Call for round the year submissions for Rootconf in 2020
Submit a proposal at any time in the year on DevOps, infrastructure security, cloud, and distributed systems. We will find you a suitable opportunity to share your work.
Accepting submissions till 31 Dec 2020, 12:00 PM
Not accepting submissions
We do not accept:
The next edition of Rootconf annual conference will be held on 21 and 22 June, in Bangalore. More details are available here: https://hasgeek.com/rootconf/2019/
Accepting submissions till 31 Dec 2020, 12:00 PM
Leveraging Machine Learning to Reduce Mean Time to Identify and Resolve Issues when handling Systems/Applications at Scale"Our fascination with the use of computing power to augment human decision-making has likely outgrown even the tremendous advances made in algorithmic approaches,”said Christian Beedgen, Co-founder and CTO, Sumo Logic. “In reality, the successful use of AI and related techniques is still limited to areas around image recognition and natural language understanding, where input/output scenarios can… more
Section: Full talk
Technical level: Intermediate
|
Prometheus: Solving monitoring for EVERYONEPrometheus, now a graduated CNCF project, is the de facto leader in the monitoring and metrics space being used by 1000s of companies in the world. With the 2.0 launch nearly a year behind us, we are now focused on making Prometheus boring. i.e, more stable, more usable and even MOAR user friendly! more
Technical level: Intermediate
|
Grafana Loki: like Prometheus, but for logsLoki is a horizontally-scalable, highly-available log aggregation system inspired by Prometheus. It is designed to be very cost effective and easy to operate, as it does not index the contents of the logs, but rather labels for each log stream. more
Technical level: Beginner
|
Implementing a real-time serverless data pipelineBuild a production ready, highly available/scalable, real-time data pipeline using AWS managed services including Lambda, Step Functions and the serverless.com framework for fully automated blue/green deployments. more
Technical level: Intermediate
|
Secrets management across Microservices with HashiCorp VaultIn today’s world of web scale applications, secrets management is a daunting task and is often overlooked, until the product is evaluated for Compliance certifications. Often times, this overhead usually falls on the Execution Platform team as rotation of secrets must also ensure that there is no downtime in the product. The kind of secrets can range from key/value pairs, cloud access credentials… more
Section: Full talk
Technical level: Intermediate
|
Automated hyper-scalable Big data pipelinesProcessing big data with maximum speed and minimum time is what every organization strives for nowadays. Cluster computing frameworks play a major role in handling data in such use cases and to serve long term goals they require Data Pipelines to be built around them. This session walks through solutions for deploying cloud native, scalable, event-driven and fault tolerant data pipelines. more
Section: Crisp talk
Technical level: Intermediate
|
Firebolt: Asynchronous Processing System for PaymentsAt Flipkart Payments we build robust systems to provide a smooth experience to customers. In this session, we’ll talk about how we levarage aysnchronous processing to improve the performance of the payment systems which are pivotal to Flipkart. We’ll go over the details of the streaming pipelines we built using MySQL, Hbase, Kafka and Storm, and the customization we did over them. We’ll share our… more
Section: Crisp talk
Technical level: Intermediate
|
Mocking Production like Environment using Terraform, Packer and JenkinsHashiCorp Terraform is a one of the most powerful infrastructure management tools available. We can perform the CRUD operations on infrastructure—all with a single command. more
Section: Full talk
Technical level: Intermediate
|
When to stay with modular monoliths over microservicesMicroservices architecture style has been a prominent talking points over the last few years. Microservices is by no means a silver bullet though, and the design thinking required to create a good microservices architecture is the same as that needed to create a well-structured monolith. This talk briefly covers characteristics of microservices, monoliths and modular monoliths. We will discuss th… more
Section: Full talk
Technical level: Intermediate
|
Best practices to secure applications in cloudSecurity in cloud should be approched a little differently than traditional on-premise security. In cloud, security is a shared responsibility of the customer and the cloud service provider. This talk with highlight how one should secure the applications and infrastructure in cloud. more
Section: Full talk
Technical level: Beginner
|
Deployment Automation Framework | A Platform Agnostic ApproachAutomated deployments has always been a complex topic considering diverse nature of tech stacks and infrastructure platforms. more
Section: Crisp talk
Technical level: Intermediate
|
Transformation from zero to shipping Production code dailyThe advent of DevOps has revamped the traditional application development process in a drastic way. The software industry is rapidly seeing the value of moving away from conventional ways of releasing code to more matured workflows enabling them to move faster. We have seen a big transformation on how code is build, developed and executed. Journey from manual builds to script based deployment, sc… more
Section: Full talk
Technical level: Advanced
|
Deploying greenfield JVM microservices on Kubernetes on-premise with a service mesh WITHOUT Openshift or CloudFoundryLessons learned from deploying open source Kubernetes in a traditional financial data center without a supported vendor implementation (no IBM, RedHat, or Google support) Intended audience - anyone interested in Kubernetes Expected outcome - A good discussion around the philosophy and operational capabilities needed to deploy microservices on-prem on Kubernetes more
Section: Full talk
Technical level: Beginner
|
Application Services for Operationalizing Kubernetes in the Multi-Cloud worldThere is immense interest and growing adoption of container ecosystems today, with Kubernetes being an easy and popular choice for enterprises. However, there are a variety of choices of underlying infrastructure ecosystems that Kubernetes can run on. Typical large enterprises in the real-world today also run in Multi-Cloud enviroments. more
Section: Full talk
Technical level: Intermediate
|
ANTIVIRUS BYPASSING FOR FUN AND PROFITWhy This Presentation? Everyone uses Antivirus systems and believes in them to protect us against cyber threats. Antivirus systems are very important to us. They stand as the major protection mechanism for our computers and confidential data. more
Section: Full talk
Technical level: Intermediate
|
GraphQL @ ScaleModern web servers need to cater to multiple clients on web, mobile and desktop. The views across the clients vary a lot, so same server API response across all clients is not optimal. GraphQL offers a powerful technology for building web API’s which enables clients to query data which they want and how they want without compromising on the performance. more
Section: Full talk
Technical level: Intermediate
|
Data Visualization In Machine learning and Model trainingTalking about the python packages and using seaborn and other packages for Data Visualization in Machin Learning as a data analyst , hands on about training a Machine Learning Model and about data warehouse . more
Section: Workshop
Technical level: Beginner
|
Orchestration with KubernetesI’ll talk about how we built and now run karix.io using docker containers. It covers the entire engineering effort undertaken and how and why we got here based on past learning and experiences. more
Section: Full talk
Technical level: Intermediate
|
Singularity container solution for compute based workloadsWorkshop on using Singularity to enable Scalable interactive workflow and Generalised GPU support in Singularity . more
Section: Workshop
Technical level: Beginner
|
Automated on-boarding of software projects using Jenkins v2.x PipelineAudience will be introduced to the concept of Jenkins v2.x Pipeline-as-code. This will be followed by hands-on with respect to initiation of simple project, using Groovy code, setup software project in the continuous integration infrastructure. From the simple to complex task of integrating Jenkins Pipeline with standalone build scripts, attendees, who are CI/CD practitioners, will be able to app… more
Section: Workshop
Technical level: Beginner
Session type: Workshop
|
Paving the way for verification of distributed systemsFrom our undergraduate courses, we are familiar with the notion finite-state automata (also known as finite-state machines or, simply, state machines), which are abstract models of computation systems. During a computation, the automaton processes the various actions that constitute the computation, and moves from one state to another. A computation is accepted if, at the end of it, the finite-st… more
Section: Full talk
Technical level: Intermediate
Session type: Lecture
|
Demystifying Artificial Intelligence for EveryoneHumans have fancied and feared humanoid machines for more than 2000 years. In this talk, we follow the thread that ties our search for super-human machines together with millennia of developments in philosophy, logic, and mathematics. We take a closer look at what Machine Learning & AI really are, what they aren’t, and how they are affecting our societies. This is a non-technical talk, accessible… more
Section: Full talk
Technical level: Beginner
Session type: Lecture
|
Artificial intelligence techniques for the effective resource management over the cloudToday, the cloud infrastructure is limited by the haphazard packaging of applications being offered as the service. Most of the time, a big application holds the resources and lacks flexibility while a short one calls for too many transactions with the peripherals to realize a solution. To address the same in cloud native, a mechanism based on the traffic statistics, buffer dynamics and intended … more
Section: Tutorials
Technical level: Intermediate
Session type: Tutorial
|
Securing your Kubernetes Cluster from potential ThreatsKubernetes is currently the most popular container orchestration engine of choice, but its security is debatable. There are some vulnerabilities that have already been discovered in Kubernetes and Docker. The question that arises is what are the potential risks of these vulnerabilities to the application/business, and how we can go about fixing these. more
Section: Crisp talk
Technical level: Intermediate
Session type: Lecture
|
All about Microservices architecture on Azure Kubernetes Service (AKS)In this session, I’d focus on designing and hosting microservices architecture applications using AKS(Azure Kubernetes Service). We’ll learn about what is AKS and how it is a fit platform for running microservices archtitecture. This will be a blend of talk and demo. more
Section: Full talk
Technical level: Intermediate
Session type: Demo
|
Observable KubernetesWhile Kubernetes can dramatically simplify the task of application deployment in containers, its dynamic nature adds new complexity to monitoring the services and applications running in it, as well as, the health of the containers and orchestration infrastructure itself. We will showcase how you can use the open source Elastic Stack to observe complex Kubernetes clusters more
Section: Full talk
Technical level: Intermediate
Session type: Demo
|
Serverless Spark on KubernetesIn a world of serverless computing users tend to be frugal when it comes to expenditure on compute, storage and other resources. Paying for the same when they aren’t in use becomes a significant factor. Offering Spark as service on cloud presents very unique challenges. Apache Spark has evolved a lot from deploying it on baremetal machines to running it on containers to offering its as Serverless… more
Section: Full talk
Technical level: Intermediate
Session type: Lecture
|
Building Continuous Delivery Pipelines Using GoCDThis workshop is for anyone who wants a better understanding of the principles of Continuous Delivery and who are interested in understanding how to set up a deployment pipeline using these principles in GoCD. The workshop will be a combination of discussions and hands-on sessions. The discussions will be around CD and its related practices from GoCD tool perspective. The hands-on session of the … more
Section: Workshop
Technical level: Intermediate
Session type: Workshop
|
The Pains and Gains of ContainerizationWhile it may seem that moving to a containerized architecture be most logical thing to do, doing it right takes a lot of effort, investment on resources and patience before we can actually reap the benefits. About 2 and a half years ago we undertook an ambitious project in our Datacenter to pool all our resources together to optimise resource consumption, increase fault tolerance and scale faster… more
Section: Full talk
Technical level: Intermediate
Session type: Lecture
|
Stop Reinventing the wheel, Use Hashicorp vault!HashiCorp Vault is well known for secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. It also handles leasing, key revocation, key rolling, and auditing. Vault presents a unified API to access multiple backends: HSMs, AWS IAM, SQL databases, raw key/value, and more. But what else is it good for? more
Section: Crisp talk
Technical level: Intermediate
Session type: Lecture
|
FreeIPA: The swiss army knife of open-source identity managementFreeIPA is used in the management of Linux user identities, groups, and passwords centrally with the help of a CLI as well as an easy to use GUI. FreeIPA provides centralized authentication, authorization, and account information for Linux and Unix network environments. It is built on top of well known open-source components like LDAP, KDC, PKI, etc. FreeIPA can seamlessly integrate with an exist… more
Section: Full talk
Technical level: Intermediate
Session type: Demo
|
Closing the Gap: How ESNI and Encrypted DNS Will Help End Internet SurveillanceEven with HTTPS rising to more than 70% of page loads worldwide, Internet users are still susceptible to having their browsing swept up by mass surveillance through two channels: their DNS requests and the fact that when they first connect to a server over HTTPS, the domain name they’re visiting is visible in the clear. Two protocols will fix that: DNS over TLS (or DNS over HTTPS), and encrypted … more
Technical level: Beginner
|
Asterix - Deploying Webapps on Kubernetes for DummiesIs Kubernetes hard to learn? For most people, it’s a yes. For some, it’s a no. more
Section: Full talk
Technical level: Intermediate
Session type: Lecture
|
From data to decisions - Leveraging OSINT data to take security decisionsAs a companies grow large, they tend to leave a lot of digital trail about their infrastructure on the Internet. This information can be accessed by anyone who knows what/where to look for. The information that is available publicly is known as Open Source INTelligence(OSINT) in the hacker lingo. Attackers perform reconnaissance and gather OSINT data about their target organisations to increase t… more
Technical level: Beginner
|
Framework For Lossless Data CompressionA lot has been done in the field of data compression, yet we don’t have a proper application for compressing daily usage files. There are appropriate and very specific tools online that provide files to be compressed and saved, but the content we use for streaming our videos, be it a Netflix video or a gaming theater play, data consumed is beyond the calculation of a user. Back-end developers kno… more
|
Hotstar Pulse - Processing 25M+ beacons every minute in real-timeAt hotstar, one of the important metrics which we present to end-users and our business partners is the number of people watching live. While this may seem to be a simple problem of rendering a number, but it ain’t. It’s not an approximate number, it’s an actual number and it need to be presented in real-time to users. Each unique user is counted in real-time, every minute we receive millions of … more
Section: Full talk
Technical level: Intermediate
Session type: Lecture
|
Privacy Matters Roundtable & Lean Data Practices WorkshopThe Privacy Matters Roundtable is an opportunity engage with Indian B2C technology companies on the practical realities of how to run a data-driven business while respecting user privacy and security. This is a global series that uses the Lean Data Practices framework to drive structured discussion around three main themes (1/ Managing data 2/ Reducing Risk and 3/ Building Trust) and share experi… more
Section: Workshop
Technical level: Advanced
Session type: Discussion
|
End to End DevOps - Design Infrastructure and Deployment Pipeline for your applicationUsually in teams, you don’t always get the chance to work with the infrastructure, application development, and designing build-deployment pipelines. Most of the times, we only get to get our hands dirty in either one of these. So in this session, we are going to dive into all these aspects of Software Delivery from the perspective of a DevOps Engineer, i.e. everything except the app development … more
Section: Workshop
Technical level: Intermediate
Session type: Workshop
|
The curious case of slow/fast grequests codeIf you have made a single HTTP request in Python, you have probably used the requests module. more
Section: Full talk
Technical level: Intermediate
Session type: Demo
|
Infrastructure QA in Devops teamCompliance & security testing from the eyes of QA in Devops team more
Section: Full talk
Technical level: Intermediate
Session type: Demo
|
From legacy services to one-click availability - The Rancher WayWe have embraced lot of changes when it comes to service architecture. When a giant leap was taken to adopt SOA massively, along with it came challenges of packaging, deploying and ensuring availability. With the advent of docker and other container based solutions, we were forced to look at each component as a micro application adhering to single responsibility principle. more
Section: Full talk
Technical level: Intermediate
Session type: Demo
|
Troubleshooting in Microservices using Distributed TracingIn Microservicves Architecture, requests are often served by multiple services. Each service handles a portion of a request by performing one or more operations (e.g. database queries, publishes messages) and delegate to other services for fulfillment. This session is planned to address tracing the requests with the help of instrumentation tools more
Section: Full talk (40 mins)
Category: Distributed systems
|