Rootconf is HasGeek’s annual conference -- and now a growing community -- around DevOps, systems engineering, DevSecOps, security and cloud. The annual Rootconf conference takes place in May each year, with the exception of 2019 when the conference will be held in June.
Besides the annual conference, we also run meetups, one-off public lectures, debates and open houses on DevOps, systems engineering, distributed systems, legacy infrastructure, and topics related to Rootconf.
This is the place to submit proposals for your work, and get them peer reviewed by practitioners from the community.
##Topics for submission:
We seek proposals -- for short and long talks, as well as workshops and tutorials -- on the following topics:
- Case studies of shift from batch processing to stream processing
- Real-life examples of service discovery
- Case studies on move from monolith to service-oriented architecture
- Network security
- Monitoring, logging and alerting -- running small-scale and large-scale systems
- Cloud architecture -- implementations and lessons learned
- Optimizing infrastructure
- Immutable infrastructure
- Aligning people and teams with infrastructure at scale
- Security for infrastructure
If you have questions/queries, write to us on firstname.lastname@example.org
Securing your Kubernetes Cluster from potential Threats
Kubernetes is currently the most popular container orchestration engine of choice, but its security is debatable. There are some vulnerabilities that have already been discovered in Kubernetes and Docker. The question that arises is what are the potential risks of these vulnerabilities to the application/business, and how we can go about fixing these.
The talk will also cover what are some of the best security practices that should be followed while designing and implementing Kubernetes within an organisation.
The outline of the talk would be roughly as follows:
- How vulnerable is your Kubernetes cluster.
- Past known vulnerabilities in Kubernetes and their potential Risks.
- How to fix these known vulnerabilities.
- Security Best Practises to be followed while designing a Kubernetes cluster .
Basic knowledge of Kubernetes,Container technologies is expected. This session will focus on real world security threats associated with Kubernetes and how we can follow some best practises to make our Kubernetes clusters more secure.
Saurabh Gupta is a Cloud and Devops professional with over a decade of experience into development, devops ,cloud automation, build and release, monitoring and container technology. He is currently associated with DigitalOcean as a Sr.Developer Advocate.