October DevOps Meetup


Details
Talk 0
Goodbye, DB Passwords: Vibe-Coding a Rust GUI for CloudSQL Auth Proxy
by Petr Macháček
DevOps Engineer from Rohlik
If you're still juggling database passwords and user accounts manually, you're living in dark ages. We were, and the operational overhead was killing us. Our escape route? GCP's elegant CloudSQL Auth Proxy, which makes database passwords obsolete by managing access through centralized IAM groups instead of individual user accounts. While the proxy itself is a game-changer for security and management, its command-line interface left us during testing wanting more. So, inspired by the age of AI assistants, we vibe-coded a solution: a sleek, multi-platform GUI built with Rust and Tauri to make managing proxy connections trivial. What started as a small internal tool quickly became an unexpectedly deep dive into native app development. This talk is the story of how we modernized our database access, the lessons learned when DevOps engineers pick up Rust, and a live demo of the open-source tool we built. Come see how to secure your databases and empower your developers at the same time.
Talk 1
The Biggest Openshift Cluster
by Štěpán David
DevOps Engineer, Fortuna
A topic so vast, even our monitoring dashboards need a map. This cluster isn’t just big, it’s FEG-normous. Whether you're scaling pods or just trying to find the node that went rogue, FEG is where DevOps dreams meet reality... and occasionally, a reboot.
Talk 2
The archetypes of the attackers
By Bogomil Shopov
Senior Technical Product Manager at Tricentis
Modern applications are probed, scanned, and attacked every day, making cybersecurity a constant and evolving challenge.
Traditional threat modeling alone cannot fully prepare us to defend effectively, we must also study attackers themselves—their archetypes, motivations, and evolving tactics.
This talk examines the full spectrum of adversaries: from insiders with access, to profit-motivated cybercriminals, up to nation-state groups. They exploit everything from human error to advanced persistent techniques. Studying who is attacking us, why, and how they operate sharpens organizational focus, strengthens defenses, and empowers strategies that protect both assets and trust.
-----
archetype
noun [ C ]
a typical example of something, or the original model of something from which others are copied.

October DevOps Meetup