Henrik Rexed
Henrik is a Cloud Native Advocate at Dynatrace and a CNCF Ambassador . Prior to Dynatrace, Henrik has worked more than 15 years, as Performance Engineer. Henrik Rexed Is Also one of the Organizer of the conferences named WOPR, KCD Austria and the owner of the Youtube Channel IsitObservable.
CloudNative Advocate , Cncf Ambassador
Sessions
In a Kubernetes galaxy not so far away, operators face a crucial choice for managing and securing their networks: the simplicity of an Ingress controller or the power of a Service Mesh. Service Meshes promise resilient deployments with automatic retries, TLS encryption, traffic management, observability, and more. But not all meshes are created equal.
From Istio’s scalability, Linkerd’s simplicity, and Cilium’s eBPF innovation to Kuma’s multi-cluster versatility and Ambassador’s edge connectivity, each offers unique strengths. With options like sidecars or sidecar-less setups, choosing the right solution becomes a battle of priorities.
Join Henrik from Is It Observable? as he unveils a benchmark comparing these Service Mesh contenders across critical dimensions: proxy type, feature set, user experience, observability, and performance. By the end, you'll gain clarity on which Service Mesh aligns with your Kubernetes needs. May the Mesh be with you!
In the fight to secure Kubernetes, we’re assembling a team of "Security Avengers" to defend your clusters from modern threats. Among the CNCF’s eBPF-based tools—Falco, Tetragon, KubeArmor, and Kubescape—each brings unique strengths, much like the Avengers. Despite their shared mission, their distinct features, architectures, and resource impacts make selecting the right "hero" a strategic decision.
This session unveils benchmarking results to help you choose the best fit for your Kubernetes security needs. We’ll explore key questions:
- What specialized features does each tool offer?
- How complex are setup and maintenance?
- How effectively do they detect and defend against attacks?
- What performance impact do they have?
Join us to compare these Kubernetes guardians, evaluate their real-world pros and cons, and discover the "Security Avenger" that aligns with your cluster’s defense strategy.