Cloud Native London March 2026: Aerospike, HAProxy Technologies, and more
Three speakers from Aerospike, HAProxy Technologies, and more joined us at the March Cloud Native London meetup at the fabulous Thought Machine event space, as well as via the YouTube/LinkedIn livestreams.
We are immensely grateful to Aerospike, HAProxy Technologies, and TechShack for their generous support and sponsorship.
Overview
Kicking off our evening was Behrad Babaee from Aerospike discussing Predictable Systems in an Unpredictable World(starting at 21:44). His takeaways explained that:
- Average performance and even P99 are misleading; what truly defines your system is its behaviour at the extreme tail when conditions deteriorate.
- The assumptions systems are built upon are almost always quietly eroding.
- Predictability must be treated as a first-class property of a system.
Following this, we had Baptiste Assmann from HAProxy Technologies describing Observability with HAProxy: detecting what is not working and why(starting at 52:23). He mentioned that:
- The load balancer is your best source of truth. Because HAProxy sits between the client and the server, it maintains two distinct connections. This allows it to act as an “observation tower,” providing impartial data on network retransmits, application processing times, and client bandwidth limitations that other components cannot see.
- Timers are critical for root cause analysis. High-level monitoring averages often hide the root cause. By analyzing HAProxy’s internal timers—specifically Queue time (Tq), Connect time (Tc), and Response time (Tr)—you can mathematically determine if latency is caused by a saturated server, a network packet loss, or a slow application query.
- Observability reduces troubleshooting time. Detailed logging and termination codes allow you to move from “users are complaining” to identifying the exact source of the error (e.g., a specific server or a broken switch). While HAProxy may not fix a broken application, it drastically reduces the time required to isolate the issue so the right team can fix it.
And wrapping up our evening was Alam Ahmed exploring eBPF: Revolutionizing Cloud-Native Security(starting at 1:40:47). He described how:
- Traditional security tools are architecturally misaligned with cloud-native systems—they assume static IPs and persistent hosts while containers spin up/down in seconds, creating dangerous blind spots that delay 67% of deployments and miss kernel-level attacks entirely.
- eBPF enables kernel-native security with 10x performance gains—by executing sandboxed programs directly in the Linux kernel with JIT compilation, it eliminates context-switching overhead (<1% CPU impact), requires zero code changes, and provides complete container/Kubernetes context for every event.
- Production-proven tools are available now—the CNCF eBPF ecosystem grew 4.5x to 41+ projects in two years, with graduated projects like Falco (runtime threat detection), Tetragon (kernel-level enforcement), and Cilium (network security) already securing hyperscale infrastructure at Meta, Google, and billions of Android devices.
And of course, our usual group photo!

Cloud Native London April
Our next meetup will be on Wednesday 1st April, when we’ll be joined by speakers from Cloudsmith, Testkube, and Diagrid! RSVP and save the date now!.
Stay safe, stay healthy, and see you in a month!
Cheryl (@oicheryl)





