BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//HasGeek//NONSGML Funnel//EN
DESCRIPTION:On infrastructure security\, DevOps and distributed systems.
X-WR-CALDESC:On infrastructure security\, DevOps and distributed systems.
NAME:Rootconf 2019
X-WR-CALNAME:Rootconf 2019
REFRESH-INTERVAL;VALUE=DURATION:PT12H
SUMMARY:Rootconf 2019
TIMEZONE-ID:Asia/Kolkata
X-PUBLISHED-TTL:PT12H
X-WR-TIMEZONE:Asia/Kolkata
BEGIN:VEVENT
SUMMARY:Check-in and breakfast (at food court)
DTSTART:20190621T031500Z
DTEND:20190621T040000Z
DTSTAMP:20260425T012339Z
UID:session/UQMNmaPgFiKJzqYfMmiS3b@hasgeek.com
SEQUENCE:0
CREATED:20181005T080743Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190610T071816Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Check-in and breakfast (at food court) in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Check-in and breakfast (at food court)
DTSTART:20190621T031500Z
DTEND:20190621T035000Z
DTSTAMP:20260425T012339Z
UID:session/GETKZ7JgVigMi3kCpGhn7a@hasgeek.com
SEQUENCE:0
CREATED:20181005T074438Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190610T071811Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Check-in and breakfast (at food court) in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to Rootconf 2019 edition\; what to expect from the co
 nference
DTSTART:20190621T035000Z
DTEND:20190621T040000Z
DTSTAMP:20260425T012339Z
UID:session/WnGtTq5xnVjQKhmiJUJRH3@hasgeek.com
SEQUENCE:0
CREATED:20190610T062845Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190610T062850Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to Rootconf 2019 edition\; what to expect from th
 e conference in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Learnings from running my Home Server (and why you should run one 
 too)
DTSTART:20190621T040000Z
DTEND:20190621T043500Z
DTSTAMP:20260425T012339Z
UID:session/9AMm9wQmn83u1nAfj51qNC@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate
CREATED:20190327T102629Z
DESCRIPTION:This talk will cover the important bits:\n\n1. A brief overvie
 w of my homeserver setup\n  i. What all Hardware is involved\n  ii. What a
 ll services are running\n  iii. Networking and how to route traffic to you
 r home.\n2. Infrastructure Setup\n  i. Terraform Configuration\n  ii. Serv
 ice Configuration\n  iii. Running a Kubernetes Cluster\n  iv. Security\n3.
  Q&A\n\n### Speaker bio\n\nNemo is a Software Engineer at Razorpay\, where
  he maintains a robust payment infrastructure on top of Kubernetes. He lov
 es playing boardgames\, and pen-testing indian government websites.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122611Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/learnings-from-running-my-h
 ome-server-and-why-you-should-run-one-too-9AMm9wQmn83u1nAfj51qNC
BEGIN:VALARM
ACTION:display
DESCRIPTION:Learnings from running my Home Server (and why you should run 
 one too) in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Building reproducible Python applications for secured environments
DTSTART:20190621T043500Z
DTEND:20190621T050500Z
DTSTAMP:20260425T012339Z
UID:session/5yoALPa3wgwGkcgYzqJm8c@hasgeek.com
SEQUENCE:3
CATEGORIES:Intermediate
CREATED:20190327T103850Z
DESCRIPTION:* Introduction - 1 minute\n* Why all of these painful steps? 2
  minutes\n* SecureDrop client desktop tools and their dependency on other 
 upstream projects (or think about an application structutre and standard d
 eployment strategy)- 3 minutes\n* Updating dependencies or do we read all 
 updates? - 2 minutes\n* Development environment and using pipenv + tools t
 o create `requirements.txt` wtih hashes only for source - 3 minutes\n* Str
 ucture of a static HTML based private package index - 4 minutes\n* GPG sig
 ned list of already built wheels + syncing them locally - 2 minute\n* Runn
 ing python3 setup.py sdist to create the release tarball + a step before t
 o have a requirements..txt with only binary hashes from our list of wheels
 . - 5 minutes\n* Final Debinan packaging script (for automation) which doe
 s double  verification of the wheel hashes. - 3 minutes\n* Reproducible De
 bian package as end product - 2 minutes\n* Possibility in the RPM land - 1
  minute\n* QA/feedback\n\n### Speaker bio\n\nKushal Das is a public intere
 st technologist\, who is a maintainer of the SecureDrop project\, and part
  of Tor Project core team. He is a CPython core developer\, and also a dir
 ector in Python Software Foundation. He has given talks in various confere
 nces including previous PyCons (and once in a previous version of rootconf
 )\, a list of such talks is in https://fedoraproject.org/wiki/User:Kushal#
 Talks_.26_Workshops\n\nKushal is currently working as a staff member of th
 e Freedom of the Press Foundation.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122602Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/building-reproducible-pytho
 n-applications-for-secured-environments-5yoALPa3wgwGkcgYzqJm8c
BEGIN:VALARM
ACTION:display
DESCRIPTION:Building reproducible Python applications for secured environm
 ents in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tutorial: Shooting the trouble down to the Wireshark Lua plugin
DTSTART:20190621T043500Z
DTEND:20190621T060500Z
DTSTAMP:20260425T012339Z
UID:session/DhGAm4evqNH2xWBXo444uq@hasgeek.com
SEQUENCE:2
CATEGORIES:Workshop,Intermediate
CREATED:20190327T104323Z
DESCRIPTION:* Objectives\n* Lua and Wireshark Lua\n* Usage and Example\n* 
 Debugging and Linting\n* Literate Programming\n* Markdown Structure\n* lit
 2lua\n* Protocol Dissection Pattern\n* Dissector Table\n* Wireshark User I
 nterface\n* Info\, Message and Heartbeat Protocol\n* Hot key Report\n* Tes
 ting\n* Demo\n* Future Work\n* References\n\nSource Code: https://github.c
 om/aerospike/aerospike-wireshark-plugin\n\n### Speaker bio\n\nShakthi Kann
 an is a Free Software enthusiast who plays a Senior DevOps Engineer role a
 t Aerospike\, Bengaluru. He has developed the Aerospike Wireshark Lua plug
 in that is used for troubleshooting and network analysis. He is an avid pr
 omoter of Free (Libre) and Open Source Software\, and blogs at shakthimaan
 .com. He holds a Masters degree in Information Technology from Rochester I
 nstitute of Technology.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/shooting-the-trouble-down-t
 o-the-wireshark-lua-plugin-DhGAm4evqNH2xWBXo444uq
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tutorial: Shooting the trouble down to the Wireshark Lua plugi
 n in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Morning beverage break
DTSTART:20190621T050500Z
DTEND:20190621T053500Z
DTSTAMP:20260425T012339Z
UID:session/RqGz64MidGHnKUR2HBZKhN@hasgeek.com
SEQUENCE:0
CREATED:20190610T060114Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190610T060208Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Morning beverage break in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Let’s talk about routing security
DTSTART:20190621T053500Z
DTEND:20190621T061500Z
DTSTAMP:20260425T012339Z
UID:session/Uvn3u6ExMHJPgSzNv1hyzR@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate,14 May  
CREATED:20190409T054748Z
DESCRIPTION:This talk covers how (in)secure in the routing at the global s
 cale\, covers about IRR in detail. Includes examples\, tools and challenge
 s with IRR based BGP filtering. It also gives a brief introduction to RPKI
  as well as latest developments in this domain (AT&T doing RPKI based filt
 ering\, Google about to do IRR based filtering etc)\n\n### Speaker bio\n\n
 I am working at Hurricane Electric and we operate one of largest interconn
 ected network in the world. \nWe operate a backbone network in 41 countrie
 s across America\, Europe\, Asia\, Oceania and Africa region and interconn
 ect with over 7400 networks via 26000 + BGP sessions in over 200 Internet 
 Exchanges. A large part of this talk comes from our experiences of impleme
 nting IRR based BGP filtering in last few months.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122553Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/lets-talk-about-routing-sec
 urity-Uvn3u6ExMHJPgSzNv1hyzR
BEGIN:VALARM
ACTION:display
DESCRIPTION:Let’s talk about routing security in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Building a 100% remote workplace
DTSTART:20190621T053500Z
DTEND:20190621T063500Z
DTSTAMP:20260425T012339Z
UID:session/XHRRA4EiRqzYbbyQBC6UxC@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) Session,Intermediate,Discussion
CREATED:20190406T104503Z
DESCRIPTION:\n\n### Speaker bio\n\nRatnadeep Debnath AKA rtnpro works as a
  Site Reliability Engineer at Zapier. He has deep interest in Kubernetes a
 nd CNCF projects. He loves contributing to Open Source and mentoring peopl
 e to start their Open Source journey. When he is not coding\, he likes spe
 nding time with friends and family\, practise Mantra Meditation or cooking
 .\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:BOF area - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/building-a-100-remote-workp
 lace-XHRRA4EiRqzYbbyQBC6UxC
BEGIN:VALARM
ACTION:display
DESCRIPTION:Building a 100% remote workplace in BOF area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Morning beverage break
DTSTART:20190621T060500Z
DTEND:20190621T063500Z
DTSTAMP:20260425T012339Z
UID:session/MVoqZJtDBz78XzXwV69zh9@hasgeek.com
SEQUENCE:0
CREATED:20190618T130442Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190618T130442Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Morning beverage break in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Deploying and managing CSP: the browser-side firewall
DTSTART:20190621T061500Z
DTEND:20190621T065500Z
DTSTAMP:20260425T012339Z
UID:session/WLNJ6s6B9piyPyTmWFKvXb@hasgeek.com
SEQUENCE:2
CATEGORIES:Intermediate
CREATED:20190327T103511Z
DESCRIPTION:- Introduction to client-side Data Exfiltration attacks\n- Int
 roduction to Content-Security Policy\n- Content Security Policy to prevent
  Data Exfiltration attacks\n  ○ What is possible\n  ○ What are the lim
 itations\n- How to design and deploy CSP to detect/prevent Data Exfiltrati
 on attacks \n- How to monitor policy violations and alerts\n\n### Speaker 
 bio\n\nLavakumar Kuppan is the founder of Ironwasp Security. He is a secur
 ity researcher and a product developer. He is currently developing product
 s that automatically perform vulnerability detection and attack monitoring
  for the DOM. \nHe has done extensive research on web security with specia
 l focus on JavaScript security. He has discovered several novel attacks ve
 ctors and vulnerabilities and has spoken about his research in several int
 ernational conferences.\nHe has also done extensive work on developing ope
 n source tools to discover security issues in JavaScript\, through both st
 atic and dynamic analysis.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/deploying-and-managing-csp-
 the-browser-side-firewall-WLNJ6s6B9piyPyTmWFKvXb
BEGIN:VALARM
ACTION:display
DESCRIPTION:Deploying and managing CSP: the browser-side firewall in Audi 
 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tutorial: Onion services (Tor Project) for Devops
DTSTART:20190621T063500Z
DTEND:20190621T073500Z
DTSTAMP:20260425T012339Z
UID:session/T2Gs5xuzoVQMGmrir2uXv6@hasgeek.com
SEQUENCE:2
CATEGORIES:Workshop,Intermediate,Workshop
CREATED:20190609T151420Z
DESCRIPTION:- Introduction to Tor project\n- Onion services 101\n- Deployi
 ng a website as an onion service\n- Deploying ssh access as an onion servi
 ce\n- QA\n\n### Speaker bio\n\nKushal Das is a public interest technologis
 t at the Freedom of the Press Foundation\, who is a maintainer of the Secu
 reDrop project\, and part of Tor Project core team. He is a CPython core d
 eveloper\, and also a director in Python Software Foundation. He has given
  talks in various conferences including previous PyCons (and once in a pre
 vious version of rootconf)\, a list of such talks can be found [here](http
 s://fedoraproject.org/wiki/User:Kushal#Talks_.26_Workshops)\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/onion-services-for-devops-T
 2Gs5xuzoVQMGmrir2uXv6
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tutorial: Onion services (Tor Project) for Devops in Audi 2 in
  5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Using pod security policies to harden your Kubernetes cluster
DTSTART:20190621T065500Z
DTEND:20190621T073500Z
DTSTAMP:20260425T012339Z
UID:session/LMw9WK67wYxfwjmmHkeHns@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate
CREATED:20190406T102249Z
DESCRIPTION:This talk will start with current state of Kubernetes security
  and how folks are setting up their clusters. How folks are using shortcut
 s to get around changing their old bad practices. The talk will explain fo
 lks what's worst that can happen if they keep using those bad practices. S
 pecially in the multi-tenant setup this can lead to massive breakouts.\n\n
 The above topics are there to create a ground for folks to appreciate the 
 security feature of Kubernetes Pod Security Policy. \n\nWe then come to co
 re of the talk this is where I will explain what Pod Security Policy is an
 d how it can help in hardening the cluster. I will explain all the support
 ed features that PSP has and what feature stops what kind of attack vector
  in a multi-tenant untrusted environment.\n\nAlso I will explain the benef
 its of having secure & hardened clusters from the development phase itself
  and how it helps you understand and catch the issues that you might encou
 nter only while deploying on production.\n\n### Speaker bio\n\nSuraj is in
 volved in the Kubernetes community from the days of 1.3 release. He mainly
  worked on the project Kompose and areas of app definition with mission of
  making Kubernetes easier for developers to consume. He has spoken at vari
 ous conferences like FOSDEM\, Pycon India\, DevConf India and DevOpsDays I
 ndia. He is co-organizer of Kubernetes Bangalore meetup which is active an
 d diverse in terms of people\, organizations and projects for two years no
 w. He currently works for Kinvolk where they are building secure by defaul
 t Kubernetes distribution.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122546Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/using-pod-security-policies
 -to-harden-your-kubernetes-cluster-LMw9WK67wYxfwjmmHkeHns
BEGIN:VALARM
ACTION:display
DESCRIPTION:Using pod security policies to harden your Kubernetes cluster 
 in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch break
DTSTART:20190621T073500Z
DTEND:20190621T083000Z
DTSTAMP:20260425T012339Z
UID:session/65kRbotHSTpqaDsHxbcsWh@hasgeek.com
SEQUENCE:0
CREATED:20190610T060435Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190610T060448Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lunch break in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Keynote: How convenience Is killing open standards
DTSTART:20190621T083000Z
DTEND:20190621T091000Z
DTSTAMP:20260425T012339Z
UID:session/UcwKgZs63AvJaJECV81R7k@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate
CREATED:20190327T104349Z
DESCRIPTION:All the technical diversity we enjoy in our industry is the re
 sult of internal evangelism 20 yers ago. Now all three major cloud provide
 rs have been pushing their serverless solutions to lure customers into a n
 ew form of vendor lock-in. I think it is time\, to remind ourselves about 
 Open Standards.\n\n### Speaker bio\n\nBernd Erk is CEO at NETWAYS\, an ope
 n source service company. He is also CEO and co-founder at Icinga\, an Ope
 n Source Monitoring company. His technical expertise stretches across syst
 ems management\, managed services and software development. As a core memb
 er of DevOpsDays organizers\, he tries to spread the DevOps spirit whereve
 r and whenever possible.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122533Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/how-convenience-is-killing-
 open-standards-UcwKgZs63AvJaJECV81R7k
BEGIN:VALARM
ACTION:display
DESCRIPTION:Keynote: How convenience Is killing open standards in Audi 1 i
 n 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:How do you keep your secrets and how much does it cost? 
DTSTART:20190621T091000Z
DTEND:20190621T101000Z
DTSTAMP:20260425T012339Z
UID:session/H7LGMtxz54ePQp1PMq4SEz@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) Session,Advanced,Birds Of Feather (BOF) 
 session ,Advanced,Discussion
CREATED:20190606T111750Z
DESCRIPTION:Discussion Structure\n====================\nRather than starti
 ng from a particular solution and discuss the specific nature in which it 
 works\, the discussion should be centered around <b><u>why a particular so
 lution was deployed </u></b> in an organization and the thought process th
 at went into it. \n\nWe need at least 4 - 5 examples on real world thought
  process that went in deploying a particular solution. In particular we wo
 uld be interested in the following structure\n* What was the secret keepin
 g solution that was chosen? \n* Why was it chosen? What are the parameters
  for chosing a particular solution? The parameters we are looking to under
 stand in depth are: \n  - Number of Secrets\n  - Nature of Secrets (Epheme
 ral\, API Keys\, Tokens etc.)\n  - Number of entities that access these se
 crets (500\, 1000 etc.)\n  - Integration with Identity management.\n  - Co
 st for storing and managing secrets. \n  - Trust in the organization/commu
 nity/person that developed and maintains the solution. \n  - Integration w
 ith existing tools/cloud providers/organization workflows etc.\n\n### Spea
 ker bio\n\nAnand V is a security researcher who has written extensively on
  Aadhaar\, India's Digital identification project. He is a long term optim
 ist on the illusory idea that people will care about their privacy and wil
 l not trade it for being a product while being a short term skeptic\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:BOF area - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/how-do-you-keep-your-secret
 s-and-how-much-does-it-cost-H7LGMtxz54ePQp1PMq4SEz
BEGIN:VALARM
ACTION:display
DESCRIPTION:How do you keep your secrets and how much does it cost?  in BO
 F area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:SSH Certificates: a way to scale SSH access
DTSTART:20190621T091000Z
DTEND:20190621T094000Z
DTSTAMP:20260425T012339Z
UID:session/6vRxtiiw3XQH8412Sf4ofx@hasgeek.com
SEQUENCE:3
CATEGORIES:Crisp talk of 20 mins duration,Intermediate
CREATED:20190327T103324Z
DESCRIPTION:* Traditional Public key (asymmetric key) cryptography authent
 ication(2 min)\n    * Traditional SSH authentication methods\n    * Passwo
 rd-based authentication\n    * Public-key (asymmetric) based authenticatio
 n\n    * Generic Security Service Application Program Interface (an API to
  access servers)\n* Centralized authentication approach & limitations (3 m
 in)\n    * How LDAP/Kerberos working (in brief)\n    * Limitations of a ce
 nralized system\n* A adventures ride with SSH certificates (6 min)\n    * 
 Working of SSH certificates\n    * Generate signed certificate from CA\n  
   * Configuration on the host system\n    * Configuration on the user syst
 em\n* Demo (3 min)\n* Features of SSH CA (3 min)\n    * Role-based access\
 n    * Host-based access\n    * Certificate validity\n    * Certificate id
 entity\n* Limitation & solutions (3 min)\n\n### Speaker bio\n\nPulkit Vais
 hnav is working as a DevOps Engineer who builds a secure and scalable infr
 astructure at Moengage. Previously\, he worked at Packetzoom and scale\, a
 utomate and monitor the CDN infrastructure for billions of requests/day on
  a hybrid cloud infrastructure. He was a co-founder of Hashgrowth an App S
 tore Optimization platform to drive mobile app growth.\nPulkit is open sou
 rce enthusiasts and likes to explore new technologies. When not working li
 ke to travel\, explore new food places and binge.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122526Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/ssh-certificates-a-way-to-s
 cale-ssh-access-6vRxtiiw3XQH8412Sf4ofx
BEGIN:VALARM
ACTION:display
DESCRIPTION:SSH Certificates: a way to scale SSH access in Audi 2 in 5 min
 utes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Flash talks: by participants
DTSTART:20190621T091000Z
DTEND:20190621T094000Z
DTSTAMP:20260425T012339Z
UID:session/A5HGA8kQkLgNggtjisRCEG@hasgeek.com
SEQUENCE:0
CREATED:20190610T063709Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190616T091348Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Flash talks: by participants in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:What are the benefits of using Ansible Automation?
DTSTART:20190621T094000Z
DTEND:20190621T104000Z
DTSTAMP:20260425T012339Z
UID:session/8UEbPxATNrKP6XMaWuhMhs@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) session ,Intermediate,Discussion
CREATED:20190619T165756Z
DESCRIPTION:The following points will be discussed during this session:\n-
  Ansible's simplicity and extensible plugins\n- Real world use cases of An
 sible\n- Comparing Ansible and AWX(Upstream of Ansible Tower)\n- Enabling 
 next generation network operations using Ansible\n\n### Speaker bio\n\nOmp
 ragash Viswanathan\, Trishna Guha\, Nilashish Chakraborty\, Rohit Thakur\n
 \nLinks:\n- https://www.linkedin.com/in/ompragash/\n- https://www.linkedin
 .com/in/trishnaguha/\n- https://www.linkedin.com/in/nilashishchakraborty/\
 n- https://www.linkedin.com/in/rohit-thakur-721850136/\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:Room 01 for BOFs - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/what-are-the-benefits-of-us
 ing-ansible-automation-8UEbPxATNrKP6XMaWuhMhs
BEGIN:VALARM
ACTION:display
DESCRIPTION:What are the benefits of using Ansible Automation? in Room 01 
 for BOFs in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Sponsored talk: Implementing security from day one at a fintech st
 artup
DTSTART:20190621T094000Z
DTEND:20190621T102000Z
DTSTAMP:20260425T012339Z
UID:session/NbDCPaRiFEJpBCvSgCnpqQ@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk,Intermediate,Lecture
CREATED:20190607T060733Z
DESCRIPTION:Information security domain has become vast with lots of indus
 try standards\, frameworks\, tools\, etc. However\, all business at the en
 d of the day cares about is releasing a product securely with minimal fric
 tion and enabling tech to move fast while having security in place.\n\nIn 
 this talk\, we will touch base on the approaches as well as key decisions 
 we took to ensure we have security in place from day 1 of our product laun
 ch. To keep understanding simple\, I have segmented security into 3 follow
 ing buckets\n\n1.  A cloud approach\n    \n2.  A compliance approach\n    
 \n3.  A product approach\n    \n\n\n**A cloud approach:** Most of our foun
 ding team members were well versed with a public cloud (AWS)\, hence\, thi
 s was a no brainer decision to adapt an AWS heavy infrastructure.\n\n\n***
 Challenges(Security):***\n\n1.  Due diligence of shared responsibility: Al
 l managed workloads would need to have a policy defined. E.g. An IAM role 
 must not have an excess permissions or an admin user should not be able to
  delete a running ECS cluster.\n    \n2.  Lifecycle of workloads/resources
 : E.g. Security groups for enabling temporary access across AWS resource n
 eeds to be revoked asap.\n    \n3.  Secret/Key Management: E.g\, Because s
 ecrets are not meant to be hardcoded.\n    \n4.  Incident Response: E.g. B
 itcion miner on a hacked EC2.\n    \n***Approach:***\n\n1.  Least Principl
 e - OKTA as SSO on separate AWS accounts(dev\,stage\,prod\,PCI\, central) 
 with distinguished user groups.\n    \n2.  Continuous AWS Monitoring - [ht
 tps://www.cloudconformity.com/conformity-rules/](https://www.cloudconformi
 ty.com/conformity-rules/)\n    \n3.  AWS Guardduty - Monitors Cloudtrail\,
  VPC Flow logs and Route53 logs - SNS to Email for all alerts.\n    \n\n**
 A Compliance Approach:** Fintech is regulated business and industry standa
 rds are its consequence. During the first month of our product launch\, we
  were required to become compliant to NPCI guidelines for a UPI launch. Fo
 llowed by RBI’s data localization requirement(SAR) and then ISO 27001:20
 13\n\n***Challenges:***\n\n1.  Onboarding independent auditors to the conc
 ept of credit card bill payments.\n    \n2.  Onboarding consultants to vie
 w product/business from a different angle.\n    \n3.  Creating a process o
 riented culture to adhere to various compliance requirements.\n    \n\n**A
  Product Approach:** Our founder wanted our product to be as secure before
  we launch.\n\n***Challenges:***\n\n1.  Dealing with rapid code+design cha
 nges.\n    \n2.  Defensive versus offensive.\n    \n3.  Proposing secure s
 olutions for end user application flow.\n    \n***Approach:***\n\n1.  Keep
 ing track of changes in every alpha build. Sit next to developer and start
  with a simple code review. Need not be a tool based approach\, for every 
 API call\, check the corresponding codebase and think what could go wrong.
 \n    \n2.  Too many tools and framework to attack. Think on how to make e
 very attack difficult. E.g. SSL Pinning\, Code obfuscation( Proguard follo
 wed by Dexguard)\n    \n3.  Review all application flow\, look at applicat
 ion having user inputs. E.g. OTP flow in our app.\n\n### Speaker bio\n\nHi
 manshu is currently repsponsible for overall security at CRED. He has spen
 d most of his career into fintech domain at GrabPay\, Flipkart\, PayPal in
  building in-house security platforms and products\, hence\, his domain ex
 pertise. Having started his early career with security consulting for some
  of the well-known passport-visa processing firm\, government organization
 s\, start-ups in Indian e-commerce space. Himanshu has later lead bug boun
 ty programme for PayPal. He participates in CTF with team SegFault\, has w
 on Nullcon JailBreak 2012 and been an architect for managing and hosting H
 ackIM CTF. While away from computer\, he spends his time playing console a
 nd enjoys cooking.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122508Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/implementing-security-from-
 day-1-at-a-fintech-startup-NbDCPaRiFEJpBCvSgCnpqQ
BEGIN:VALARM
ACTION:display
DESCRIPTION:Sponsored talk: Implementing security from day one at a fintec
 h startup in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Securing infrastructure with OpenScap: the automation way
DTSTART:20190621T094000Z
DTEND:20190621T102000Z
DTSTAMP:20260425T012339Z
UID:session/9q9pU6TdR4YcLC7wyHfbG7@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Beginner
CREATED:20190610T113732Z
DESCRIPTION:Audience will learn about Openscap. Tools used by openscap alo
 ng with profiles and components of openscap. I will also through some ligh
 t on how we all can have our own set of policies and how we can develop ce
 rtain profiles and policies that will be custom of yourself and also usefu
 l for upstream. This talk will also involve how to deploy openscap\, how t
 o use different tools of openscap and warping up with the analysis of the 
 reports generated by the scap policies. At the end you get a clear picture
  of openscap also with managing all the tools and reports by them.\n\n### 
 Speaker bio\n\nMy name is Jaskaran Singh Narula and currently working Red 
 Hat as a Satellite Engineer.\nI have been working with the Null open sourc
 e security community for nearly 2 years. I have been an active member\, sp
 eaker and volunteer at Bhopal Null Chapter. https://null.co.in/profile/550
 2-jaskaran-singh-naru\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122515Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/securing-infrastructure-wit
 h-openscap-the-automation-way-9q9pU6TdR4YcLC7wyHfbG7
BEGIN:VALARM
ACTION:display
DESCRIPTION:Securing infrastructure with OpenScap: the automation way in A
 udi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Evening beverage break
DTSTART:20190621T102000Z
DTEND:20190621T105000Z
DTSTAMP:20260425T012339Z
UID:session/Mdk6enkjtABbgxc7eNpZHH@hasgeek.com
SEQUENCE:0
CREATED:20190610T061031Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190619T034452Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Evening beverage break in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Evening beverage talk
DTSTART:20190621T102000Z
DTEND:20190621T105000Z
DTSTAMP:20260425T012339Z
UID:session/AJmhsvULqzJ8kg4TcRF3rY@hasgeek.com
SEQUENCE:0
CREATED:20190610T063218Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190618T130022Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Evening beverage talk in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: SRE approach to supporting product
 s as a PaaS internally
DTSTART:20190621T105000Z
DTEND:20190621T115000Z
DTSTAMP:20260425T012339Z
UID:session/LTMfZC3AiK2jMtQNydhPVa@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) Session,Intermediate,Birds Of Feather (B
 OF) session ,Intermediate,Discussion
CREATED:20190614T085047Z
DESCRIPTION:Open discussion on solving the challenge of building common SR
 E principles and tools to support multi dozen uniquely configured product 
 environments.  \nWe'll discuss about implementing correlation and principl
 es to improve automation and the quality of products. Building everything-
 as-a-service internally to homogenize workloads and toolchain. Comparing t
 he short term and long term tradeoffs of this approach.\n\n### Speaker bio
 \n\nTBD\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:BOF area - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/sre-approach-to-supporting-
 products-as-a-paas-internally-LTMfZC3AiK2jMtQNydhPVa
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: SRE approach to supporting pro
 ducts as a PaaS internally in BOF area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:OSINT for proactive defense
DTSTART:20190621T105000Z
DTEND:20190621T113000Z
DTSTAMP:20260425T012339Z
UID:session/H1Z5ygmYbY88VwxCqwKwWS@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk,Intermediate,Lecture
CREATED:20190609T151155Z
DESCRIPTION:Below is an outline of the presentation:\n- Overview of OSINT\
 n- Why Security Teams should use OSINT\n- Continuous Discovery and Monitor
 ing of Assets\n- Use OSINT Data for Periodic Attack Simulation\n- Discover
 ing Sensitive Information Leakage \n- Monitoring Breached Passwords\n- Pro
 actively Identifying Security Incidents using SOCMint\n- OSINT Countermeas
 ures\n\n### Speaker bio\n\nShubham Mittal is co-founder of @RedHuntLabs an
 d is an active Information Security researcher with 7+ years of experience
  in Pentesting\, OSINT and Perimeter Security. He has worked both in offen
 sive as well as defensive security roles. He is a BlackHat Asia Review Boa
 rd Member and has spoken/trained at multiple conferences including BlackHa
 t\, NullCon\, HackMiami\, c0c0n\, etc. He is the author of OSINT Framework
  - DataSploit (listed in Top Ten Security Tools of 2016) and is co-founder
  of @Recon-Village which runs @DEFCON Vegas and China. He works from the c
 ommand line\, uses vi and loves beer.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122500Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/osint-for-proactive-defense
 -H1Z5ygmYbY88VwxCqwKwWS
BEGIN:VALARM
ACTION:display
DESCRIPTION:OSINT for proactive defense in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: On taking your home brew projects 
 to graduate into CNCF projects
DTSTART:20190621T105000Z
DTEND:20190621T115000Z
DTSTAMP:20260425T012339Z
UID:session/VNM6T79wLSX2kdZvHzHS7m@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) session ,Beginner,Discussion
CREATED:20190620T110249Z
DESCRIPTION:* Introduction to CNCF\n* CNCF presence in India\n* Current pr
 ojects under CNCF\n* Proposing a project to become part of CNCF\n* How a p
 roject graduates from CNCF ?\n* Journey of OpenEBS into CNCF\n\n### Speake
 r bio\n\n### Suraj Narwade:\n\nSuraj is Software Engineer at Red Hat. He w
 orks as golang developer on developer experience on Kubernetes & OpenShift
 . He is active OpenSource contributor. He is also CNCF ambassador and co-o
 rganizer of Bangalore Kubernetes meetup group. He is based out of Bengluru
 \, India.\n\n### Neependra Khare:\n\nNeependra is the Founder and Principa
 l Consultant at CloudYuga Technologies\, which offers training and consult
 ing services around cloud native technologies such as Kubernetes\, Prometh
 eus\, Service Mesh\, etc. He is an CNCF Ambassador and Certified Kubernete
 s Administrator (CKA). He is based out of Bengaluru\, India.\n\nNeependra 
 authored Introduction to Kubernetes course on Edx for the CNCF\, which has
  been taken by more than 63K participants. He also authored a book on Dock
 er\, Docker Cookbook in 2015 and co-authored a course on Cloud Infrastruct
 ure Technologies on edX for The Linux Foundation. He ran a Docker meetup g
 roup in Bangalore\, India for more than 5 years and is very active in othe
 r meetups like Kubernetes\, AWS\, DevOps\, etc.\n\n### Satyam Zode:\n\nSat
 yam is an open source enthusiast and works a Senior Software Engineer at M
 ayaData which is a company behind the  leading open source cloud native st
 orage project OpenEBS.\n\nSatyam spends his time on writing Go and work wi
 th Open source projects like OpenEBS\, Kubernetes and Weave Scope. \nHe is
  a maintainer of Weave Scope project. He is an occasional speaker at Kuber
 netes Bangalore\, Kubernetes Chennai meetup and OpenEBS meetup.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/birds-of-feather-bof-sessio
 n-on-taking-your-home-brew-projects-to-graduate-into-cncf-projects-VNM6T79
 wLSX2kdZvHzHS7m
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: On taking your home brew proje
 cts to graduate into CNCF projects in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Devil lies in the details: running a successful bug bounty program
 me in your organization
DTSTART:20190621T113000Z
DTEND:20190621T121000Z
DTSTAMP:20260425T012339Z
UID:session/6XQ2wZJitKPpNSQmffdkNu@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Beginner,Full talk,Beginner,Lectu
 re
CREATED:20190606T073622Z
DESCRIPTION:Agenda of this talk is to give a glimpse into the actual world
  of bug bounty and just not from what we read in news. These will be some 
 points of discussion to paint a complete picture for the audience:\n\n-Int
 roduction and benefits of having a bug bounty program \n-Discuss on would 
 it make sense to have a bug bounty program or can we live without it\n-Wha
 t take do leadership has on bug bounty\, their concerns\, and expectations
 \n-What could go wrong if we dont even bother\n-When is the right time in 
 the timeline of an organization to have open connect with security researc
 hers \n-What kind of organizations need such program or how do we decide i
 t for my non-IT organization \n-What platform make sense? Should we buy or
  build our own\n-Why problem would pop up while building a platform vs dra
 wbacks on signing up on a platform\n-What all process needs to put in plac
 e across the organization to have a successful one\n-What is bare minimum 
 automation we need to have to scale up to all bugs we receive \n-How do di
 fferent teams react to it like the legal team\, finance team\, PR team etc
 .\n-What are the logistic problem that shows up towards the launch \n-Do's
  and Do not's of a bug bounty program\n\n### Speaker bio\n\nShadab has led
  Black Ops teams err.. Information Security teams as a specialist with uni
 corns like Ola\, Flipkart and large scale Internet firms like Adobe. An en
 gineer by heart with out of the box thinking.\nHe has good hands-on experi
 ence in E-commerce\, payment gateways\, mobile security\, logistic product
 \, Digital signing\, Container/Infra Security\, plugging security as part 
 of SDLC to name and few others.\nHe has bootstrapped security engineering 
 team multiple times from scratch. He has experience around building securi
 ty automation\, building real-time detection of attack anomalies\, evangel
 izing security\, compliance\, cryptography and making sure the product sec
 urity is kept the tallest. \n\nCurrently\, he heads Information security\,
  Privacy and Trust @Hotstar\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122452Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/bug-bounty-programs-good-ba
 d-ugly-6XQ2wZJitKPpNSQmffdkNu
BEGIN:VALARM
ACTION:display
DESCRIPTION:Devil lies in the details: running a successful bug bounty pro
 gramme in your organization in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Check-in and breakfast (at food court)
DTSTART:20190622T033000Z
DTEND:20190622T040000Z
DTSTAMP:20260425T012339Z
UID:session/7wr237FMzPK1apFKkREEdx@hasgeek.com
SEQUENCE:0
CREATED:20181005T075540Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190610T071805Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Check-in and breakfast (at food court) in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Check-in and breakfast (at food court)
DTSTART:20190622T040000Z
DTEND:20190622T045000Z
DTSTAMP:20260425T012339Z
UID:session/CfrKK97M7zfi6HCuGvEvSA@hasgeek.com
SEQUENCE:0
CREATED:20190610T071711Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190610T071756Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Check-in and breakfast (at food court) in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Recap of day 1\; introduction to day 2
DTSTART:20190622T040000Z
DTEND:20190622T041000Z
DTSTAMP:20260425T012339Z
UID:session/5iMFrzWKHBVHKThgTSjRc5@hasgeek.com
SEQUENCE:0
CREATED:20181005T075558Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190610T065319Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Recap of day 1\; introduction to day 2 in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:OLTP or OLAP: why not both?
DTSTART:20190622T041000Z
DTEND:20190622T050000Z
DTSTAMP:20260425T012339Z
UID:session/SFwvwk8iyht221XdKn74Qe@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk,Intermediate,Demo
CREATED:20190515T171926Z
DESCRIPTION:+ Vitess history\n+ Vitess architecture\n+ Vitess resharding a
 nd demo\n+ VReplication explained\n+ VReplication demo\n\n### Speaker bio\
 n\nJiten Vaidya is the co-founder and CEO at PlanetScale. Prior to startin
 g PlanetScale\, Jiten held various backend and infrastructure roles at US 
 Digital Service\, Dropbox\, Youtube and Google. At Youtube\, he managed th
 e teams that operated Youtube's  MySQL databases at massive scale using th
 e open source software\, vitess.io.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122446Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/oltp-or-olap-why-not-both-S
 Fwvwk8iyht221XdKn74Qe
BEGIN:VALARM
ACTION:display
DESCRIPTION:OLTP or OLAP: why not both? in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Warm-up and walk through for audi 2
DTSTART:20190622T041000Z
DTEND:20190622T042000Z
DTSTAMP:20260425T012339Z
UID:session/LH4vCYQQCMo7qxKvRGLtvA@hasgeek.com
SEQUENCE:0
CREATED:20190610T071858Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190616T092509Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Warm-up and walk through for audi 2 in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Sponsored talk: SRE -- culture and strategy
DTSTART:20190622T042000Z
DTEND:20190622T050000Z
DTSTAMP:20260425T012339Z
UID:session/Xg7rVBvLkRDWZkXTXAXhDT@hasgeek.com
SEQUENCE:3
CATEGORIES:Crisp talk of 20 mins duration,Intermediate,Crisp talk,Intermed
 iate,Lecture
CREATED:20190609T152322Z
DESCRIPTION:The work of an SRE team is to serve a single purpose of shippi
 ng code in a fast\, reliable and economical manner. Keeping these 3 factor
 s in mind\, we proceed to understand the undermentioned use cases.\n### Ob
 servability: \n__Intent: Reliability.__\n- Metric Collection:\nWe will dis
 cuss on how we were able to collect metrics from closely guarded systems\,
  with no access to the internet by using a reverse hole punching mechanism
 .\n- Scalable Storage:\nWe started off by using Postgres as our database f
 or storing metrics. Soon enough we hit a situation where the rate of inges
 tion almost exponentially filled up our storage. We will discuss on how we
  designed this solution to push metrics to multiple storage systems withou
 t affecting existing deployments.\n- Proactive Alerting:\nObservability is
  more than just metrics collection. We will walk through certain use cases
  which helped us analyse traffic load to adjust resource allocation\, keep
  a track of all error codes sent by upstream\, and detect slowness vs disc
 onnection across networks. \n\n### Shared storage: \n__Intent: Reliability
 .__\nWe deal with deployments in closely guarded systems where we don’t 
 have control over the infrastructure. We will discuss how we utilized exis
 ting tooling to share data between services deployed across vlans.\n\n### 
 Network accessibility: \n__Intent: Cost-Reduction and Speed__\n- Proxies:\
 nNetwork accessibility would mean restricting access to certain sources. T
 he exercise of whitelisting source addresses is neither economical nor fas
 t when it comes to closely guarded systems. With the use of a transparent 
 proxy we were able to manage access easily.\nWe will discuss how Squid pro
 xy would hijack a 429 error with a 503\, leading to temporary denial of ac
 cess to the upstream service.\n- DNS:\nWe will discuss 2 war stories with 
 respect to DNS -  one where DNS resolution failed randomly and the other w
 here DNS lookup limit was reached when too many services were accessing ou
 r central monitoring solution in a short span of time.\n- File sharing:\nA
 ny deployment in a closely guarded environment would mean us having to upl
 oad files to the destination manually. We resolved this situation by imple
 menting a small service which made file access easy across such environmen
 ts.\n- Topology mapping:\nConstant manual intervention was needed to check
  if x ports were opened cross y systems in z vlans. We discuss the solutio
 ning of how we automated this task.\n\n### Infrastructure Management: \n__
 Intent: Reliability and Speed.__\nInfrastructure is the entrypoint to depl
 oy code to production. While cloud providers do make this task easy\, ther
 e are deeper problems we had to address\, such as - versioning\, locking a
 ccess to concurrent updation of resources and enabling webhooks. We develo
 ped a tool called Tessellate to do just this.\nWith an intent to give more
  power to product teams to bring up their own infrastructure without havin
 g to build the skill set\, we designed a tool called Escher which would ta
 ke a YAML file as an input and provide a fully baked infrastructure to the
  user. Escher also made automating workflows easier alongside our orchestr
 ator service.\n\n### Infosec: Authorization and Traceability:\n__Intent: C
 ost-Reduction and Reliability.__\nAny activity performed by the SRE team\,
  be it service deployment\, PR merge or infrastructure improvement\, had t
 o be tracked to ensure production systems were reliably maintained. We bui
 lt multiple authentication and authorization workflows around each of thes
 e use cases. These simple solutions enabled us to confidently allow deploy
 ments to take place. We discuss solutions such as ACL on job scheduling\, 
 2FA authentication for service deployments and LDAP for traceability.\n\n#
 ## Conclusion:\nThe core belief of an SRE team is to solve problems for th
 e larger good and not restrict ourselves to the problem at hand. Every sin
 gle tool we use was solutioned keeping this intent in mind. Each solution 
 was a step towards better debuggability and accessibility to the issues fa
 ced in production\, and each of these solutions made our on-call shifts ma
 nageable. The key takeaway from this talk would be to follow the same appr
 oach and taking a step back and thinking twice before doing something manu
 ally\, thinking whether this problem is repeatable\, reusable and can be a
 utomated. -\n\n### Speaker bio\n\nTalina is a software engineer @ Trusting
  Social. \nShe has worked on data intensive projects primarily written in 
 Java\, using Spark. \nShe was recently exposed to the world of Site Reliab
 ility Engineering\, where she worked on designing and implementing Monitor
 ing and Alerting systems for a large scale infrastructure.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122440Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/sre-war-stories-trusting-so
 cial-Xg7rVBvLkRDWZkXTXAXhDT
BEGIN:VALARM
ACTION:display
DESCRIPTION:Sponsored talk: SRE -- culture and strategy in Audi 2 in 5 min
 utes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Defensive and offensive applications of open source intelligence
DTSTART:20190622T045000Z
DTEND:20190622T055000Z
DTSTAMP:20260425T012339Z
UID:session/ZyCNupqLePjG5hcVBGdBM@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) Session,Intermediate,Birds Of Feather (B
 OF) session ,Intermediate,Discussion
CREATED:20190607T102926Z
DESCRIPTION:This Birds of a Feather session does not have a particular dec
 ided flow for discussion. All inputs\, including questions\, techniques\, 
 experiences\, war stories\, et cetera\, will be helpful for moving the con
 versation forward. However\, it should be clarified that\, for the purpose
  of this discussion\, the use of open source intelligence will not cover t
 he associated investigative or journalistic aspect\, but rather that which
  deals with potential security implications\, both from the red and blue p
 erspective.\n\n### Speaker bio\n\n-\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:BOF area - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/defensive-and-offensive-app
 lications-of-open-source-intelligence-ZyCNupqLePjG5hcVBGdBM
BEGIN:VALARM
ACTION:display
DESCRIPTION:Defensive and offensive applications of open source intelligen
 ce in BOF area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Scale MySQL beyond limits with ProxySQL
DTSTART:20190622T050000Z
DTEND:20190622T054000Z
DTSTAMP:20260425T012339Z
UID:session/5iXqt3qFLgapwkQmHVEguk@hasgeek.com
SEQUENCE:3
CATEGORIES:Intermediate
CREATED:20190402T095827Z
DESCRIPTION:- Setting up the scene: MySQL database flooded with connection
 s\, more than it can handle\n- Vision: Achieve 10x scale without 10x cost\
 n- An ideal solution?\n- Solutions available: ProxySQL\, MaxScale\, Nginx\
 , HAProxy\n- Why ProxySQL?\n- Benchmarking ProxySQL\n- Conneting the missi
 ng dots\n- Chosing an architecture for deployment and why\n- Challenges an
 d workarounds\n- The end result!\n- The Future\n\n### Speaker bio\n\nRatna
 deep Debnath AKA rtnpro works as a Site Reliability Engineer at [Zapier](h
 ttps://zapier.com). He has deep interest in Kubernetes and CNCF projects. 
 He loves contributing to Open Source and mentoring people to start their O
 pen Source journey. When he is not coding\, he likes spending time with fr
 iends and family\, practise Mantra Meditation or cooking.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122425Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/scale-mysql-beyond-limits-w
 ith-proxysql-5iXqt3qFLgapwkQmHVEguk
BEGIN:VALARM
ACTION:display
DESCRIPTION:Scale MySQL beyond limits with ProxySQL in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Log Analytics with ELK Stack (Architecture for aggressive cost opt
 imization and infinite data scale)
DTSTART:20190622T050000Z
DTEND:20190622T054000Z
DTSTAMP:20260425T012339Z
UID:session/KfMsGzN12MPosUynKJpfjA@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Beginner
CREATED:20190515T172208Z
DESCRIPTION:Business Requirements/Use Cases\n - Log analysis platform (App
 lication\, Web-Server\, Database logs)\n - Data Ingestion rate: ~300GB/day
 \n - Frequently accessed data: last 8 days\n - Infrequently accessed data:
  82 days (90 - 8 days)\n - Uptime: 99.9\n - Hot Retention period: 90 days\
 n - Cold Retention period: 90 days (with potential to increase)\n - Cost e
 ffective solution\n\nAreas of optimization\n - Application\n - Infrastruct
 ure\n\nCost Optimization\n - Replica counts and its impacts\n - How to run
  ELK on Spot instances correctly.\n - EBS Costs can be high\, how to set u
 p Hot / Cold data storage\n - Auto Scaling\n - On-demand ELK Cluster\n\nIn
 finite Data Retention\n - How to setup S3 as a hot backup\n - Recover on D
 emand\n\nNumbers/Tradeoffs\n - Cost/GB data ingested\n - Trade-offs made\n
  - DR mechanisms\n\nConclusion \n - Building a log analytics is not rocket
  science. But it can be painfully iterative if you are not aware of the op
 tions. Be aware of the trade-offs you are OK making and you can roll out a
  solution specifically optimized for that.\n\n### Speaker bio\n\nI am a De
 vOps Engineer at Moonfrog Labs.\nI have over 6 years of experience and hav
 e work with a variety of technologies in both service-based and product-ba
 sed organisations.\nNow exploring technology in gaming at its best in Moon
 frog Labs for the past 1.5 year.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122432Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/log-analytics-platform-with
 -aggressive-cost-optimisation-and-infinite-scale-KfMsGzN12MPosUynKJpfjA
BEGIN:VALARM
ACTION:display
DESCRIPTION:Log Analytics with ELK Stack (Architecture for aggressive cost
  optimization and infinite data scale) in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Morning beverage break
DTSTART:20190622T054000Z
DTEND:20190622T061000Z
DTSTAMP:20260425T012339Z
UID:session/3q9TtHy5fRRubfv889V1Se@hasgeek.com
SEQUENCE:0
CREATED:20190616T092637Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190616T092958Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Morning beverage break in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Morning beverage break
DTSTART:20190622T054000Z
DTEND:20190622T061000Z
DTSTAMP:20260425T012339Z
UID:session/YcK1R9MUTu8VQPVybQPznB@hasgeek.com
SEQUENCE:0
CREATED:20190610T070603Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190613T005220Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Morning beverage break in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of a Feather: DevSecOps
DTSTART:20190622T060000Z
DTEND:20190622T070000Z
DTSTAMP:20260425T012339Z
UID:session/P9kaK84GHbgQGZPHYyKfdU@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) Session,Intermediate
CREATED:20190406T104003Z
DESCRIPTION:We are looking to bring forth the following issues:\n\n-Challe
 nges in integrating security in a fast paced DevOps Cycle\n-Current Practi
 ces being followed for DevSecOps in their Organizations\n-How is SAST & DA
 ST placed in the lifeCycle\n-Embedding Security in the Pipeline and Automa
 tion\n-Whats different when dealing with containers and cloud\n\n### Speak
 er bio\n\nNeelu Tripathy\nShe is working as principal consultant for AppSe
 c at Thoughtworks. Her array of experience includes Penetration testing an
 d Vulnerability Assessments\, Threat Modeling and Design Reviews of web ap
 plications & APIs\, Source Code Reviews\, Configuration reviews\, Social E
 ngineering engagements and Red Teaming. She loves building and execution o
 f various threat cases & bending business logic. Currently She is focussed
  on integrating security in fast paced Agile development lifecycles and de
 livering security by building it into the product.\n\nLavaKumar Kuppan\nHe
  is the founder and primary author of the IronWASP project and various oth
 er appsec focussed tools such as Ravan\, JS-Recon\, Imposter\, etc. His pr
 oducts helps developers and admins discover security issues in their websi
 tes. He is also a security researcher with notable security advisories to 
 his name.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:BOF area - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/devsecops-P9kaK84GHbgQGZPHY
 yKfdU
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of a Feather: DevSecOps in BOF area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Sponsored talk: Functional programming and Nix for reproducible\, 
 immutable infrastructure
DTSTART:20190622T061000Z
DTEND:20190622T065000Z
DTSTAMP:20260425T012339Z
UID:session/QzS5nrxsXL9EEELfNAtuBY@hasgeek.com
SEQUENCE:3
CATEGORIES:Sponsored talk,Intermediate
CREATED:20190515T172010Z
DESCRIPTION:1. Why functions?\n2. How are functions relevant to package ma
 nagement?\n3. How are functions relevant to operating systems?\n4. Develop
 ment shells\n5. Docker without Dockerfiles\n\n### Speaker bio\n\nBrian McK
 enna is a contributor to Nix\, nixpkgs and HNix. Brian joined the Atlassia
 n Marketplace team as a Site Reliability Engineer and worked on using Nix 
 to migrate the product's services away from a custom Amazon AWS deployment
  to Atlassian's internal PaaS. Brian has since moved to Bengaluru to help 
 teach the team how to exploit functional programming effectively.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122410Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/functional-programming-and-
 nix-for-reproducible-immutable-infrastructure-QzS5nrxsXL9EEELfNAtuBY
BEGIN:VALARM
ACTION:display
DESCRIPTION:Sponsored talk: Functional programming and Nix for reproducibl
 e\, immutable infrastructure in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Network automation with Ansible
DTSTART:20190622T061000Z
DTEND:20190622T065000Z
DTSTAMP:20260425T012339Z
UID:session/Dvd75dwEPxkbm2qP5HpeGH@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate,Full talk,Intermedia
 te,Demo
CREATED:20190610T071946Z
DESCRIPTION:The talk will cover the key features like provisioning\, confi
 guration management of Networking devices and How Ansible becomes one Solu
 tion for all of it.\n\nAgenda of the talk:\n\n  - What are challenges Netw
 ork Engineers face\n  - WHY use Ansible for Network Automation to make the
 ir life simple.\n  - What are the things Ansible offers for Network Automa
 tion \n  - How to use Ansible to resolve challenges Network Engineers/Oper
 ators face everyday\n  - Live demo of Configuring Networking device with A
 nsible\n\n### Speaker bio\n\nTrishna works as Senior Software Engineering 
 at Red Hat for last 2 and half years with Ansible team. She has been an ac
 tive contributor to Ansible project for the last 3 years. She has given pr
 esentations mostly on Automation at open source conferences like Ansiblefe
 st\, DevConf.Cz etc and local meet ups. Her role at Red Hat involves devel
 oping for Ansible\, working on solutions for Network Automation. Prior to 
 Ansible\, she used to work with Fedora and Project Atomic at Red Hat.\nShe
  loves to swim and travel. \nhttps://www.linkedin.com/in/trishnaguha/\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122417Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/network-automation-with-ans
 ible-Dvd75dwEPxkbm2qP5HpeGH
BEGIN:VALARM
ACTION:display
DESCRIPTION:Network automation with Ansible in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Load Balancing : an in-depth study to scale @ 80K TPS
DTSTART:20190622T065000Z
DTEND:20190622T073000Z
DTSTAMP:20260425T012339Z
UID:session/8FwnduDBmbwMjzPbvWuBFb@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate,Lecture
CREATED:20190515T172146Z
DESCRIPTION:- Referencing the 13 yr old article of  willy tarreau ( 2006 )
 \n- 5 categories of LB\n\n- Evaluation params of LBs\n\n* DNS Load Balanci
 ng Detail\n* Layer 3/4 Loadbalancing\n* Haproxy example and monitoring par
 ams \n\n- Layer 7 Loadbalancing\n\n- Hardware and Software Routing ( setup
 s and cases of each )\n- LVS: history and implementation\n	- NAtting\n	- D
 irect Routing \n	- Tunnel Based routing\n\n- RP Filter\n- What to monitor\
 n- Interrupts handling and CPU affinity\n- HA with Keepalived and consul
 \n\n- References\n\n### Speaker bio\n\nI am involved with researching the 
 tech of the project\, and planning the setup of tech of the project in my 
 Org.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122355Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/load-balancing-in-depth-stu
 dy-to-scale-80k-tps-8FwnduDBmbwMjzPbvWuBFb
BEGIN:VALARM
ACTION:display
DESCRIPTION:Load Balancing : an in-depth study to scale @ 80K TPS in Audi 
 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Software/site reliability of distributed systems
DTSTART:20190622T065000Z
DTEND:20190622T074000Z
DTSTAMP:20260425T012339Z
UID:session/V6X23GAvJH5RrVsmnXX2CC@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk,Intermediate,Lecture
CREATED:20190517T064111Z
DESCRIPTION:Consider a sample application:\nA number that user sends an SM
 S text to of the form "Remind <date format> about <y>." When it's due\, a 
 service calls you back. User is charged for each SMS and reminders that th
 ey answer.\n\nWhere all do you think this can start failing?\n\nStatic Fai
 lures:\n\n- Disks\n- Network\n- CPU\n- Memory\n\nBehaviour Failures:\n\n- 
 Degradation\n- Latency\n- Freshness\n- Correctness\n- DDos\n\nWhat are the
  right tools and strategies to measure and monitor these failure points?\n
 What is the cost of measuring or leaving it un-measured?\n\nThere are Queu
 es in the system. How do you monitor synchronous and asynchronous architec
 tures?\n\nThe load has started to increase\, but before we discuss strateg
 ies Let's discuss CAP quickly.\nHow do we decide if we need sharding\, bet
 ter CPU or Clustering?\n\nHow do we add backups? Should they be asynchrono
 us or synchronous?\nCriteria to consider before picking up a strategy.\n\n
 So far\, we have been reactive about failures. How do we move to a proacti
 ve model?\nAnd Meanwhile\, could you trace that request from that particul
 ar user for me?\n\nAt what stage and how do we start injecting reliability
  as a part of the Software development process?\n\nLastly\, while all of t
 his is said to improve and fix things\, how do we prove that it does? How 
 do you validate that MySQL replicas come back when the master dies. The on
 ly way to know is by simulating. How do we set up Simulations? A decade ag
 o it used to be called FMEA\; now it's called Chaos Engineering.\n\nAnd oh
 \, we should also discuss Site vs Software Reliability.\n\n### Speaker bio
 \n\nI head Site Reliability Engineering at Trustingsocial.com\, where we c
 redit-score nearly half-billion users across 3 countries\, 5 datacenters\,
  3 clouds and on our way to credit-score 1-billion people across South-Eas
 t Asia.\n\nI have been working on Infrastructure Engineering for almost a 
 Decade\, from the days when things would break they would make a sound.\nI
  have had the fortune of learning these skills from some top engineers whi
 le scaling fairly large complex database systems like Cassandra\, building
  an Iaas platform\, or building our own microservice communication bus.\n\
 nThe talk is a consortium of my learnings over the past 15 years and I hop
 e that it could help engineers/architects as well.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122402Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/software-site-reliability-o
 f-distributed-systems-V6X23GAvJH5RrVsmnXX2CC
BEGIN:VALARM
ACTION:display
DESCRIPTION:Software/site reliability of distributed systems in Audi 1 in 
 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch break
DTSTART:20190622T073000Z
DTEND:20190622T083000Z
DTSTAMP:20260425T012339Z
UID:session/EHNVazYFoADzfUbB56nHEL@hasgeek.com
SEQUENCE:0
CREATED:20190610T072154Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190616T093128Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lunch break in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch break
DTSTART:20190622T074000Z
DTEND:20190622T084000Z
DTSTAMP:20260425T012339Z
UID:session/5LfuT15nwgpnQpS9BN14rf@hasgeek.com
SEQUENCE:0
CREATED:20190610T070910Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190616T092300Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lunch break in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Code Coverage Based Verification (CCBV)
DTSTART:20190622T083000Z
DTEND:20190622T093000Z
DTSTAMP:20260425T012339Z
UID:session/Q5ZLPvZZ9DQdzgmC7zsE2L@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) Session,Intermediate
CREATED:20190406T104224Z
DESCRIPTION:Current testing scenario --> disadvantages with the approach -
 -> How can code coverage based verification help --> advantages --> challe
 nges --> way forward\n\n### Speaker bio\n\nOmprakash is a Director at "Sca
 ledV Consultancy Pte. Ltd.\, Singapore. He is a Certified SAFe® 4 Program
  Consultant (SPC)\, Lean Six Sigma Black Belt (BB) and Project Management 
 Professional (PMP) with experience across Business Transformation\, Agile 
 Software Development\, Lean Six Sigma Implementation\, Reengineering\, Pro
 ject Management\, Coaching and Trainings in domains like Healthcare\, Ener
 gy Management and Embedded Systems.\n\nHis expertise lies in helping clien
 ts achieve Enterprise Agility through Agile Adoption Consultation\, Proces
 s Definition\, Training and Coaching of Scrum Masters\, Product Owners and
  Development Team.\n\nHe is instrumental in transitioning and transforming
  organisation process and practices to create an ecosystem that can help a
 chieve Enterprise Agility.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:Room 01 for BOFs - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/code-coverage-based-verific
 ation-ccbv-Q5ZLPvZZ9DQdzgmC7zsE2L
BEGIN:VALARM
ACTION:display
DESCRIPTION:Code Coverage Based Verification (CCBV) in Room 01 for BOFs in
  5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Sponsored talk: Decomposing a monolith -- engineering and operatio
 nal strategies we have gleaned from our experience at Endurance
DTSTART:20190622T084000Z
DTEND:20190622T092000Z
DTSTAMP:20260425T012339Z
UID:session/3i3tZCizAM2c1hZ9hMipzu@hasgeek.com
SEQUENCE:3
CATEGORIES:Sponsored talk,Intermediate,Full talk,Intermediate,Lecture
CREATED:20190616T093432Z
DESCRIPTION:Our APAC story in identifying and addressing the key issues ar
 ound moving ~$70 million dollar monolithic Domain provisioning & Billing p
 latform to microservices:\n\n* Need for micro-services\n\n* Common mistake
 s\n\n* Managing the transition\n\n* Scaling\, Redundancy and Deployments\n
 \n### Speaker bio\n\nSudheer Kumar Meesala has spent the last few years de
 signing and building scalable and secure web applications in the Finance a
 nd Internet industries. A large part of his job has included decomposing m
 onolithic legacy applications into microservices. This has required a deep
  understanding of PostgreSQL\, Cassandra and other NoSQL databases. Other 
 key areas of interest are container orchestration\, DevOps and more. He li
 ves in Bangalore\, India and spends far too much time in traffic jams.\n\n
 He is an accomplished speaker and trainer\; Co-author of "PostgreSQL 11 Ad
 ministration Cookbook".\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122348Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/decomposing-a-monolith-engi
 neering-and-operational-strategies-we-have-gleaned-from-our-experience-at-
 endurance-3i3tZCizAM2c1hZ9hMipzu
BEGIN:VALARM
ACTION:display
DESCRIPTION:Sponsored talk: Decomposing a monolith -- engineering and oper
 ational strategies we have gleaned from our experience at Endurance in Aud
 i 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of a Feather: Security paranoid OS
DTSTART:20190622T084000Z
DTEND:20190622T094000Z
DTSTAMP:20260425T012339Z
UID:session/3Z4r9VZecG6u8aL7NefDSv@hasgeek.com
SEQUENCE:2
CATEGORIES:Beginner
CREATED:20190423T065616Z
DESCRIPTION:In the wake of one data breach after another\, and in this age
  of surveillance\, security has become serious business. The trust on the 
 big giants like Facebook\, Google\, etc has diminished over the years. Sec
 urity has been a huge concern in the recent times for many of us\, and a l
 ot of them have grown a valid paranoia around security and privacy. The te
 rm "valid" signfies just not be a paranoid but to be methodical in your ac
 tion. \n\nAs we grow dependent more and more on internet-based services\, 
 the more vunerable are we becoming to exploits\, and you can easily notice
  how in the recent times the exploits has affected a large number of peopl
 e.\n\nAnd\, there could be no better place to start than your OS itself. T
 here has been a growing list of OS targeted towards security. There are bu
 nch of options these days\, like TailOS\, QubeOS\, Silverblue\, Whonix etc
  each behaving a bit differently but trying to acheive the same goal\, Sec
 urity & Privacy\n\nWe gather to discuss our ideas and concerns on this top
 ic\, discuss our methods\, how we compartmentalize applications to fight v
 ulnerabilties.\n\n### Speaker bio\n\nSayan works with the Community Platfo
 rm Engineering Team at Red Hat. His day to day work involves dabbling with
  container technologies and building Fedora CoreOS. He is a open source ev
 angelist and contributes to various open source projects regularly. When n
 ot in front of the computer\, he spends time cycling\, playing outdoor spo
 rts or travelling around.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:BOF area - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/security-paranoid-os-3Z4r9V
 ZecG6u8aL7NefDSv
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of a Feather: Security paranoid OS in BOF area in 5 minu
 tes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Virtuous Cycles: Enabling SRE via automated feedback loops
DTSTART:20190622T084000Z
DTEND:20190622T092000Z
DTSTAMP:20260425T012339Z
UID:session/MUtdYsAzKUJqWfQtJCsaCs@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate,Full talk,Intermedia
 te,Lecture
CREATED:20190604T143326Z
DESCRIPTION:In pictures we will show a journey of instrumentation - how on
 e can use app-level telemetry and tracing to build confidence that your au
 to-remediating strategies are doing the right things. Case studies include
 :\n\n- Intelligent query timeouts that allow loaded workers to recover\n- 
 A backoff and jitter system for controlling thundering-herd on an internal
  service\n- Watermark-based quota system for shaping traffic on a multiten
 ant cluster\n\nWe will show that using open-source tooling\, and good obse
 rvability practices\, you can make an opaque part of your system that is o
 perationally taxing into a well-behaved component\, that remediates itself
 . We take a very visual approach to telling these stories - so expect grap
 hs and lot of them! \n\nUltimately\, we want to give audience a framework 
 and strategy to answer these questions:\n- Is an ops procedure worth autom
 ating?\n- How to get good feedback from internal telemetry in your applica
 tion?\n- How to use this feedback to drive auto-remediation?\n- And most i
 mportantly\, how to experiment on all this\, without breaking production :
 )\n\n### Speaker bio\n\nAaditya Talwai is a Site Reliabilty Engineer at Co
 nfluent and former Lead Software Engineer at Datadog. His work has focused
  on large-scale monitoring systems and the words\, pictures\, and tools we
  use to tell stories about our software systems. At Datadog\, he helped ar
 chitect a cloud-scale distributed tracing and APM tool\, bringing together
  the three pillars of observability - metrics\, traces\, and logs. At Conf
 luent\, he works on a unified cloud platform for event streaming\, includi
 ng the observability and automation strategies needed to guarantee a highl
 y-available\, elastic\, multitenant cluster. He is enthusiastic about help
 ing SRE teams understand their systems\, and deploy apps that heal themsel
 ves\, through great observability practices and a culture of experimentati
 on.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122336Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/virtuous-cycles-enabling-sr
 e-via-automated-feedback-loops-MUtdYsAzKUJqWfQtJCsaCs
BEGIN:VALARM
ACTION:display
DESCRIPTION:Virtuous Cycles: Enabling SRE via automated feedback loops in 
 Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Virtual nodes to auto-scale applications on Kubernetes
DTSTART:20190622T092000Z
DTEND:20190622T094500Z
DTSTAMP:20260425T012339Z
UID:session/X1QVL8L4jyQ2c7vYGbjw18@hasgeek.com
SEQUENCE:3
CATEGORIES:Advanced
CREATED:20190409T055551Z
DESCRIPTION:Let's see a demo application using ServiceMonitor for Promethe
 us\, a HPA\, and a custom container that will count the instances of the a
 pplication and expose them to Prometheus. Finally\, Grafana dashboard to v
 iew the metrics in real-time.\n\n### Speaker bio\n\nVivek is a technophile
  and an Open Source contributor with around 13 years experience in the Sof
 tware Industry and works at Microsoft as Sr.Product Marketing Manager. In 
 his previous role\, he has mentored startups/developers\, speaker at confe
 rences/meetups for DigitalOcean as Senior Developer Advocate. He was also 
 heading DevOps and QA at BlackBuck and was a DevOps Solution Architect at 
 HCL (Australia) in client engagement and pre-sales roles. Vivek started hi
 s career with IBM Rational (India Software Labs) as a Software Developer a
 nd is passionate about working with the software developer.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122321Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/virtual-nodes-to-auto-scale
 -applications-on-kubernetes-X1QVL8L4jyQ2c7vYGbjw18
BEGIN:VALARM
ACTION:display
DESCRIPTION:Virtual nodes to auto-scale applications on Kubernetes in Audi
  1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Scalable distributed systems from grounds up in Elixir
DTSTART:20190622T092000Z
DTEND:20190622T100000Z
DTSTAMP:20260425T012339Z
UID:session/HitwMKgtw2Aihwv2BFdJ9J@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk,Intermediate,Lecture
CREATED:20190607T103022Z
DESCRIPTION:The outline of the talk would be roughly as follows:\n1. Discu
 ssion of the erlang/elixir process model\n2. Discussion of GenServers (oth
 er OTP constructs if required) \n3. Discussion on distributed erlang\n4. C
 ycling through live game show architecutures\n\n### Speaker bio\n\nUdit is
  a software engineer at nilenso\, the Bangalore based software co-op consu
 ltancy. He <3s clojure\, elixir and emacs.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122328Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/scalable-dist-sys-from-grou
 nds-up-in-elixir-HitwMKgtw2Aihwv2BFdJ9J
BEGIN:VALARM
ACTION:display
DESCRIPTION:Scalable distributed systems from grounds up in Elixir in Audi
  2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Infrastructure as Code BOF
DTSTART:20190622T094000Z
DTEND:20190622T104500Z
DTSTAMP:20260425T012339Z
UID:session/3zb2tzBsDYz3FAGzcLyor2@hasgeek.com
SEQUENCE:0
CREATED:20190619T170034Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190619T170045Z
LOCATION:Room 01 for BOFs - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Infrastructure as Code BOF in Room 01 for BOFs in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Bug bounties for organizations
DTSTART:20190622T094000Z
DTEND:20190622T104500Z
DTSTAMP:20260425T012339Z
UID:session/RHXe15esFT29bm8Qg81quK@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds Of Feather (BOF) session ,Intermediate,Discussion
CREATED:20190613T110415Z
DESCRIPTION:This session will be run in an unorganized manner however some
  key points of discussion we think would be useful are:\n\n1. Should an or
 ganization be getting into bug bounty. if yes when do you know you are rea
 dy\n2. How to convince the management about launching bug bounties\n2. Wha
 t would be a better choice going independent or joing a platform\n3. How d
 o you decide payouts (money\, swag\, wall of fame)\n4. Real life challenge
 s faced while running bug bounty programs\n5. How to handle bug triaging\n
 6. How to handle respectful communications and enforce rules\n\nThe discus
 sion will revolve around bug bounties however we will not be covering bug 
 hunting as part of this discussion.\n\n### Speaker bio\n\nShadab Siddiqui\
 , Ankur Bhargava\, Shubham Mittal\, Anant Shrivastava and Prateek Tiwari w
 ill facilitate this session.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:BOF area - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/bug-bounties-for-organizati
 ons-RHXe15esFT29bm8Qg81quK
BEGIN:VALARM
ACTION:display
DESCRIPTION:Bug bounties for organizations in BOF area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Flash talks: by participants
DTSTART:20190622T094500Z
DTEND:20190622T101000Z
DTSTAMP:20260425T012339Z
UID:session/MpX1ve738fU2F62Vhhr2Xm@hasgeek.com
SEQUENCE:0
CREATED:20190610T071143Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190616T092311Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Flash talks: by participants in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Evening beverage break
DTSTART:20190622T100000Z
DTEND:20190622T103000Z
DTSTAMP:20260425T012339Z
UID:session/GBdj2nVco6tiwcbUTs1YN6@hasgeek.com
SEQUENCE:0
CREATED:20190610T072454Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190616T093553Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Evening beverage break in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Kafka streams at scale
DTSTART:20190622T101000Z
DTEND:20190622T105000Z
DTSTAMP:20260425T012339Z
UID:session/4uXhyFsDB6sMZPf1PbH4q2@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Advanced
CREATED:20190327T104225Z
DESCRIPTION:Problem Statement: Stateful Realtime Processing of multi-milli
 on events.\n\n1. Intro Kafka Streams and event flow (2 slides)\n2. Challen
 ges in Kafka Streams\n   a. Fault Recovery\n   b. Horizontal Scalability\n
    c. Cloud Readiness\n   d. Restricted RocksDB\n   e. Large Clusters\n3. 
 Lay a background on why are these a challenge.\n4. How we forked the code 
 to solve each of these over the past year.\n5. Conclusion \n6. Future Work
 s\n\n### Speaker bio\n\nDeepak is working at Walmart Labs as a software en
 gineer in the Customer Backbone team where multi-millions events need to b
 e processed in real-time. He’s promoting the event-driven architecture\,
  enabled by a “Distributed NoSQL DB and Streaming Platform” based on K
 afka Streams that the team is working on. He’s now working on a Distribu
 ted Graph Algorithm using the event-driven architecture.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122314Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/kafka-streams-at-scale-4uXh
 yFsDB6sMZPf1PbH4q2
BEGIN:VALARM
ACTION:display
DESCRIPTION:Kafka streams at scale in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:eBPF: exploring use case of BPF kernel infrastructure
DTSTART:20190622T103000Z
DTEND:20190622T111000Z
DTSTAMP:20260425T012339Z
UID:session/6Qrun9XEJsmSHuK6EatVZh@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate,14 May  
CREATED:20190603T125656Z
DESCRIPTION:- Introduction to eBPF\n    - What is eBPF?\n        - tcpdump
 : Beginning of BPF\n    - eBPF use cases \n        - Networking: XDP\, AF_
 XDP\n            - Why XDP: Comparison/benchmark data bw existing packet f
 iltering(iptables) and high performance network data path(DPDK) \n        
     - When should you use XDP: Practical use-case in production. \n       
  - Tracing: bcc-tools\, Bpftrace\n            - Overview of ebpf tracing t
 ools and existing tracing tools.\n            - Writing bpftrace program t
 o trace kernel\n        - Other scenarios and developing your own use-case
 \n    - eBPF Architecture \n        - Overview of in-kernel vm and verifie
 r.\n        - How does a eBPF program looks like?\n    - Security aspect o
 f eBPF\n        - Features of ebpf bytecode verifier\n        - Seccomp BP
 F\n - Q & A\n\n### Speaker bio\n\nPerformance engineer at Redhat. Currentl
 y working on improving kernel networking performance. Open source enthusia
 st. Co-organizer/Volunteer of India Linux User group Delhi.\n\nPrevious ta
 lks: \nHow command line params are parsed(ILUG-D): http://slides.com/tksou
 rabh/how-command#/\nBasics: Logging in python(PyDelhi): https://slides.com
 /tksourabh/basics-logging-in-python#/\nGithub: https://github.com/sourabht
 k37/\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122305Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/ebpf-exploring-usecase-of-b
 pf-kernel-infrastructure-6Qrun9XEJsmSHuK6EatVZh
BEGIN:VALARM
ACTION:display
DESCRIPTION:eBPF: exploring use case of BPF kernel infrastructure in Audi 
 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Evening beverage break
DTSTART:20190622T105000Z
DTEND:20190622T112000Z
DTSTAMP:20260425T012339Z
UID:session/S1LWU9ebV8em8fQ4XhLF9H@hasgeek.com
SEQUENCE:0
CREATED:20190610T071312Z
DESCRIPTION:\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20190616T092315Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Evening beverage break in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Automate your IX’s RS Config
DTSTART:20190622T111000Z
DTEND:20190622T113500Z
DTSTAMP:20260425T012339Z
UID:session/7xpvRGUmiXJwBQ2cgVV6Pj@hasgeek.com
SEQUENCE:2
CATEGORIES:Full talk,Beginner,Lecture
CREATED:20190613T005541Z
DESCRIPTION:Talk covers the use of open source project Arouteserver for ge
 nerating bird config. This makes it easy an internet exchange operator to 
 run and operate an IX without much effort on config or updating the filter
 s manually.\n\n### Speaker bio\n\nAnurag Bhatia is a Network Researcher at
  Hurricane Electric. He's also volunteering for running tech platform at B
 haratIX in Mumbai.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20230810T072606Z
LOCATION:Audi 2 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/automate-your-ixs-rs-config
 -7xpvRGUmiXJwBQ2cgVV6Pj
BEGIN:VALARM
ACTION:display
DESCRIPTION:Automate your IX’s RS Config in Audi 2 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:POLARDB architecture
DTSTART:20190622T112000Z
DTEND:20190622T120000Z
DTSTAMP:20260425T012339Z
UID:session/6ngi97MxskoGoKtL3XzCx8@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Intermediate,Full talk,Intermedia
 te,Lecture
CREATED:20190610T092532Z
DESCRIPTION:See link to slides from an earlier presentation.\n\n### Speake
 r bio\n\nØystein Grøvlen is a Senior Staff Engineer in Alibaba Cloud\, w
 here he works in the Database Products Group.\n\nBefore joining Alibaba\, 
 Øystein worked for 10 years in the MySQL optimizer team at Sun/Oracle. At
  Sun Microsystems\, he was also a contributor on the Apache Derby project 
 and Sun's Architectural Lead on Java DB. Prior to that\, he worked for 10 
 years on development of Clustra\, a highly available DBMS.\n\nØystein has
  been talking about the MySQL Optimizer at several conferences over the ye
 ars. Dr. Grøvlen has a PhD in Computer Science from the Norwegian Univers
 ity of Science and Technology. Øystein is a native Norwegian\, but curren
 tly lives in Hangzhou\, China.\n
GEO:12.94319058684005;77.59623119607569
LAST-MODIFIED:20240123T122256Z
LOCATION:Audi 1 - NIMHANS Convention Centre\nBangalore\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019/schedule/polardb-architecture-6ngi97
 MxskoGoKtL3XzCx8
BEGIN:VALARM
ACTION:display
DESCRIPTION:POLARDB architecture in Audi 1 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
END:VCALENDAR
