The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for KubeCon + CloudNativeCon North America 2020 - Virtual to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.
Please note: This schedule is automatically displayed in Eastern Standard Time (UTC–05:00). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date." The schedule is subject to change.
This session is lightning talk #2 in a series of 3 and starts at 6:11 of the session recording video.
By accessing this sponsored session, the third party sponsor will receive some of your registration data. This data includes your First Name, Last Name, Title, Company, Address, Email, Standard Demographics Questions (I.e. Company Size, Job Function, Industry), and details about the sponsored content you interacted with. If you choose to access sponsored sessions, you are explicitly consenting to receipt and use of such data by the third-party recipients, which will be subject to their own privacy policies.
Kubernetes helps accelerate application modernization. When adopting K8s, you generate a lot of data that must be protected. This includes K8s persistent data, plus data on laptops, source-code control systems, and CI/CD systems. Protecting, recovering, and migrating your data and applications requires agility and deep awareness of your application data across on-prem and cloud locations.
You can take an application-centric approach focused on capturing the entire K8s application (manifests, persistent data, dependent resources) and/or an infrastructure-centric approach focused on leveraging next gen software-defined storage that is integrated into K8s via CSI. Both are valid depending on what you are trying to achieve.
In this session, we’ll cover: o What data to protect in Kubernetes o What data to protect outside Kubernetes (e.g., etcd) o How to adopt a holistic data protection approach