About Rootconf Hyderabad:
Rootconf Hyderabad is a platform for:
- DevOps engineers
- Site Reliability Engineers (SRE)
- ML and data engineers
- Security and DevSecOps professionals
- Software engineers
to discuss real-world problems around:
- Site Reliability Engineering (SRE)
- Data and AI engineering
- Distributed systems – observerability, microservices
- Implementing Infrastructure as Code
Speakers from Flipkart, Hotstar, Intuit, GO-JEK, MadStreetDen and Trusting Social will share their experiences with the above challenges.
Rootconf Hyderabad will be held at T-Hub, IIIT-Hyderabad Campus, Gachibowli, Hyderabad, Telangana - 500032
For bulk ticket purchases,sponsorship and other inquiries, contact firstname.lastname@example.org or call 7676332020
Rootconf Hyderabad 2019 sponsors:
For information about the event, tickets (bulk discounts automatically apply on 5+ and 10+ tickets) and speaking, call Rootconf on 7676332020 or write to email@example.com.
Piyush Verma, SRE head at TrustingSocial.com
Observability and control theorySample problem that go unnoticed with traditional Blackbox monitoring Sample problem that goes unnoticed with advanced whitebox monitoring. Timeline of Monitoring tools. Evolution of Monitoring needs. What is monitoring vs Observability? Servers vs.Services. Real questions that Distributed Systems have to answer Domains of Observability Need of Observability Debuggability in advanced systems. Maths of Stability What is Control theory? Practicale example of Control Theory Types of Control-Systems How Control theory uses Observability How do we use Control theory How TCP Implements all of this together FLow Control vs Congestion Control Sample implementation in a working application Thank you?
Ankur Jain, Software engineer at Flipkart Cloud Platform
Fast object distribution using P2PMotivation for fast object distribution Overview of bittorrent protocol Goals for a torrent-based distribution layer Design, architecture and functional flows of Shatabdi Indexing store and leader election using etcd Achieving HA for torrent tracker Comparison of open-source torrent clients API contracts of daemon binary which abstracts http and p2p downloads Performance tuning of QBittorrent client and uncharted territories of libtorrent Benchmarking container deployments powered by Shatabdi
Anubhav Mishra, Technical Advisor to the CTO at Hashicorp
Taming infrastructure workflow at scaleAs more operations choices are added to your data center, whether through company acquisitions, a growing development team, or general technical debt, managing infrastructure complexity becomes a nightmare. Yet the end goal is still the same — safely deploy your application to your infrastructure. We need to tame our data centers by managing change across systems, enforcing policies, and by establishing a workflow for both developers and operations engineers to build in a collaborative environment. This talk will discuss the problems faced in managing a modern cloud infrastructure, and how a set of innovative open source tools like Terraform can be used to tame the rising complexity curve. Join me as I take you on a journey of exploring Infrastruture as Code techniques as we take control of our cloud infrastructure. This goal of this demo driven talk is to showcase how you can build multi-tier application infrastructure supporting multiple cloud platforms and services using IAC.
Tasdik Rahman, Product engineer at GO-JEK
Achieving repeatable, extensible and self serve infrastructure at Gojek*Goals *Architecture and discussion around - olympus which hosts our cloud infrastructure config - terraform module structuring and how we run it our CI/CD platform - how proctor (https://github.com/gojek/proctor) helps us in achieving the self serve model for infrastructure *Lessons learnt *Impact
Lavakumar Kuppan, Founder of Ironwasp Security
Deploying and managing CSP: the browser-side firewallIntroduction to client-side Data Exfiltration attacks Introduction to Content-Security Policy Content Security Policy to prevent Data Exfiltration attacks ○ What is possible ○ What are the limitations How to design and deploy CSP to detect/prevent Data Exfiltration attacks How to monitor policy violations and alerts
Jambunathan V R, Director of engineering at MadStreetDen
Designing microservices around your data designIntroduction Usecases Definition Image Classification Product Recommendations AI Stylist Architecture and workflow of each usecase Merge the workflows into single architecture Core Platform Architecture v0.1 Design Considerations Latency & throughput Deployment strategy datastore design Core platform architecture v0.2 Learnings from our design Case study: Microservice Registry Problem statement Architecture Config change for single service Config change between microservices Questions ?