Rootconf Delhi edition
Rootconf For members

Rootconf Delhi edition

On network engineering, infrastructure automation and DevOps

Tickets

Loading…

Rootconf is a platform to discuss real-world problems around Site Reliability Engineering (SRE), DevOps for data engineering platforms, evaluating and adopting technologies such as Kubernetes and containers, and DevSecOps.

Rootconf Delhi edition will be held on 18 January 2020 at the India International Centre (IIC).

Speakers from Flipkart, Hotstar, MindTickle, Red Hat and Naukri.com will discuss the following topics:

  1. Scaling and engineering challenges from Hotstar’s and Flipkart’s experiences.
  2. Data store choices.
  3. Kubernetes and K8s -- when to choose what and why?
  4. DevSecOps

##Who should attend Rootconf:

  1. Operations engineers
  2. DevOps programmers
  3. Software developers
  4. SRE
  5. Tech leads

To know more about Rootconf, check the following resources:

  1. hasgeek.com/rootconf
  2. https://www.youtube.com/channel/UCDHao9FxNRHw1VyLuGXI_rA

#Sponsors:

Click here to view the Sponsorship Deck.
Email sales@hasgeek.com for bulk ticket purchases, and sponsoring the above Rootconf Series.


Rootconf Delhi sponsors:


#Silver Sponsor

Verizon

#Bronze Sponsors

upcloud SumoLogic

#Community Partner

IFF Null Delhi

For information about the event, tickets (bulk discounts automatically apply on 5+ and 10+ tickets) and speaking, call Rootconf on 7676332020 or write to info@hasgeek.com.

Hosted by

Rootconf is a community-funded platform for activities and discussions on the following topics: Site Reliability Engineering (SRE). Infrastructure costs, including Cloud Costs - and optimization. Security - including Cloud Security. more

Sameer Kandarkar

@skandark

Evolution of Linux Containers to Container Native Storage...

Submitted Aug 14, 2019

The focus of this session will be on the journey of the containerization technology since 1974 (The First Container) to the container native storage.
How containers evolved year by year and became an invariable solution for isolating applications at the operating system level, although you can also isolate an entire operating system inside a container, if you’d like
Journey of a Linux container from a small piece of code to userspace tools like docker, podman, CRIO and to the solution for persistent storage for container based applications as Container native Storage(CNS).

Outline

Evolution of Containerization Technology

Linux container is a solution for virtualizing software at the operating system level within the Linux kernel. Unlike traditional hypervisors containers lets you run single applications in virtual environments.
Container’s main advantages include making it easy to control a virtual environment using userspace tools from the host OS,
requiring less overhead than a traditional hypervisor and increasing the portability of individual apps by making it possible to distribute them inside containers.
Linux containers sounds a lot like Docker or CoreOS containers, it’s because Linux containers used to be the underlying technology that made Docker and CoreOS tick. More recently, however, Docker has gone in its own direction and no longer depends on Linux container.

In this session, will talk about the evolution of containerization technology from 1974-2019. Different phases of containers such as chroot of unix v7, Free BSD Jails, Linux Vserver, Solaris Containers, Open VZ, Process Containers (also known as Control Groups)
, Linux Containers (LXC), Warden, LMCTFY(Let Me Contain That For You) by Google, Docker , Podman, Kubernetes and Openshift.


This Session will cover the Container Technology Stack.

Container Technology Stack is built on modern kernel features
chrootfs : apparent root FS directory
A chroot on Unix operating systems is an operation that changes the apparent root directory for the current running process and its children.
A program that is run in such a modified environment cannot name (and therefore normally cannot access) files outside the designated directory tree.

namespaces: process based resource isolation –
Namespaces are the foundation of lightweight process virtualization . They enable a process and its children to have different views of the underlying system.

MNT Namespaces
UTS Namespaces
IPC Namespaces
PID Namespaces
USER Namespaces
NET Namespaces

cgroups: limits, prioritization, accounting & control

Linux Security Modules (LSM): Mandatory Access Control (MAC)

User space interfaces for kernel functions LXC tools – Tools to isolate process(es) virtualizing kernel resources LXC commoditization
LXC virtualization Orchestration & management


Software defined storage with containers (CNS: Container Native Storage)

Container technology will also affect how organizations think about storage for applications and emerging microservices. However, while containers do a great job of encapsulating application logic, they do not offer a viable solution for storing application data across the life cycle of the container. Ephemeral (or local) storage is not enough—stateful container-based applications require that data remain available beyond the life of the container. Software defined storage with containers provides a solution for persistent storage

Storage for and in Containers

There’s More Than One Type of Container Storage

  1. Storage For Containers
  2. Storage In Containers

Demo

  1. Demo on Container Technology Stack
  2. Demo on Container Storage

Speaker bio

I am a part a Red Hat’s Gluster Storage Team. I work on openshift backend storage and software defined storage. Since my college days I am very fond of containers and very enthusiastic about opensource culture. I like to talk to people on various platforms, would love to contribute and share my learnings about the opensource technologies such as containers, kubernets, SDS solutions etc

Slides

https://redhat.slides.com/skandark/atomichostcontainers/fullscreen

Comments

{{ gettext('Login to leave a comment') }}

{{ gettext('Post a comment…') }}
{{ gettext('New comment') }}
{{ formTitle }}

{{ errorMsg }}

{{ gettext('No comments posted yet') }}

Hosted by

Rootconf is a community-funded platform for activities and discussions on the following topics: Site Reliability Engineering (SRE). Infrastructure costs, including Cloud Costs - and optimization. Security - including Cloud Security. more