navigation

AWS Modernization with Calico

Calico on EKS

Project Calicois a network policy engine for Kubernetes. With Calico network policy enforcement, you can implement network segmentation and tenant isolation. This is useful in multi-tenant environments where you must isolate tenants from each other or when you want to create separate environments for development, staging, and production. Network policies are similar to AWS security groups in that you can create network ingress and egress rules. Instead of assigning instances to a security group, you assign network policies to pods using pod selectors and labels.

Learning objectives

During this workshop, we expect attendees to have hands-on experience with Kubernetes security and observability for EKS deployment. You will learn how to design, deploy, and observe security and networking policies in an EKS environment using Calico. This ~90-minute hands-on lab provides you with your own provisioned Calico Cloud environment which can be connected with your EKS cluster or AWS EC2 environment running self-managed Kubernetes environment to provide more complete knowledge on how to implement and use:

  • Access controls
  • DNS policy
  • Dynamic Service Graph
  • Compliance and reporting
  • Observability and troubleshooting
  • Alerting on security incidents
  • Dynamic packet capture

Intended audience

This workshop addresses the needs of DevOps, site reliability engineers (SREs), security and cloud architects by implementing Kubernetes-native networking, security and observability for your workloads on Amazon EKS.

This workshop is intended to be200-300level. It is assumed that you are familiar with the following concepts:

  • Kubernetes constructs at a base level
  • Basic networking in Kubernetes
  • Base understanding of how CNI’s work in Kubernetes
  • Kubernetes-native security policies and monitoring
  • Kubernetes-native observability and troubleshooting

Workshop Breakdown

The workshop modules are structured to provide a natural flow helping to configure and solve various security, observability and troubleshooting use cases for your Kubernetes applications and services.

Expected duration to complete the workshop is 90-120 mins.

Module 1 - Deploy and configure demo application

Deploy and configure demo application. Secure East-West and North-South traffic for demo application, and protect Kubernetes hosts ports using Calico policies.

Module 2 - Observe, monitor and troubleshoot the application

Leverage Calico observability and troubleshooting tools to reduce mean time to repair (MTTR) for your Kubernetes applications and services.

Module 3 - Use security alerts and dynamic packet capture

Use global alerts to notify security and operations teams about unsanctioned or suspicious activity. Leverage dynamic package capture to collect full packet payload on demand.

Module 4 - Use compliance reports

Generate Compliance reports for regulatory requirements and policy violations.

To learn more about installing Calico on EKS Cluster, please clickhere.

Module 5 - Vulnerability management

Use Calico Cloud image assurance tools to scan images for vulnerabilities and configure admission rules for containers.

To learn more about Image Assurance and Vulnerability Management, please clickhere.