Submissions
Call for round the year submissions for Rootconf in 2020

Call for round the year submissions for Rootconf in 2020

Submit a proposal at any time in the year on DevOps, infrastructure security, cloud, and distributed systems. We will find you a suitable opportunity to share your work.

Make a submission

Submissions are closed for this project

Submission guidelines

We do not accept: How-to and introductory-level talks. We are interested in discussing the “whys” and “approaches” rather than “how-to”. Talks that have been covered in previous editions of Rootconf. Refer to https://hasgeek.tv/rootconf/ for all talks covered between Rootconf 2012 and 2018.expand

We do not accept:

  1. How-to and introductory-level talks. We are interested in discussing the “whys” and “approaches” rather than “how-to”.
  2. Talks that have been covered in previous editions of Rootconf. Refer to https://hasgeek.tv/rootconf/ for all talks covered between Rootconf 2012 and 2018.
  3. Proposals where code used for implementation is not demonstrated. Ideas are great, but it is the implementation that matters. Don’t talks to us about fantastic ideas. Tell us real stories of implementations – patterns and anti-patterns.

The next edition of Rootconf annual conference will be held on 21 and 22 June, in Bangalore. More details are available here: https://hasgeek.com/rootconf/2019/

Make a submission

Submissions are closed for this project

Submissions

PR

Paul Rajesh

Leveraging Machine Learning to Reduce Mean Time to Identify and Resolve Issues when handling Systems/Applications at Scale

“Our fascination with the use of computing power to augment human decision-making has likely outgrown even the tremendous advances made in algorithmic approaches,”said Christian Beedgen, Co-founder and CTO, Sumo Logic. “In reality, the successful use of AI and related techniques is still limited to areas around image recognition and natural language understanding, where input/output scenarios can… more
  • 6 comments
  • Rejected
  • Thu, 07 Mar
Section: Full talk Technical level: Intermediate
GV

Goutham Veeramachaneni

Prometheus: Solving monitoring for EVERYONE

Prometheus, now a graduated CNCF project, is the de facto leader in the monitoring and metrics space being used by 1000s of companies in the world. With the 2.0 launch nearly a year behind us, we are now focused on making Prometheus boring. i.e, more stable, more usable and even MOAR user friendly! more
  • 1 comments
  • Awaiting details
  • Thu, 14 Feb
Technical level: Intermediate
GV

Goutham Veeramachaneni

Grafana Loki: like Prometheus, but for logs

Loki is a horizontally-scalable, highly-available log aggregation system inspired by Prometheus. It is designed to be very cost effective and easy to operate, as it does not index the contents of the logs, but rather labels for each log stream. more
  • 1 comments
  • Awaiting details
  • Thu, 14 Feb
Technical level: Beginner
Evren Cakir (@evrenc) (proposing)

Implementing a real-time serverless data pipeline

Build a production ready, highly available/scalable, real-time data pipeline using AWS managed services including Lambda, Step Functions and the serverless.com framework for fully automated blue/green deployments. more
  • 0 comments
  • Under evaluation
  • Sat, 23 Feb
Technical level: Intermediate
BE

Bharadwaj Embar

Secrets management across Microservices with HashiCorp Vault

In today’s world of web scale applications, secrets management is a daunting task and is often overlooked, until the product is evaluated for Compliance certifications. Often times, this overhead usually falls on the Execution Platform team as rotation of secrets must also ensure that there is no downtime in the product. The kind of secrets can range from key/value pairs, cloud access credentials… more
  • 6 comments
  • Rejected
  • Mon, 01 Apr
Section: Full talk Technical level: Intermediate
PY

Prakshi Yadav

Automated hyper-scalable Big data pipelines

Processing big data with maximum speed and minimum time is what every organization strives for nowadays. Cluster computing frameworks play a major role in handling data in such use cases and to serve long term goals they require Data Pipelines to be built around them. This session walks through solutions for deploying cloud native, scalable, event-driven and fault tolerant data pipelines. more
  • 3 comments
  • Waitlisted
  • Thu, 18 Oct
Section: Crisp talk Technical level: Intermediate
BS

Barani Subramanian

Firebolt: Asynchronous Processing System for Payments

At Flipkart Payments we build robust systems to provide a smooth experience to customers. In this session, we’ll talk about how we levarage aysnchronous processing to improve the performance of the payment systems which are pivotal to Flipkart. We’ll go over the details of the streaming pipelines we built using MySQL, Hbase, Kafka and Storm, and the customization we did over them. We’ll share our… more
  • 1 comments
  • Rejected
  • Thu, 21 Feb
Section: Crisp talk Technical level: Intermediate
AA

Abhishek A Amralkar

Mocking Production like Environment using Terraform, Packer and Jenkins

HashiCorp Terraform is a one of the most powerful infrastructure management tools available. We can perform the CRUD operations on infrastructure—all with a single command. more
  • 2 comments
  • Submitted
  • Wed, 03 Apr
Section: Full talk Technical level: Intermediate
MP

Manu PK

When to stay with modular monoliths over microservices

Microservices architecture style has been a prominent talking points over the last few years. Microservices is by no means a silver bullet though, and the design thinking required to create a good microservices architecture is the same as that needed to create a well-structured monolith. This talk briefly covers characteristics of microservices, monoliths and modular monoliths. We will discuss th… more
  • 3 comments
  • Rejected
  • Fri, 05 Apr
Section: Full talk Technical level: Intermediate
pv

priyanka vergadia

Best practices to secure applications in cloud

Security in cloud should be approched a little differently than traditional on-premise security. In cloud, security is a shared responsibility of the customer and the cloud service provider. This talk with highlight how one should secure the applications and infrastructure in cloud. more
  • 1 comments
  • Rejected
  • Sun, 07 Apr
Section: Full talk Technical level: Beginner
PA

Paritosh Anand

Deployment Automation Framework | A Platform Agnostic Approach

Automated deployments has always been a complex topic considering diverse nature of tech stacks and infrastructure platforms. more
  • 6 comments
  • Submitted
  • Thu, 11 Apr
Section: Crisp talk Technical level: Intermediate
AP

Amit Patil

Transformation from zero to shipping Production code daily

The advent of DevOps has revamped the traditional application development process in a drastic way. The software industry is rapidly seeing the value of moving away from conventional ways of releasing code to more matured workflows enabling them to move faster. We have seen a big transformation on how code is build, developed and executed. Journey from manual builds to script based deployment, sc… more
  • 4 comments
  • Submitted
  • Mon, 15 Apr
Section: Full talk Technical level: Advanced
Akshay Mathur (@awkshwayrd) (proposing)

Deploying greenfield JVM microservices on Kubernetes on-premise with a service mesh WITHOUT Openshift or CloudFoundry

Lessons learned from deploying open source Kubernetes in a traditional financial data center without a supported vendor implementation (no IBM, RedHat, or Google support) Intended audience - anyone interested in Kubernetes Expected outcome - A good discussion around the philosophy and operational capabilities needed to deploy microservices on-prem on Kubernetes more
  • 2 comments
  • Submitted
  • Tue, 16 Apr
Section: Full talk Technical level: Beginner
PK

Pavan S Kaushik

Application Services for Operationalizing Kubernetes in the Multi-Cloud world

There is immense interest and growing adoption of container ecosystems today, with Kubernetes being an easy and popular choice for enterprises. However, there are a variety of choices of underlying infrastructure ecosystems that Kubernetes can run on. Typical large enterprises in the real-world today also run in Multi-Cloud enviroments. more
  • 2 comments
  • Submitted
  • Tue, 16 Apr
Section: Full talk Technical level: Intermediate
VM

Vanshit Malhotra

ANTIVIRUS BYPASSING FOR FUN AND PROFIT

Why This Presentation? Everyone uses Antivirus systems and believes in them to protect us against cyber threats. Antivirus systems are very important to us. They stand as the major protection mechanism for our computers and confidential data. more
  • 0 comments
  • Submitted
  • Thu, 18 Apr
Section: Full talk Technical level: Intermediate
jt

jatin thapar

GraphQL @ Scale

Modern web servers need to cater to multiple clients on web, mobile and desktop. The views across the clients vary a lot, so same server API response across all clients is not optimal. GraphQL offers a powerful technology for building web API’s which enables clients to query data which they want and how they want without compromising on the performance. more
  • 6 comments
  • Submitted
  • Thu, 18 Apr
Section: Full talk Technical level: Intermediate
im

ishaan malik

Data Visualization In Machine learning and Model training

Talking about the python packages and using seaborn and other packages for Data Visualization in Machin Learning as a data analyst , hands on about training a Machine Learning Model and about data warehouse . more
  • 3 comments
  • Submitted
  • Fri, 19 Apr
Section: Workshop Technical level: Beginner
KK

Kunal Kerkar

Orchestration with Kubernetes

I’ll talk about how we built and now run karix.io using docker containers. It covers the entire engineering effort undertaken and how and why we got here based on past learning and experiences. more
  • 6 comments
  • Submitted
  • Tue, 23 Apr
Section: Full talk Technical level: Intermediate
im

ishaan malik

Singularity container solution for compute based workloads

Workshop on using Singularity to enable Scalable interactive workflow and Generalised GPU support in Singularity . more
  • 3 comments
  • Submitted
  • Tue, 23 Apr
Section: Workshop Technical level: Beginner
RM

Ramanathan Muthaiah

Automated on-boarding of software projects using Jenkins v2.x Pipeline

Audience will be introduced to the concept of Jenkins v2.x Pipeline-as-code. This will be followed by hands-on with respect to initiation of simple project, using Groovy code, setup software project in the continuous integration infrastructure. From the simple to complex task of integrating Jenkins Pipeline with standalone build scripts, attendees, who are CI/CD practitioners, will be able to app… more
  • 0 comments
  • Submitted
  • Sun, 28 Apr
Section: Workshop Technical level: Beginner Session type: Workshop
NC

N. CHATURV3DI

Paving the way for verification of distributed systems

From our undergraduate courses, we are familiar with the notion finite-state automata (also known as finite-state machines or, simply, state machines), which are abstract models of computation systems. During a computation, the automaton processes the various actions that constitute the computation, and moves from one state to another. A computation is accepted if, at the end of it, the finite-st… more
  • 0 comments
  • Submitted
  • Tue, 30 Apr
Section: Full talk Technical level: Intermediate Session type: Lecture
NC

N. CHATURV3DI

Demystifying Artificial Intelligence for Everyone

Humans have fancied and feared humanoid machines for more than 2000 years. In this talk, we follow the thread that ties our search for super-human machines together with millennia of developments in philosophy, logic, and mathematics. We take a closer look at what Machine Learning & AI really are, what they aren’t, and how they are affecting our societies. This is a non-technical talk, accessible… more
  • 1 comments
  • Submitted
  • Tue, 30 Apr
Section: Full talk Technical level: Beginner Session type: Lecture
M

Manjunath

Artificial intelligence techniques for the effective resource management over the cloud

Today, the cloud infrastructure is limited by the haphazard packaging of applications being offered as the service. Most of the time, a big application holds the resources and lacks flexibility while a short one calls for too many transactions with the peripherals to realize a solution. To address the same in cloud native, a mechanism based on the traffic statistics, buffer dynamics and intended … more
  • 1 comments
  • Submitted
  • Tue, 30 Apr
Section: Tutorials Technical level: Intermediate Session type: Tutorial
sg

saurabh gupta

Securing your Kubernetes Cluster from potential Threats

Kubernetes is currently the most popular container orchestration engine of choice, but its security is debatable. There are some vulnerabilities that have already been discovered in Kubernetes and Docker. The question that arises is what are the potential risks of these vulnerabilities to the application/business, and how we can go about fixing these. more
  • 2 comments
  • Submitted
  • Tue, 30 Apr
Section: Crisp talk Technical level: Intermediate Session type: Lecture
AM

Amit Malik

All about Microservices architecture on Azure Kubernetes Service (AKS)

In this session, I’d focus on designing and hosting microservices architecture applications using AKS(Azure Kubernetes Service). We’ll learn about what is AKS and how it is a fit platform for running microservices archtitecture. This will be a blend of talk and demo. more
  • 0 comments
  • Submitted
  • Thu, 02 May
Section: Full talk Technical level: Intermediate Session type: Demo
­R

­Ravindra Ramnani

Observable Kubernetes

While Kubernetes can dramatically simplify the task of application deployment in containers, its dynamic nature adds new complexity to monitoring the services and applications running in it, as well as, the health of the containers and orchestration infrastructure itself. We will showcase how you can use the open source Elastic Stack to observe complex Kubernetes clusters more
  • 0 comments
  • Submitted
  • Thu, 02 May
Section: Full talk Technical level: Intermediate Session type: Demo
RA

Rachit Arora

Serverless Spark on Kubernetes

In a world of serverless computing users tend to be frugal when it comes to expenditure on compute, storage and other resources. Paying for the same when they aren’t in use becomes a significant factor. Offering Spark as service on cloud presents very unique challenges. Apache Spark has evolved a lot from deploying it on baremetal machines to running it on containers to offering its as Serverless… more
  • 0 comments
  • Submitted
  • Fri, 03 May
Section: Full talk Technical level: Intermediate Session type: Lecture
AS

Aditya Sood

Building Continuous Delivery Pipelines Using GoCD

This workshop is for anyone who wants a better understanding of the principles of Continuous Delivery and who are interested in understanding how to set up a deployment pipeline using these principles in GoCD. The workshop will be a combination of discussions and hands-on sessions. The discussions will be around CD and its related practices from GoCD tool perspective. The hands-on session of the … more
  • 0 comments
  • Submitted
  • Mon, 06 May
Section: Workshop Technical level: Intermediate Session type: Workshop
SG

Sundar Ganesh

The Pains and Gains of Containerization

While it may seem that moving to a containerized architecture be most logical thing to do, doing it right takes a lot of effort, investment on resources and patience before we can actually reap the benefits. About 2 and a half years ago we undertook an ambitious project in our Datacenter to pool all our resources together to optimise resource consumption, increase fault tolerance and scale faster… more
  • 0 comments
  • Submitted
  • Mon, 06 May
Section: Full talk Technical level: Intermediate Session type: Lecture
RR

Roshan R

Stop Reinventing the wheel, Use Hashicorp vault!

HashiCorp Vault is well known for secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. It also handles leasing, key revocation, key rolling, and auditing. Vault presents a unified API to access multiple backends: HSMs, AWS IAM, SQL databases, raw key/value, and more. But what else is it good for? more
  • 2 comments
  • Submitted
  • Mon, 06 May
Technical level: Intermediate Section: Crisp talk Session type: Lecture
AK

Aditya Kamat

FreeIPA: The swiss army knife of open-source identity management

FreeIPA is used in the management of Linux user identities, groups, and passwords centrally with the help of a CLI as well as an easy to use GUI. FreeIPA provides centralized authentication, authorization, and account information for Linux and Unix network environments. It is built on top of well known open-source components like LDAP, KDC, PKI, etc. FreeIPA can seamlessly integrate with an exist… more
  • 1 comments
  • Submitted
  • Mon, 06 May
Section: Full talk Technical level: Intermediate Session type: Demo
sl

s li

Closing the Gap: How ESNI and Encrypted DNS Will Help End Internet Surveillance

Even with HTTPS rising to more than 70% of page loads worldwide, Internet users are still susceptible to having their browsing swept up by mass surveillance through two channels: their DNS requests and the fact that when they first connect to a server over HTTPS, the domain name they’re visiting is visible in the clear. Two protocols will fix that: DNS over TLS (or DNS over HTTPS), and encrypted … more
  • 0 comments
  • Submitted
  • Wed, 10 Apr
Technical level: Beginner
DG

Dhruv Goel

Asterix - Deploying Webapps on Kubernetes for Dummies

Is Kubernetes hard to learn? For most people, it’s a yes. For some, it’s a no. more
  • 1 comments
  • Submitted
  • Fri, 17 May
Section: Full talk Technical level: Intermediate Session type: Lecture
B

Bharath

From data to decisions - Leveraging OSINT data to take security decisions

As a companies grow large, they tend to leave a lot of digital trail about their infrastructure on the Internet. This information can be accessed by anyone who knows what/where to look for. The information that is available publicly is known as Open Source INTelligence(OSINT) in the hacker lingo. Attackers perform reconnaissance and gather OSINT data about their target organisations to increase t… more
  • 1 comments
  • Submitted
  • Thu, 22 Nov
Technical level: Beginner
MM

Manas Malik

Framework For Lossless Data Compression

A lot has been done in the field of data compression, yet we don’t have a proper application for compressing daily usage files. There are appropriate and very specific tools online that provide files to be compressed and saved, but the content we use for streaming our videos, be it a Netflix video or a gaming theater play, data consumed is beyond the calculation of a user. Back-end developers kno… more
  • 7 comments
  • Awaiting details
  • Mon, 06 May
AA

Ashutosh Agrawal

Hotstar Pulse - Processing 25M+ beacons every minute in real-time

At hotstar, one of the important metrics which we present to end-users and our business partners is the number of people watching live. While this may seem to be a simple problem of rendering a number, but it ain’t. It’s not an approximate number, it’s an actual number and it need to be presented in real-time to users. Each unique user is counted in real-time, every minute we receive millions of … more
  • 0 comments
  • Submitted
  • Tue, 30 Jul
Section: Full talk Technical level: Intermediate Session type: Lecture
US

Urmika Devi Shah

Privacy Matters Roundtable & Lean Data Practices Workshop

The Privacy Matters Roundtable is an opportunity engage with Indian B2C technology companies on the practical realities of how to run a data-driven business while respecting user privacy and security. This is a global series that uses the Lean Data Practices framework to drive structured discussion around three main themes (1/ Managing data 2/ Reducing Risk and 3/ Building Trust) and share experi… more
  • 0 comments
  • Submitted
  • Thu, 22 Aug
Section: Workshop Technical level: Advanced Session type: Discussion
YS

Yash Shanker Srivastava

End to End DevOps - Design Infrastructure and Deployment Pipeline for your application

Usually in teams, you don’t always get the chance to work with the infrastructure, application development, and designing build-deployment pipelines. Most of the times, we only get to get our hands dirty in either one of these. So in this session, we are going to dive into all these aspects of Software Delivery from the perspective of a DevOps Engineer, i.e. everything except the app development … more
  • 1 comments
  • Submitted
  • Tue, 17 Sep
Section: Workshop Session type: Workshop Technical level: Intermediate
sh

saurabh hirani

The curious case of slow/fast grequests code

If you have made a single HTTP request in Python, you have probably used the requests module. more
  • 2 comments
  • Submitted
  • Tue, 01 Oct
Section: Full talk Technical level: Intermediate Session type: Demo
TM

Tarun Maini

Infrastructure QA in Devops team

Compliance & security testing from the eyes of QA in Devops team more
  • 0 comments
  • Submitted
  • Tue, 26 Nov
Section: Full talk Technical level: Intermediate Session type: Demo
SS

Sreekanth G S

From legacy services to one-click availability - The Rancher Way

We have embraced lot of changes when it comes to service architecture. When a giant leap was taken to adopt SOA massively, along with it came challenges of packaging, deploying and ensuring availability. With the advent of docker and other container based solutions, we were forced to look at each component as a micro application adhering to single responsibility principle. more
  • 0 comments
  • Submitted
  • Fri, 29 Nov
Section: Full talk Technical level: Intermediate Session type: Demo
KN

Kayalvizhi NoorulAmeen

Troubleshooting in Microservices using Distributed Tracing

In Microservicves Architecture, requests are often served by multiple services. Each service handles a portion of a request by performing one or more operations (e.g. database queries, publishes messages) and delegate to other services for fulfillment. This session is planned to address tracing the requests with the help of instrumentation tools more
  • 3 comments
  • Awaiting details
  • Tue, 26 Nov
Section: Full talk (40 mins) Category: Distributed systems
Make a submission

Submissions are closed for this project

Hosted by

Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective).more