Rootconf is a platform to discuss real-world problems around Site Reliability Engineering (SRE), DevOps for data engineering platforms, evaluating and adopting technologies such as Kubernetes and containers, and DevSecOps.
Rootconf Delhi edition will be held on 18 January 2020 at the India International Centre (IIC).
Speakers from Flipkart, Hotstar, MindTickle, Red Hat and Naukri.com will discuss the following topics:
Scaling and engineering challenges from Hotstar’s and Flipkart’s experiences.
Data store choices.
Kubernetes and K8s -- when to choose what and why?
DevSecOps
##Who should attend Rootconf:
Operations engineers
DevOps programmers
Software developers
SRE
Tech leads
To know more about Rootconf, check the following resources:
For information about the event, tickets (bulk discounts automatically apply on 5+ and 10+ tickets) and speaking, call Rootconf on 7676332020 or write to info@hasgeek.com.
Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective). more
##We are accepting talks on the following topics: Monitoring, logging and alerting -- running small-scale and large-scale systems Automating infrastructure management: tooling and architecture Infrastructure as code expand
##We are accepting talks on the following topics:
Monitoring, logging and alerting -- running small-scale and large-scale systems
Automating infrastructure management: tooling and architecture
Infrastructure as code
Network management, network security and network engineering
Architecting for the cloud
##Types and duration of talks:
Full talks: 40 mins duration including Q&A
Crisp talks: 20 mins duration including Q&A
Birds of Feather (BOF) sessions of 1 hour duration
Hands-on workshops, of 3-6 hour duration.
You can also suggest a topic for someone else to speak/teach a workshop. If we find a speaker/trainer for the topic you proposed, we will send you a Rootconf t-shirt.
##Participant profiles at Rootconf Delhi include:
Operations engineers
DevOps programmers
Software developers
SRE
Tech leads
This profile will help you to understand who will be the audience for your talk, and therefore, how you should structure you talk and takeaways.
##We don’t accept:
How-to and introductory-level talks.
Tooling talks without a clear problem statement. Instead, tell us what problems the tool solves for you, and why you advocate community members to use the tool.
Proposals where source code is closed or where you cannot reveal code and implementation details.
##Guidelines for submitting proposals for Rootconf Delhi:
Write the proposal in gender neutral language. Use the words ‘they/them’ instead of ‘he/she’.
Explain the problem you are solving when submitting a proposal. We give weightage to novelty of problems and problem-solving approaches.
Focus on narrowing down what the audience will learn from your talk. The best way to do this is by putting yourself in the audience’s shoes: what do you want to learn (that will make you a better practitioner) if you were in the audience listening to your own talk?
Provide implementation details. But the implementation details -- code samples, architecture approach, etc -- in the context of the larger problem you are solving.
Never lose sight of the problem!
Note that reviews will carried out on the proposal pages only, as comments. Proposers must check their proposals for new comments, and to respond to earlier comments.
We pay an honorarium of Rs. 3,000 to speakers. Confirmed speakers also get a pass to the conference and a discount code which they can share with their colleagues, communities they are part of, and on social media channels. We do not provide free passes for speakers’ colleagues and spouses. Please don’t ask us for this.
Travel grants are available for international and domestic speakers based on the event’s budget. If you require a grant, mention it in the field where you add your location.
##Last date for submission is 30 November, 11:59 PM
If you have queries, write to rootconf.editorial@hasgeek.com
As security analysts, we are often on the offensive side of things; trying to find out the universal contraints under which a system will say nothing by “Sorry” (not sponsored by Justin Beiber). However, as a software engineer, we are on the other side of Select City Walk, oftentimes confused as to how we landed there: the defence. It’s a constant battle of the fittest and the losing side loses (… more
Istio is an open source independent service mesh which hepls us securing and monitoring our applications on a Kubernetes cluster. I will discuss the benefits of using Istio with a kubernetes deployment. more
1 comment
Submitted
08 Aug 2019
Section: Workshop (3-6 hours duration)Category: Monitoring and logging
This session will have key takeaways and tangible lessons that participants can apply as growth levers within their own companies. We will secure the Kubernetes cluster and the applications deployed on it with Istio and Auth0. In microservices-based architecture, authentication becomes one of the crucial things to keep in mind. We learn to integrate Istio with Auth0 to secure our applications run… more
How at SRIJAN we solved the real world problems of running CMS (Drupal) on kubernetes by writing an Operator. How can operators help in running stateful applications on kubernetes. What are the various approaches on writing operators, SRIJAN’s journey in writing an operators covering our pitfalls and learnings. A live demo of our operator which will be opensourced soon. more
This talk foucuses on designing resilent solutions in Azure with region level reduntancy so that even if an entire region goes down our services would still remain operational. In this talk I will take the audience through the journey of building a photo sharing app which would be very resilent with region specific features etc. more
Abstract Kubernetes is currently the most popular container orchestration engine of choice, but its security is debatable. There are some vulnerabilities that have already been discovered in Kubernetes and Docker. The question that arises is what are the potential risks of these vulnerabilities to the application/business, and how we can go about fixing these. more
In Flipkart’s cloud environment thousands of developers keep adding new applications/features to the existing tech ecosystem which makes it ever evolving. In system like this how do you find answers for challenges like: more
11 comments
Confirmed & scheduled
06 May 2019
Section: Crisp talkTechnical level: IntermediateSession type: LectureSection: Crisp talk (20 mins)Category: Distributed systemsSection: Full talk (40 mins)Category: Distributed systems
Kubernetes continues to take the world by the storm every passing day. But at the same time, it continues to be fairly complex beast to tame, manage and be beneficial to the businesses. more
9 comments
Rejected
20 Oct 2019
Section: Full talk (40 mins)Category: Systems engineering
Organizations with multiple teams generally end up with different applications that manage it’s own database interactions. This approach would be fine at a smaller scale but as we move forward towards a large scale, the situation will become more error-prone. Because now each application needs to either deploy experts in each team or build expertise to make the data available, consistent and usab… more
7 comments
Rejected
27 Oct 2019
Section: Crisp talk (20 mins)Category: Distributed systems
Blockchain is one of the emerging technologies which is making it’s way into different sectors such as banking and health care industries. The application and adoption of Smart Contract is spreading because it aids to solving real life problems. The session will talk about the era of Smart Contracts from the time it first came into existence to the time it is being used for solving various proble… more
Freshworks products were hosted in two data centers in Europe, viz. Ireland and Frankfurt. We launched Ireland data center in 2015 and Frankfurt in 2017 due to business requirements. As soon as we launched Frankfurt, existing customers from Ireland region wanted to move to the Frankfurt. Frankfurt also has better security and data isolation policies comparatively. We could save up on infrastructu… more
The focus of this session will be on the journey of the containerization technology since 1974 (The First Container) to the container native storage. How containers evolved year by year and became an invariable solution for isolating applications at the operating system level, although you can also isolate an entire operating system inside a container, if you’d like Journey of a Linux container f… more
Kubernetes is dominating the containerization space. A lot of people find it quite daunting to jump to kubernetes Bandwagon. There is a real need of instructor led workshop for people to get introduced to the world of kubernetes and containerization in general. more
Gone are the days when people used to think a project has distinct phases of development and maintenance. Even agile teams have a development window during which the processes are different from the ones followed after a first release. I have observed the most successful ones were the ones which treat every project as a maintenance project from day one. This means building security, monitoring, l… more
This talk covers our journey of building an MQTT based Pubsub system for 50M concurrent socket connections, the challenges faced and the architecture that powered Hotstar’s realtime social features for IPL 2019. more
3 comments
Confirmed & scheduled
26 Nov 2019
Section: Full talk (40 mins)Category: Distributed systems
The main problem we were facing at Zomato that it takes 1-2 month to take a ML model live. Data scientists and ML engineers work on a variety of problems at Zomato such as predicting kitchen preparation time (time taken by the restaurant to prepare the food given the live order state of the kitchen), predicting rider assignment time (time to assign a free rider to pick up the order given the real… more
5 comments
Confirmed & scheduled
27 Nov 2019
Section: Full talk (40 mins)Category: Systems engineering
Abstract: AWS is the most widely used cloud environments today and almost every security professional has to encounter this environment whether you are attacking an organization or defending it. In this fast-paced workshop, we will teach participants with some neat tools, techniques, and procedures to attack the most widely used AWS services as well as to defend them. Below is the broad agenda fo… more
With the world moving towards containerisation, Kubernetes has become one of the de facto. Kubernetes lets you deploy applications in ways that are highly available and resilient, and can utilize the underlying resources more efficiently. Though there are many hosted Kubernetes solutions out there in the market, nitty-gritty of running the clusters lies in the hands of infrastructure team. Some o… more
6 comments
Under evaluation
30 Nov 2019
Section: Full talk (40 mins)Category: Systems engineering
With growing traffic and user base, the request for new features also grows exponentially. It’s very crucial that the development, deployment process grows along the way to sustain. When it comes to Kubernetes and containers it may feel like overwhelming at the beginning. But the efforts worth it to invest time. more
When Vitess was migrated to run from bare-metal into Google’s cloud, it was deployed as a regular stateless application. This meant that a process reschedule resulted in all the local data being wiped. more
0 comments
Confirmed & scheduled
19 Dec 2019
Section: Full talkTechnical level: BeginnerSession type: Lecture
Traditionally to implement CI/CD we pick up several tools like bitbucket or Github for source code management, Jenkins or Travis for CI , Jira for issue tracking, Nexus or Jfrog artifactory and as matured the application become the options become even more wider. As an organisation to have license or maintain these many tools is an overhead in terms of cost as well as time. more
Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective). more