Cloud Native Aachen Meetup, October 2025
Talks
Our first talk by Jörg Aelken and Faseela K is titled “Building Autonomous Telecom Networks with CNCF and OpenTelemetry”. They will share insights on how observability and telemetry enable automation in highly distributed telecom networks. The talk will give a practical look at OpenTelemetry and how CNCF projects are driving autonomous network operations.
Our second talk by Benjamin Koltermann is “Bypassing Kubernetes Security”.
Benjamin will review Kubernetes security concepts and show how tools like Falco and Istio help to secure clusters. He will also highlight where misconfigurations or design flaws can still create vulnerabilities, offering practical lessons on common security pitfalls.
Venue Information
We are pleased that USU GmbH will host the October edition of Cloud Native Aachen at:
📍 USU GmbH
Charlottenburger Allee 60
52068 Aachen
There is a large parking lot available.
For organizational purposes, please register through the event page. No detailed compliance information is required, but your name should be included when signing up.
-
6:30 PM CET
Open Doors
in-personWhile the event will start from 7pm, we are looking forward to welcoming you all in starting from 6:30pm!
-
7:00 PM CET
Welcome Words
in-personWe will say hello, introduce ourselves as the organisers to new joiners, and kick off this amazing evening of food and talks.
-
7:15 PM CET
First Talk: "Building Autonomous Telecom Networks with CNCF and OpenTelemetry"
in-personTelecom networks are becoming more cloud-native, with applications running in highly distributed and disaggregated environments. This shift brings both exciting opportunities and new challenges—especially when it comes to managing and automating these complex systems. In this talk, we’ll look at why observability and telemetry are so critical for enabling autonomous networks, and how the CNCF ecosystem provides the right tools to make it happen. We’ll dive into the role of OpenTelemetry and walk through a real-world example that shows how these concepts can be applied in practice.
Whether you’re curious about telecom, observability, or simply how cloud-native technologies are being used beyond traditional IT, this session will give you practical insights into an industry that is rapidly evolving with open source.
-
7:45 PM CET
Food & Drinks
in-personFood and drinks for everyone, thanks to our amazing sponsors!
-
8:15 PM CET
Second Talk: "Bypassing Kubernetes Security"
in-personWhile most security researchers will have heard of Kubernetes, few know how Kubernetes really works. The security of Kubernetes involves a lot of complexity due to the enormous amount of tooling that can be used to secure a Kubernetes cluster.
During security reviews, the security gaps that these tools do not close quickly become apparent. Either because of a faulty configuration or because there are design flaws in the tools.
In this talk, the security model of Kubernetes will be reviewed. Various Kubernetes security tools are shown in action, demonstrating their ability to prevent attacks, but also whether and how they can be bypassed. We will look at Falco, Istio and Kubernetes built-in mechanisms to examine the most common mistakes.
-
8:45 PM CET
Food & Drinks
in-personJoin us in wrapping up the evening with some more networking over food and drinks.