Archive
Thank you to each of you for making Kubernetes Community Days Zürich a resounding success. Our sincere thanks also go to our sponsors. Your support played a crucial role in the success of this event.
Watch on YouTube
Podcast
Discover the Kubernetes Universe at Kubernetes Community Days Zürich 2023, powered by b-nova. Tune in to the podcast episode where industry leaders and developers shape the future of container orchestration.
Discover our podcastKubernetes Community Day Zürich 2023
Thomas Graf
Cilium Mesh - How to Connect Kubernetes with Legacy VM and Server Infrastructure
Kubernetes has taken the industry by storm and has become the standard platform for new workloads. It is ideal for containerized workloads. However, a majority of workloads will remain where they are for another while, running on VMs or physical servers in either public or private cloud. How do we connect the new world of Kubernetes consisting of services, identities and CI/CD with the existing world of VMs, servers, and existing network infrastructure? In this session, we will look into the brand new Cilium Mesh layer. Cilium Mesh is a new universal networking layer to connect workloads and machines across cloud, on-prem, and edge. It consists of a Kubernetes networking component (CNI), a multi-cluster connectivity plane (Cluster Mesh), and a transit gateway to connect with VMs and servers in existing networks.Download PDFMax Körbächer
The state of Green Washing - or how to build sustainable systems with Kubernetes
Kubernetes is not the answer to everything, but where it is, it is a great companion to designing systems and putting environmental sustainability into your mind. But being eco-friendly invites people to greenwash their intentions, so let us start the story from the end and clarify some myths. Saving money on infrastructure may reduce your Carbon impact, but we can do more. In this presentation, we will look at what is currently possible, what are the recent developments and what we need in the future to create a carbon-aware system landscape. You will learn how designing system architectures for eco-friendliness, will have a sustainable impact, in many ways.Download PDFAdrian Reber
Forensic container checkpointing and analysis
With the introduction of "Forensic Container Checkpointing" in Kubernetes 1.25 it is possible to checkpoint containers. The ability to checkpoint containers opens up many new use cases. Containers can be migrated without loosing the state of the container, fast startup from existing checkpoints, using spot instances more effective. The primary use case, based on the title of the Kubernetes enhancement proposal, is the forensic analysis of the checkpointed containers. In this session I want to introduce the different possible use cases of "Forensic Container Checkpointing" with a focus on how to perform forensic analysis on the checkpointed containers. The presented use cases and especially the forensic analysis will be done as a live demo giving the audience a hands on experience.Download PDFRicardo Rocha
When Things Get Big: Scaling Cloud Native Workloads and Software Distribution
The move to containers has significantly improved the way services and workloads are deployed and managed in large scale computing infrastructures. It also brought new challenges that can be handled with intrusive changes in the workflows or hidden in the stack. This session will focus on one of those challenges and go in detail on how you can efficiently distribute very large software packages across thousands of nodes for your batch, HPC or ML workloads.Download PDFFilip Nicolic
Demystifying eBPF - eBPF Firewall from scratch
eBPF has emerged as a powerful technology for extending the Linux kernel, enabling users to safely and efficiently run custom code within the kernel. One of the most popular applications of eBPF is in the realm of networking, where it is used to implement high-performance firewalls and other security-related functionality. eBPF is becoming increasingly popular in the cloud-native ecosystem, with many CNCF projects utilizing its capabilities, including Cilium, Calico, and Pixie to name a few. This talk aims to demystify eBPF and demonstrate how it can be used to build a firewall from scratch. By highlighting core concepts of eBPF, attendees can better understand how it is being used in real-world scenarios, by various CNCF projects and how it can be applied to their own use cases.Download PDFLisa Falco
Responsible AI: The Key to Ethical, Safe and Inclusive Software Development
The development of artificial intelligence (AI) has the potential to revolutionize many aspects of society, but it also poses significant ethical and societal challenges. Responsible AI refers to the development and use of AI in a manner that is ethical, transparent, and accountable, and is crucial to ensure that the potential benefits of AI are realized while minimizing negative consequences. In her talk, Lisa Falco will present frameworks and advice to develop ethical and interpretable AI. The frameworks are based on a long experience of developing machine learning applications within the medically regulated field. They cover multiple layers of the development process - the data, the model, and the human interaction. These are hands-on frameworks that clearly indicate which considerations are needed at every phase of the implementation and distributes roles and responsibilities. The principles and practices of responsible AI can be extended to the development of software in general. By placing a focus on ethics, transparency, and accountability, software development can be done in a way that is more inclusive and beneficial for society, and that minimizes negative consequences. Additionally, considering issues such as fairness, bias, privacy, security, and transparency in the software development process can help ensure that the software is safe and secure to use.Download PDFAnnie Talvasto
What Anime Taught Me About K8s & Tech Careers
From One piece and Naruto to Neon Genesis Evangelion and DragonBall, Japanese animation is a cultural phenomena. This session will take you through both the landscape of anime and Kubernetes development, with helpful beginner tips to get you started on your cloud native journey. The session will also cover what the hero’s of East blue and Planet 4032-877 can tech us about career development tech world. Importance of perseverance, inclusion & diversity as well as always having a snack at hand - come and learn how anime can your boost you Kubernetes and tech career to next level!Download PDFBill Mulligan
Buzzing Across the Cloud Native Landscape with eBPF
The buzz around eBPF in cloud native is growing quickly and it can be hard to know where to start or how to keep up. In this talk, Bill will trace how he got into eBPF, explore where eBPF fits on the cloud native landscape, and teach others how to dive into the hive of activity around eBPF. People just beginning with eBPF will learn how eBPF makes it possible to have efficient networking, observability without instrumentation, effortless tracing, and real-time security (among other things). Those already familiar with eBPF will get an overview of the eBPF landscape and learn about many eBPF applications on the cloud native landscape that allow them to harness the power without needing to dive into the bytecode. The audience will walk away with an understanding of the buzz around eBPF and knowledge of tools that may solve some of their problems in networking, observability, and security.Download PDFLena Fuhrimann
Streamlined Troubleshooting in Kubernetes
In this talk, we will highlight different methods to make debugging and troubleshooting in Kubernetes more streamlined and organized. People tend to mostly make the same mistakes and run into errors others have already dealt with. There are different methodologies and tools that help us to benefit from that and to more easily find where the problem lies when something goes wrong by adhering to clear solving strategies and automation tools. We will go through some of these techniques and see the respective open source tools in action. Live coding included!Download PDFJulius Volz
Native Histograms in Prometheus: A Better Histogram Experience for Everyone
Histograms are crucial for anyone who wants to track service latency and other numeric value distributions in Prometheus. However, the existing "legacy" histograms in Prometheus come with a number of painful drawbacks: they require manual and static bucket configuration, generate a separate time series for each configured histogram bucket, and thus require you to make hard tradeoffs between a histogram's resolution and cost. In this talk, Prometheus co-founder Julius Volz will present a new "native" histogram metric type that is currently being added to Prometheus. These native histograms allow you to track value distributions in higher detail at a significantly lower storage and processing cost, while also reducing the manual bucket configuration effort. Julius will explain how native histograms work, how they achieve these key benefits, and how you can use them in Prometheus today in an experimental fashion.Download PDFReto Lehmann
Tales of Serverless - a story about building scalable applications
In this talk Reto is going to tell a story about building Scalable Serverless cloud-native Applications. Using the magic of the Knative serverless platform, you are going to experience applications that are going to appear and disappear. We'll wander the foreign lands of the Serverless ecosystem, guided by fairies, conquering mythical beings and unimaginable challenges. Together, we'll get to know the mechanics and inner workings of this magical world. Hopefully, by the end of this talk, we'll be able to lift the spell and enchantments to see and understand the mechanics behind the curtains. Whether you are a brave developer-knight, a mighty operator-king or simply an interested serverless-bard, this presentation should not be scaled-to-zero.Download PDFPriya Wadhwa
Securing your Software Supply Chain on Kubernetes with Sigstore
How secure are the images running in your Kubernetes cluster right now? If you don’t know, then this talk is for you! In this talk, Priya Wadhwa will discuss how to determine the composition and vulnerability risk of your images. She’ll cover how to secure your images with easy container signing through Sigstore, and how to enforce policies against your images in your Kubernetes cluster with the Sigstore policy-controller. This talk will demo how to set this up while diving in to the SLSA principles of software supply chain security and how they can be applied to secure a build pipeline.Download PDFTimo Salm
Closing the Developer Experience Gap of your Container Platforms
Due to the lack of user focus, many container platforms have a big developer experience gap. That's not only because building a Kubernetes platform is complex but also because deploying applications on Kubernetes requires expertise in many Container and Kubernetes concepts. And once developers learn them, they still must spend a lot of time maintaining containers, writing YAML templates, and orchestrating many moving Kubernetes parts. Like in the days when the Waterfall model was the standard for software development, developers today shouldn’t have to care where and how their applications run and focus on adding business value by implementing new features. In this session, we will explore some of the powerful open-source technologies available within the Kubernetes ecosystem to close the developer experience gap like Backstage, Cloud Native Buildpacks, Knative, and Cartographer.Download PDFSebastian Kister
Process is what naturally follows - a cloud platform's guide on people-first transformation
The fastest way to change the world is by making it a business case. Let's talk about real transformation hands-on, about time-to-market and the priorities when it's necessary to change cultural paradigms.Raphaël Pinson
Bridging Dev and Ops with eBPF: Extending Observability Upwards and Downwards
eBPF (extended Berkeley Packet Filter) is a powerful and versatile technology that can be used to extend observability in Linux systems. In this talk, we will explore how eBPF can be used to bridge the gap between dev and ops by providing a deeper understanding of the kernel and OS internals as well as the applications running on top. We will discuss how eBPF can be used to extend observability downwards by enabling access to low-level system information and how it can be used to extend observability upwards by providing application-level tracing capabilities.Download PDFLiz Rice
eBPF for Security
eBPF is a ground-breaking technology that allows us to customize the behavior of the operating system’s kernel. In this talk you’ll get an introduction to how eBPF works, and then we’ll dive into how it’s being used for a new generation of security tools. You’ll see how the Cilium team are using their in-depth knowledge of eBPF and the Linux kernel to create Tetragon, a powerful open source solution for security observability and enforcement.Download PDF
Thanks to our sponsors for KCD 2023
We would like to extend a special thank you to our sponsors for their support and commitment to the community. We couldn't do it without them! If you're interested in becoming a next year sponsor, please contact hello@kcdzurich.ch
Photo gallery
1/ 46