About Rootconf Pune:
Rootconf Pune is a conference for:
- DevOps engineers
- Site Reliability Engineers (SRE)
- Security and DevSecOps professionals
- Software engineers
- Network engineers
The Pune edition will cover talks on:
- InfoSec and application security for DevOps programmers
- DNS and TLS 1.3
- SRE and distributed systems
- Containers and scaling
Speakers from Flipkart, Hotstar, Red Hat, Trusting Social, Appsecco, InfraCloud Technologies, among others, will share case studies from their experiences of building security, SRE and Devops in their organizations.
Two workshops will be held before and after Rootconf Pune:
- Full-day Prometheus training workshop on 20 September, conducted by Goutham V, contributor to Prometheus and developer at Grafana Labs. Details about the workshop are available here: https://hasgeek.com/rootconf/2019-prometheus-training-pune/
- Full-day DNS deep dive workshop on 22 September by Ashwin Murali: https://hasgeek.com/rootconf/2019-dns-deep-dive-workshop-pune/
Rootconf Pune will be held on 21 September at St. Laurn Hotel, Koregaon Park, Pune-411001.
Rootconf Pune 2019 sponsors:
To know more about Rootconf, check out the following resources:
For information about the event, tickets (bulk discounts automatically apply on 5+ and 10+ tickets) and speaking, call Rootconf on 7676332020 or write to email@example.com
eBPF: BPF kernel Infrastructure
eBPF is an upcoming in-kernel mechanism that provides ability inject arbitrary user space code into the kernel in a safe manner.
With ability to program any userspace code into the kernel, it open up a lot of possibilities for end-user to easily interact with kernel components.
This lets users to develop various hooks into the kernel and use existing infrastructure to improve various parts of it.
One such major use case is High performance networking. With the advent of XDP(Express Data Path), it is allowing people to do packet filtering at an early point in the software stack in an extensible manner, which enables very fast packet processing compared to nftables, iptables etc.
Other such usecase is Kernel tracing, which is possible due to bcc(https://github.com/iovisor/bcc) and Bpftrace(DTrace for Linux, https://github.com/iovisor/bpftrace). It enables you to use kprobes, uprobes and tracepoints to deep dive into the intricacies in kernelspace/userspace and make sense of it.
- Introduction to eBPF
- Tracing applications
- tcpdump: Beginning of BPF
- What is eBPF?
- How does eBPF works?
- BPF syscall, maps, prog types
- How is BPF safe?
- Overview of eBPF verfier
- How to use eBPF?
- System requirements
- Writing eBPF program in python using BCC(BPF compiler collection)
- frontends, DSL etc
- XDP real life-scenario
- Test setup
- Benchmark comparison between iptables and XDP
Performance engineer at Red Hat. Currently working on improving kernel networking performance. Open source enthusiast. Co-organizer/Volunteer of India Linux User group Delhi.
How command line params are parsed(ILUG-D): http://slides.com/tksourabh/how-command#/
Basics: Logging in python(PyDelhi): https://slides.com/tksourabh/basics-logging-in-python#/