HashiCorp Lightning Talks!


Details
Hi everyone! Join us for the next NYC HUG on Wednesday, October 16th. We have an amazing roster of speakers to host our first round of lightning talks. Check them out below!
Agenda:
*** 6:00pm - Arrivals, food & beverages, networking
*** 6:20pm - Aidan Feldman, Technology Transformation Services, "The Power of Shared Infrastructure"
The traditional method of managing infrastructure behind was slow and error-prone. By moving to continuously-deployed infrastructure as code (with Terraform), we cut turnaround time for changes from days to minutes, reduced errors, and increased transparency.
*** 6:35pm - Andrew Glen-Young, Datadog, "Datadog manages SSH access for thousands of nodes using Hashicorp Vault"
Datadog manages large fleets of machines across multiple cloud providers. Despite modern automation tooling sometimes you really need to SSH to a node. This talk will cover how Datadog uses HashiCorp Vault to manage SSH certificate authentication across their network and how it works.
*** 6:50pm - Nathaniel Ritholtz, IDT Corporation, "Bootstrapping ECS Services with a HashiCorp Stack"
Architecting IDT’s self-service approach to configuration with Terraform, Consul, Vault, and more.
*** 7:05pm - J.D. Hollis, The Consulting CTO, "Automated Deployment Across Multiple AWS Accounts"
JD will discuss building fully automated deployment pipelines across multiple AWS accounts for services that make heavy use of AWS resources. He will also cover developer tooling to make it easier to work on multiple instances of a service within a single AWS account.
*** 7:20pm - Pato Arvizu, ASAPP, "Storing Vault secrets in source control safely using Terraform and KMS"
Vault solves a great deal of security and scale problems by allowing service owners to bring secrets into the boundary of their ownership. More importantly, it solves the "first secret problem" for applications, since it can make services authenticate themselves with just their identity. But where is the source of truth for these secrets? Keeping them in a password manager or in an actual vault is not very disaster-recovery-friendly. By combining Vault, Terraform, and a dash of KMS, we can securely keep them in source control and apply them atomically with just one command.
*** 7:35pm - Closing remarks & Q&A, what's next for the NYC HUG, networking
-----
We look forward to seeing you.
Thank you for hosting us, Bit.ly!
Interested in getting involved with this chapter? We are always looking for venues and speakers. Reach out to us at hugs@hashicorp.com.

Sponsors
HashiCorp Lightning Talks!