How to Supercharge OpenShift with Cilium

On Thursday the 30th of March HCS Company, Isovalent and Red Hat will host a hands-on workshop about Cilium. Discover how combining OpenShift and Cilium can enhance your application networking, observability, and security. Learn from experts in the field, and gain insights into the latest trends in container orchestration and security. Plus, you'll have the opportunity to participate in hands-on workshops, allowing you to gain practical experience with Cilium. Don't miss out on this opportunity to supercharge your OpenShift experience with Cilium!
Beeldmateriaal workshop Cilium


Agenda workshop

13.00-13:30 Registration 

13.30-14:00 Introduction by HCS Company - Service Mesh - The (air) traffic controller of your application
Service Meshes are very popular currently. I know what your thinking… I never used a Service Mesh before so why do I need one now? In this talk you will become familiar why Service Meshes exist and what they can do for your application. Implementing zero trust principles or are you more interested in advanced traffic flows? This and many more features will be spoken about. Are you joining me to find the possibilities for your application? 

14.00-14.30 Introduction by Red Hat - Utilizing modern application delivery patterns with service mesh and GitOps
In the past there were careful planned release days, which happened once every quarter or year. Now that the world is speeding up and IT has to move just as quick, we need new ways to release our applications. Nowadays your application will be deployed daily, maybe even more than once an hour. And this should be done without having any hiccups with your production system. Utilizing technology such as service mesh, combined with GitOps, can help you create such a process. We'd like to take you through what's needed to get going and illustrate the benefits in a demo.

14.30-14:45 Break 

14.45-15.15 Introduction by Isovalent - Network and Runtime Security with Cilium and Tetragon 
Cilium is the next generation, eBPF powered open-source Cloud Native Networking solution, providing security, observability, scalability, and superior performance. Cilium is an incubating project under CNCF and the leading CNI for Kubernetes.

In this session we will introduce the fundamentals of Cilium Network Policies and the basics of application-aware and Identity-based Security. We will discuss the default-allow and default-deny approaches and visualize the corresponding ingress and egress connections.

Using the Network Policy Editor we will be able to demonstrate how a Cilium Network Policy looks like and what they mean on a given Kubernetes cluster.

Additionally, we will walk through different examples and demonstrate how application traffic can be observed with Hubble and show how you can use the Network Policy Editor to apply new Cilium Network Policies for your workloads.

Finally, we’ll demonstrate how Tetragon provides eBPF-based transparent security observability combined with real-time runtime enforcement.

15:15-16:00 Lab 1: Getting Started with Cilium 
In this lab, we provide you a fully fledged Cilium installation on a small cluster, together with a few challenges to solve. See yourself how Cilium works, and how it can help you securing your moon-sized battlestation in a “Star Wars”-inspired challenge.

16:00-16:15 Break 

16:15-17:00 Lab 2: Security Observability with eBPF and Cilium Tetragon 
Cilium Tetragon is an open source Security Observability and Runtime Enforcement tool from the makers of Cilium. It captures different process and network event types through a user-supplied configuration to enable security observability on arbitrary hook points in the kernel; then translates these events into actionable signals for a Security Team.

17.00 - 17.30 Closing session

17.30 - 18.30 Networking & drinks

Apply for the hands on workshop

Hands-on workshop

Johan Cruijff ArenA
Johan Cruijff Boulevard 1
1100 DL Amsterdam

13.00 - 18.30 uur

Available for 75 persons. 

For this workshop you need to bring your own laptop.