8:00 - 9:00
Breakfast & Partner Showcase
9:00 - 10:00
Keynote: Kubernetes and Nomad. The Best of Both Worlds
In this session you'll learn how Kubernetes and Nomad complement each other and provide a solid foundation for running diverse workloads across multiple computing environments.
10:00 - 10:15
Lightning Talk: Day 2 Operations with Containers: Myth vs Reality
Containers have been hailed as an easy solution to many problems, from software testing to scaling stateless workloads in production. But anyone can write a deployment tool for a container-based infrastructure, the hard work comes when you get to day 2 and you need to handle the day to day operations and maintenance. Metrics, monitoring, logs, debugging, backups and upgrades are all considerations that operators need to take into account before they invest in a solution. Through lessons learned from direct experience in operations, as well as feedback from open source DC/OS community members, this talk will pull back the curtain to show the internals of how to handle these day 2 operations. It will also provide a checklist of things you want make sure are included when you build a plan for building and maintaining your infrastructure (hint: Logging should never be an afterthought).
10:15 - 10:30
Morning Break & Partner Showcase
10:30 - 11:15
3 Steps to Reducing Costs in Your Containerized World
Congratulations, you are killing it with your container deployment. Application are faster and more stable with repeatable deploy cycles. You reined in the the single purpose server proliferation and consolidated them into isolated containers running on cluster of container.
Your business owners are loving the higher feature velocity, and the somewhat lower costs.
But do you know how much your container infrastructure costs, and how well utilized it is? Can you say for certain that your clusters have the right resources mix? Do you know which workloads are the biggest consumers of resources?
In this session, we'll show you the steps to identify inefficient resource allocation, and drive continuous improvement across your environment, leveraging detailed information from SysDig together with analysis from CloudHealth. We will demonstrate how to use both SysDig Cloud and SysDig open source to reduce costs and improve utilization and highlight best practices from leading organizations.
11:15 - 12:00
Securing Your Containerized Environment with Falco
By now, most people should be well aware of Sysdig Falco, the open source, behavioral security monitoring tool from Sysdig. In this presentation, I will walk through the simple process of deploying Falco across your Kubernetes fleet, and demo some of the unique insight that you can gain with behavioral monitoring of the containers in your cluster. I'll walk through Yahoo's use cases around visibility and compliance, as well as discuss some of the modifications we made to Falco's rules to meet our needs.
12:00 - 12:45
Lunch & Partner Showcase
12:45 - 4:45
The Container Troubleshooting Workshop
This is the workshop you need to troubleshoot containers like a boss.
Join us for a 4-hour use-case driven only training session on container visibility, troubleshooting and run-time security monitoring with the Sysdig open source tools (Sysdig and Falco) and learn how containers work under the hood.
12:45 - 1:45
Workshop: Visibility and Troubleshooting
Learn how to debug a 502 error on a containerized LB with HAproxy, a Python webapp crashing after working for 5 minutes or where did you configure wrong credentials in a microservices app
1:45 - 2:45
Workshop: Analyzing Performance and Bottlenecks
Compare yourself the performance of different web servers running in containers, use system call tracing to find the bottleneck in your application or learn how to use spectrograms (flame graphs) to visualize system call performance.
2:45 - 3:45
Workshop: Debugging Kubernetes
Dive into Kubernetes internals using reverse engineering: why that Kubernetes service is valid but doesn't work? How does service resolution work? Or how Kubernetes instructs Docker Engine.
3:45 - 4:45
Workshop: Security Run-Time Monitoring and Forensics
Last but not least, all these previous lessons can also be applied for security, not only doing forensics on an attack attempt. Sysdig Falco can alert on containers with anomalous behavior.