abort & delays
SERVICE MESH
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
OPERATORS
Chris Van Tuin
Chief Technologist, NA West / Silicon Valley
cvantuin@redhat.co
Deployment
Frequency
Lead
Time
Deployment

Failure Rate
Mean Time
to Recover
99.999
Service
Availability
DEVSECOPS METRICS
Compliance
Score
THANK YOU
linkedin: Chris Van Tuin
email: cvantuin@redhat.com
twitter: @chrisvantuin

More Related Content

What's hot

Connect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API ProtectionConnect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API Protection
DevOps.com
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 

What's hot (20)

Connect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API ProtectionConnect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API Protection
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Experience in teaching devops
Experience in teaching devopsExperience in teaching devops
Experience in teaching devops
 
Making the Transition from Suite to the Hub
Making the Transition from Suite to the HubMaking the Transition from Suite to the Hub
Making the Transition from Suite to the Hub
 
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, CheaperTesting in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
 
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
Рабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabРабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC Lab
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsTechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks
 
Building Security in Using CI
Building Security in Using CIBuilding Security in Using CI
Building Security in Using CI
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
 
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud EnvironmentSafe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
Safe and Secure Applications: Deploying in a Cloud or Multi-Cloud Environment
 
Rapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysisRapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysis
 
Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?
 

Similar to Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security with Kubernetes

Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...
Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...
Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...
QAware GmbH
 

Similar to Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security with Kubernetes (20)

The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
BGOUG "Agile Data: revolutionizing database cloning'
BGOUG  "Agile Data: revolutionizing database cloning'BGOUG  "Agile Data: revolutionizing database cloning'
BGOUG "Agile Data: revolutionizing database cloning'
 
DCSF19 Container Security: Theory & Practice at Netflix
DCSF19 Container Security: Theory & Practice at NetflixDCSF19 Container Security: Theory & Practice at Netflix
DCSF19 Container Security: Theory & Practice at Netflix
 
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesPatterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to Kubernetes
 
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesPatterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to Kubernetes
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
 
Episode 1: Building Kubernetes-as-a-Service
Episode 1: Building Kubernetes-as-a-ServiceEpisode 1: Building Kubernetes-as-a-Service
Episode 1: Building Kubernetes-as-a-Service
 
A DevOps State of Mind with Microservices, Containers and Kubernetes
A DevOps State of Mind with Microservices, Containers and KubernetesA DevOps State of Mind with Microservices, Containers and Kubernetes
A DevOps State of Mind with Microservices, Containers and Kubernetes
 
DevOps, Databases and The Phoenix Project UGF4042 from OOW14
DevOps, Databases and The Phoenix Project UGF4042 from OOW14DevOps, Databases and The Phoenix Project UGF4042 from OOW14
DevOps, Databases and The Phoenix Project UGF4042 from OOW14
 
Denver devops : enabling DevOps with data virtualization
Denver devops : enabling DevOps with data virtualizationDenver devops : enabling DevOps with data virtualization
Denver devops : enabling DevOps with data virtualization
 
Webinar Docker Tri Series
Webinar Docker Tri SeriesWebinar Docker Tri Series
Webinar Docker Tri Series
 
The Good, the Bad and the Ugly of Migrating Hundreds of Legacy Applications ...
 The Good, the Bad and the Ugly of Migrating Hundreds of Legacy Applications ... The Good, the Bad and the Ugly of Migrating Hundreds of Legacy Applications ...
The Good, the Bad and the Ugly of Migrating Hundreds of Legacy Applications ...
 
Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...
Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...
Migrating Hundreds of Legacy Applications to Kubernetes - The Good, the Bad, ...
 
Docker Orchestration: Welcome to the Jungle! Devoxx & Docker Meetup Tour Nov ...
Docker Orchestration: Welcome to the Jungle! Devoxx & Docker Meetup Tour Nov ...Docker Orchestration: Welcome to the Jungle! Devoxx & Docker Meetup Tour Nov ...
Docker Orchestration: Welcome to the Jungle! Devoxx & Docker Meetup Tour Nov ...
 
DevOps with Kubernetes and Helm - OSCON 2018
DevOps with Kubernetes and Helm - OSCON 2018DevOps with Kubernetes and Helm - OSCON 2018
DevOps with Kubernetes and Helm - OSCON 2018
 
Executive Briefing: The Why, What, and Where of Containers
Executive Briefing: The Why, What, and Where of ContainersExecutive Briefing: The Why, What, and Where of Containers
Executive Briefing: The Why, What, and Where of Containers
 
Why and how are containers the foundation for a hybrid cloud future
Why and how are containers the foundation for a hybrid cloud futureWhy and how are containers the foundation for a hybrid cloud future
Why and how are containers the foundation for a hybrid cloud future
 

More from Synopsys Software Integrity Group

Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 

More from Synopsys Software Integrity Group (20)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 

Recently uploaded

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Recently uploaded (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

Flight East 2018 Presentation–A DevOps State of Mind: Continuous Security with Kubernetes

  • 1. A DevOps State of Mind: Continuous Security with Kubernetes Chris Van Tuin Red Hat Chief Technologist, NA West / Silicon Valley cvantuin@redhat.com
  • 2. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co “Only the paranoid survive” - Andy Grove, 1996
  • 3. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Static &
 Planned Dynamic & 
 Policy Driven ExecutionInnovation Old New ExecutionInnovation THE CHALLENGE: 
 ENABLE INNOVATION AT SPEED, WHILE EXECUTING AT SCALE WITH EFFICIENCY
  • 4. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co SECURITY MUST EVOLVE & KEEP UP
  • 5. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Applications & devices outside of IT control Cloud computing Software-defined infrastructure Dissolving security perimeter Menacing threat landscape TRADITIONAL NETWORK-BASED DEFENSES ARE NO LONGER ENOUGH SECURING THE ENTERPRISE IS HARDER THAN EVER The way we develop, deploy and manage IT is changing dramatically led by DevOps, Cloud Native Applications, and Hybrid Cloud
  • 6. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co DEVSECOPS + + Security DEV QA OPS Culture Process Technology Linux + Containers IaaS Orchestration CI/CD Source Control Management Collaboration Build and Artifact Management Testing Frameworks Cloud Native Applications Hybrid Cloud OpenSource
  • 7. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co DEVSECOPS Continuous Security Improvement Process Optimization Security Automation Dev QA Prod Reduce Risks, Lower Costs, Speed Delivery, Speed Reaction
  • 8. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co LAPTOP Container Application OS dependencies Guest VM LINUX BARE METAL Container Application OS dependencies LINUX VIRTUALIZATION Container Application OS dependencies Virtual Machine LINUX PRIVATE CLOUD Container Application OS dependencies Virtual Machine LINUX PUBLIC CLOUD Container Application OS dependencies Virtual Machine LINUX CONTAINERS - Build Once, Deploy Anywhere Reducing Risk and Improving Security with Improved Consistency
  • 9. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co BARE METAL VIRTUAL PRIVATE CLOUD PUBLIC CLOUD Security Platform
  • 11. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Web Database role=web role=db role=web replicas=1, 
 role=db replicas=2, 
 role=web ORCHESTRATION Deployment, Declarative Pods Nodes Services Controller Manager & Data Store (etcd)
  • 12. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Web Database replicas=1, 
 role=db replicas=2, 
 role=web HEALTH CHECK Pods Nodes Services role=web role=db role=web Controller Manager & Data Store (etcd)
  • 13. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Pods Nodes Services Web Database replicas=1, 
 role=dbreplicas=3 
 role=web AUTO-SCALE 50% CPU role=web role=db role=web role=web Controller Manager & Data Store (etcd)
  • 14. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Network isolation API & Platform access Federated clusters Storage {} CI/CD Monitoring & Logging BuildsImages SECURING YOUR CONTAINER ENVIRONMENT Container hostRegistry
  • 16. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co docker.io RegistryPrivate Registry FROM fedora:1.0 CMD echo “Hello” Build file Physical, Virtual, Cloud Container Image Container Instance Build RunShip CONTAINER WORKFLOW
  • 17. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co JAR CONTAINER IMAGE Application Application Language runtimes OS dependencies 1.2/latest 1.1 CONTAINER IMAGE
  • 18. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Config Data Kubernetes configmaps secrets Container image Traditional 
 data services, Kubernetes 
 persistent volumes TREAT CONTAINERS AS IMMUTABLE Application Language runtimes OS dependencies
  • 19. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co •Authenticating authorship •Non-repudiation •Ensuring image integrity CONTAINER IMAGE SIGNING Validate what images and version are running
  • 21. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co A CONVERGED SOFTWARE 
 SUPPLY CHAIN
  • 22. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co • Treat build file as a Blueprint • Version control build file • Don’t login to build/configure • Be explicit with versions, not latest • Always list registry pulling FROM • Specify USER, default is root • Each Run creates a new layer BUILD FILE BEST PRACTICES FROM registry.redhat.com/rhel7 RUN groupadd -g 999 appuser && useradd -r -u 999 -g appuser appuser USER appuser CMD echo “Hello” Build file
  • 24. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co 64% of official images in Docker Hub 
 contain high priority security vulnerabilities examples: ShellShock (bash) Heartbleed (OpenSSL) Poodle (OpenSSL) Source: Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities, Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner, BanyanOps, May 2015 (http://www.banyanops.com/pdf/BanyanOps-AnalyzingDockerHub-WhitePaper.pdf) WHAT’S INSIDE THE CONTAINER MATTERS
  • 25. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co PRIVATE REGISTRY
  • 27. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Best Practices • Don’t run as root • If you must, 
 limit Linux Capabilities • Limit SSH Access • Use namespaces • Define resource quotas • Enable logging • Apply Security Errata • Apply Security Context and seccomp filters • Run production 
 unprivileged containers 
 as read-only http://blog.kubernetes.io/2016/08/security-best-practices-kubernetes-deployment.html Kernel Hardware (Intel, AMD) or Virtual Machine Containers ContainersContainers Unit File Docker Image Container CLI SYSTEMD Cgroups Namespaces SELinux Drivers seccomp Read Only mounts Capabilities CONTAINER HOST SECURITY
  • 29. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co SECURITY IMPLICATIONS What’s inside matters…
  • 30. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Security CONTINUOUS INTEGRATION
 WITH SECURITY SCAN
  • 31. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co AUTOMATED SECURITY SCANNING with OpenSCAP ReportsScan SCAP Security Guide for RHEL CCE-27002-5 Set Password Minimum Length Content Scan physical servers, virtual machines, docker images and containers
 for Security Policy Compliance (CCEs) and known Security Vulnerabilities (CVEs)
  • 32. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co CONTINUOUS INTEGRATION + BUILDS
  • 34. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co CONTINUOUS DELIVERY WITH CONTAINERS
  • 35. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co CONTINUOUS DELIVERY DEPLOYMENT STRATEGIES DEPLOYMENT STRATEGIES • Recreate • Rolling updates • Blue / Green deployment • Canary with A/B testing
  • 37. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Version 1Version 1 Version 1.2 ` Tests / CI RECREATE WITH DOWNTIME
  • 38. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Version 1Version 1 Version 1.2 ` Tests / CI RECREATE WITH DOWNTIME
  • 39. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1.2 Version 1.2Version 1.2 RECREATE WITH DOWNTIME Use Case • Non-mission critical services Cons • Downtime Pros • Simple, clean • No Schema incompatibilities • No API versioning
  • 41. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Version 1Version 1 Version 1.2 ` Tests / CI ROLLING UPDATES with ZERO DOWNTIME
  • 42. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Deploy new version and wait until it’s ready… Version 1 Version 1 V1.2 Health Check: readiness probe e.g. tcp, http, script V1
  • 43. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Each container/pod is updated one by one Version 1.2 50% Version 1 V1 V1.2
  • 44. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Each container/pod is updated one by one Version 1.2Version 1.2Version 1.2 100% Use Case • Horizontally scaled • Backward compatible API/data • Microservices Cons • Require backward compatible APIs/data • Resource overhead Pros • Zero downtime • Reduced risk, gradual rollout w/health checks • Ready for rollback
  • 45. BLUE / GREEN DEPLOYMENT
  • 46. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 BLUE / GREEN DEPLOYMENT Route BLUE
  • 47. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 BLUE / GREEN DEPLOYMENT Version 1.2 BLUE GREEN
  • 48. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Tests / CI BLUE / GREEN DEPLOYMENT Version 1.2 BLUE GREEN
  • 49. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 Version 1.2 BLUE / GREEN DEPLOYMENT Route Version 1.2 BLUE GREEN
  • 50. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1 BLUE / GREEN DEPLOYMENT Rollback Route Version 1.2 BLUE GREEN Use Case • Self-contained micro services (data) Cons • Resource overhead • Data synchronization Pros • Low risk, never change production • No downtime • Production like testing • Rollback
  • 52. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co ”only about 1/3 of ideas improve the metrics 
 they were designed to improve.”
 Ronny Kohavi, Microsoft (Amazon) MICROSERVICES RAPID INNNOVATION & EXPERIMENTATION
  • 53. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co CONTINUOUS FEEDBACK LOOP
  • 54. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co A/B TESTING USING CANARY DEPLOYMENTS
  • 55. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1.2Version 1 100% Tests / CI Version 1.2 Route 25% Conversion Rate ?! Conversion Rate CANARY DEPLOYMENTS
  • 56. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co 50% 50% Version 1.2Version 1 Route Version 1.2 25% Conversion Rate 30% Conversion Rate CANARY DEPLOYMENTS
  • 57. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co 25% Conversion Rate 100% Version 1 Version 1.2 Route Version 1.2 30% Conversion Rate CANARY DEPLOYMENTS
  • 58. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Version 1.2Version 1 100% Route Rollback 25% Conversion Rate 20% Conversion Rate CANARY DEPLOYMENTS
  • 59. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Network isolation API & Platform access Federated clusters Storage {} CI/CD Monitoring & Logging ImagesBuilds Container hostRegistry SECURING YOUR CONTAINER ENVIRONMENT
  • 61. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Network Namespace 
 provides resource isolation NETWORK ISOLATION Multi-Environment Multi-Tenant
  • 62. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co NETWORK POLICY example: 
 all pods in namespace ‘project-a’ allow traffic 
 from any other pods in the same namespace.”
  • 63. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Kubernetes 
 Logical Network Model NETWORK SECURITY • Kubernetes uses a flat SDN model • All pods get IP from same CIDR • And live on same logical network • Assumes all nodes communicate
 Traditional 
 Physical Network Model • Each layer represents a Zone with
 increased trust - DMZ > App > DB,
 interzone flow generally one direction • Intrazone traffic generally unrestricted
  • 64. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co NETWORK SECURITY MODELS Co-Existence Approaches One Cluster Multiple Zones Kubernete Cluster Physical Compute 
 isolation based on 
 Network Zones Kubernete Cluster One Cluster Per Zone Kubernete Cluster B Kubernete Cluster A Kubernetes Cluster B C D https://blog.openshift.com/openshift-and-network-security-zones-coexistence-approaches/
  • 66. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co KUBERNETES MONITORING CONSIDERATIONS Kubernetes* Container* Host Cluster services, services, pods, 
 deployments metrics Container native metrics Traditional resource metrics - cpu, memory, network, storage prometheus + grafana kubernetes-state-metrics probes Stack Metrics Tool node-exporter kuberlet:cAdvisor Application Distributed applications - traditional app metrics - service discovery - distributed tracing prometheus + grafana jaeger tracing istio
  • 67. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Aggregate platform and application log access via Kibana + Elasticsearch LOGGING
  • 69. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Local Storage Quota Security Context Constraints STORAGE SECURITY Sometimes we can also have storage isolation requirements: 
 pods in a network zone must use different storage endpoints 
 than pods in other network zones. We can create one storage class per storage endpoint and 
 then control which storage class(es) a project can use
  • 70. API & PLATFORM ACCESS
  • 71. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Authentication via OAuth tokens and SSL certificate Authorization via Policy Engine checks User/Group Defined Roles API & PLATFORM ACCESS
  • 73. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Amazon East OpenStack FEDERATED CLUSTERS Roles & access management (in-dev)
  • 75. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Monitoring & Metrics -prometheus (logs) -grafana (visual) Access Control & usage policies -mixr (policy decisions) Encryption & Auth -citadel -service 2 service -user auth Traffic routing - pilot - circuit breaker - a/b testing - traffic mirroring Fault injections -envoy corner cases: abort & delays SERVICE MESH
  • 76. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co OPERATORS
  • 77. Chris Van Tuin Chief Technologist, NA West / Silicon Valley cvantuin@redhat.co Deployment Frequency Lead Time Deployment
 Failure Rate Mean Time to Recover 99.999 Service Availability DEVSECOPS METRICS Compliance Score
  • 78. THANK YOU linkedin: Chris Van Tuin email: cvantuin@redhat.com twitter: @chrisvantuin