Mastering Istio 2.0: The Ambient Deep Dive

Build your first complex Service Mesh with zero-trust security

June 18 – 19, 2026 | Berlin

EARLY BIRD ENDS IN:

Revolutionise your cloud-native approach
by eliminating the need to manage service-to-service communication,
within a distributed software system

Traffic management, security, and observability
are all taken care of

Enhance your defiances through istio’s distributed
zero-trust security

Take advantage of the open source platform neutrality
and enable a variety of deployments,
like on-premise, cloud-hosted

Kubernetes Training für Fortgeschrittene

Dieses Devops Training geht über die Grundlagen hinaus: Es vertieft Ihr Wissen und Verständnis komplexe Container-Orchestrierungsprobleme zu lösen und moderne Cloud-Anwendungen erfolgreich zu betreiben.

Im K8s-Camp wird Kubernetes als Programmierschnittstelle und als Rechenzentrum betrachtet. Sie schauen sich fortgeschrittene Anwendungsfälle an und lernen alles zu Optimierung und Automatisierung.

Nächster Termin:
14. – 16. Oktober 2024, München
Frühbucherrabatt: Bis zum 5. September anmelden und bis zu 350 € sparen!
Teamrabatt: Min. 3 Kolleg:innen anmelden und 100 € zusätzlich sparen!
25
Years of IT Conferences
10
Years of DevOps Conferences
6
Editions
worldwide
7000
+
Satisfied
Participants

5 Reasons To Join The Bootcamp

Ditch the Sidecar Bloat
Learn to implement the new Ambient architecture to get full mesh control
check icon
check icon
Zero-Trust by Default
You’ll implement mTLS across your entire mesh, enforce "deny-all" policies
Real-World Traffic Control
ou’ll master complex routing—from Canary releases and A/B testing to egress filtering
check icon
check icon
Battle-Tested Troubleshooting
We spend time on error analysis, using Kiali, Jaeger, and Prometheus
Ready-to-Use Tooling
You get the full stack of Kubernetes/Istio scripts, code samples, and a curated Istio "Cheat Sheet
check icon

Participated in the Past

Want to Learn More About DevOps?
Subscribe to our Newsletter!

Audience & Requirements

  • Designed for developers, architects, and security engineers managing microservices with high security demands
  • Ideal for teams operating in Kubernetes clusters who need to move beyond basic networking to zero-trust security
  • Prior experience with Kubernetes is helpful to get the most out of the hands-on Istio Ambient implementation
  • Bring your technical blockers: we’ll cover real-world traffic management, mTLS, and auth policies
  • Come ready to build: you’ll receive slides, code samples, and scripts to deploy your own mesh live

Bootcamp Overview

This bootcamp provides a deep dive into the security and traffic routing capabilities of Istio Ambient—the next-generation service mesh architecture that eliminates sidecar proxies entirely. You will begin by exploring the shift from classic Istio to the Ambient mesh, learning how to secure service-to-service communication without the traditional architectural overhead.

Through hands-on implementation, you will secure the entire traffic lifecycle: from TLS termination at the Ingress Gateway to full mTLS mesh encryption and controlled Egress monitoring. You will move beyond basic connectivity to master request-based authorization, JWT-based routing, and zero-trust security policies, backed by rigorous error analysis and debugging techniques for complex distributed environments.

On the second day, you will integrate multiple microservices into a unified service mesh. You will apply concrete Istio rules to solve real-world challenges in tracing, resilience, and observability. By working with best practices for traffic shifting and A/B testing, you will learn how to stabilize distributed applications and prevent common failure modes in production.

By the end of the bootcamp, you will be equipped with the scripts, code samples, and expert cheat sheets needed to deploy and operate Istio Ambient. You will be ready to lead service mesh initiatives that balance high-security requirements with operational simplicity across Kubernetes clusters and virtual machines.

Day 1: Security & Identity

I. Fundamentals

  • Introduction to Service Mesh and Istio Ambient
  • Ambient vs. Classic: Key benefits and architectural shifts
  • Istio Ambient and the Zero-Trust model

II. Ingress Gateway & TLS

  • Implementing Ingress with TLS and mTLS termination
  • Security hardening for entry points
  • Troubleshooting Ingress connectivity

III. Peer & Request Authentication

  • Activating mTLS for the entire mesh
  • Workload coexistence: mTLS and legacy traffic
  • End-user Auth: Preparing JWT, JWKS, and claim-based routing

IV. Authorization & Egress

  • Defining AuthorizationPolicy: Deny-all vs. Explicit Allow
  • Policy testing with Dry Run and best practices
  • Egress Gateway: Controlling access to external services
  • Istiod Certificate and identity management

 

Day 2: Traffic & Operations

IX. Building the Mesh

  • Service configuration and deployment in Kubernetes
  • Core Traffic Rules: Gateway, VirtualService, and DestinationRule
  • Observability: Visualizing the mesh with Kiali, Jaeger, and Grafana

X. Resilience & Metrics

  • Distributed tracing: Tracing on demand and data limiting
  • Performance monitoring with Prometheus metrics
  • Resilience testing: Mesh-level vs. application-level implementations

XI. Advanced Operations

  • A/B Testing: Implementing traffic shifting and mirroring
  • Canary Releasing: Controlled evolution of your services
  • Operational best practices for long-term mesh health

Testimonials

impression card 1
impression card 2
impression card 3

Day 1

Getting a cluster
  • You will be provided with different options to get a cluster in order to participate in all Kubernetes practice labs
  • Every participant will have the option to use a web based workshop cluster which is especially suitable for participants with enterprise managed notebooks
  • A local cluster with minikube or Docker Desktop is a good way for revisiting the workshop labs later on
  • We will also look into various tools that make working with Kubernetes easier
Accessing your cluster
  • Security is important, so no cluster can be accessed without authentication and authorization
  • How that is implemented in Kubernetes lays a good foundation to handle multiple clusters in parallel
Building application images
  • Kubernetes uses container images to provide workload for the cluster
  • You will build your own images using Docker and Dockerfiles
  • We will use these images in the cluster later on to show various important operational aspects
  • Images are distributed using container registries
Fundamental Kubernetes concepts
  • We will understand how Kubernetes is organized using namespaces
  • Our first workload will be a simple pod to avoid unnecessary complexity
  • Important elements of the architecture of Kubernetes like etcd, controller manager, scheduler, api server and kubelet will be visited in detail
  • We will learn how to interact with network applications inside Kubernes
  • … and how to access them from outside the cluster
  • For diagnosis we will run interactive containers inside the cluster
Running your applications
  • Now it is time to run our own applications which is a good opportunity to quickly revisit the basics
  • We use the container image we built earlier and even scale it to multiple relicas which leads to the concept of replica sets
  • Using healthcheck probes we will ensure that our customers will only reach healthy instances
Using Kubernetes resources
  • Kubernetes is API centric and with our freshly acquired understanding of the architecture and building blocks we are well prepared to dive into the Kubernetes API in more detail
  • You will learn how to manage the configuration of your application using YAML manifests and how to work with them

Day 2

Ingress
  • Many APIs and web applications are based on the HTTP protocol. With the Kubernetes ingress concept you will manage the access efficiently
  • With these elements we look into running more complex applications or microbased services
Volumes and configuration
  • Kubernetes provides various ways to handle configuration and secret data
  • We will work with config maps, secrets and how they can be used for pods
Deployments
  • One concept with high abstraction level is the Kubernetes Deployment
  • We will use it to manage multiple versions of our application and to roll out updates without any downtime
Persistence
  • We need to persist our state outside of a pod to preserve it in case of planned updates or even failures
  • We will lean how persistent volumes and persistent volume claims work
  • With storage classes we can provide different kinds of storage in a well defined manner

Trainer

Michael Hofmann

Michael Hofmann is a freelance architect, consultant and developer. He has been gaining project experience for more than 2 decades on the German and international scenes, mainly in the areas of software architecture, Enterprise Java and DevOps. In addition to his project assignments, he is active as a speaker at various conferences or as an author of professional articles and books.

Take your Kubernetes Bootcamp experience to the next level by adding DevOpsCon to your schedule. This conference offers a unique opportunity to expand your knowledge and see how your Kubernetes skills integrate with broader DevOps strategies. By attending, you’ll gain valuable insights, network with industry leaders, and explore cutting-edge tools and methodologies that complement your intensive training. Enhance your learning journey and walk away with a comprehensive understanding that sets you apart in the DevOps field.
 

Enhance your DevOpsCon experience by adding an additional 2-day intensive Kubernetes Bootcamp* to your ticket—an unparalleled opportunity to deepen your expertise while immersed in learning. Gain practical Kubernetes skills that perfectly complement the insights and strategies shared at the conference. This hands-on camp will solidify your understanding and give you the confidence to implement Kubernetes solutions immediately. Maximize your conference experience by joining the camp and walk away with actionable knowledge that sets you apart.

Secure Your Spot

Diese Organisationen lernen bereits mit der entwickler.de Akademie

DevOps-Trainings im Überblick

Voraussetzungen für die Teilnahme am Kubernetes Camp – Advanced ist grundlegendes Verständnis der Kubernetes-Architektur, der wichtigsten Konzepte und der grundlegenden Befehle haben. Vorkenntnisse mit Kubernetes Fundamentals Training oder gleichwertigen Erfahrungen sind von Vorteil, aber nicht zwingend erforderlich. Fehlt Ihnen das noch, dann starten Sie doch mit dem Kubernetes Camp – Basic.

Kontaktformular

Sie haben Fragen?

Rufen Sie uns an oder mailen Sie uns

 
Wir sind Montag – Freitag für Sie da

+49 (0) 30 – 2148066 – 50

[email protected]

 
 
 
Claudia Uhlig
Leiterin entwickler.de Akademie
 
 
 
Sie suchen eine Antwort auf Ihre Frage?
Hier finden Sie alle Antworten zu den häufigsten Fragen, 
schauen Sie gern, ob Ihre dabei ist.

    Ihr Name (Pflichtfeld)

    Ihre E-Mail-Adresse (Pflichtfeld)

    Betreff (Pflichtfeld)

    Ihre Nachricht