Henrik Rexed

Henrik is a Cloud Native Advocate at Dynatrace and a CNCF Ambassador . Prior to Dynatrace, Henrik has worked more than 15 years, as Performance Engineer. Henrik Rexed Is Also one of the Organizer of the conferences named WOPR, KCD Austria and the owner of the Youtube Channel IsitObservable.


Job Title & Company (eg. Developer Advocate at xyz)

CloudNative Advocate , Cncf Ambassador


Sessions

03-30
17:10
30min
The Service Mesh Wars: A New Hope for Kubernetes
Henrik Rexed

In a Kubernetes galaxy not so far away, operators face a crucial choice for managing and securing their networks: the simplicity of an Ingress controller or the power of a Service Mesh. Service Meshes promise resilient deployments with automatic retries, TLS encryption, traffic management, observability, and more. But not all meshes are created equal.

From Istio’s scalability, Linkerd’s simplicity, and Cilium’s eBPF innovation to Kuma’s multi-cluster versatility and Ambassador’s edge connectivity, each offers unique strengths. With options like sidecars or sidecar-less setups, choosing the right solution becomes a battle of priorities.

Join Henrik from Is It Observable? as he unveils a benchmark comparing these Service Mesh contenders across critical dimensions: proxy type, feature set, user experience, observability, and performance. By the end, you'll gain clarity on which Service Mesh aligns with your Kubernetes needs. May the Mesh be with you!

The Nash
03-31
15:10
30min
The Kubernetes Guardians: A Deep Dive Into Your Security Avengers
Ben Hirschberg, Henrik Rexed

In the fight to secure Kubernetes, we’re assembling a team of "Security Avengers" to defend your clusters from modern threats. Among the CNCF’s eBPF-based tools—Falco, Tetragon, KubeArmor, and Kubescape—each brings unique strengths, much like the Avengers. Despite their shared mission, their distinct features, architectures, and resource impacts make selecting the right "hero" a strategic decision.

This session unveils benchmarking results to help you choose the best fit for your Kubernetes security needs. We’ll explore key questions:

  • What specialized features does each tool offer?
  • How complex are setup and maintenance?
  • How effectively do they detect and defend against attacks?
  • What performance impact do they have?
    Join us to compare these Kubernetes guardians, evaluate their real-world pros and cons, and discover the "Security Avenger" that aligns with your cluster’s defense strategy.
The Nash