Loading…
DevConf.CZ 2019 has ended

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

E105 [clear filter]
Friday, January 25
 

9:30am CET

How fuzzing helps to find bugs
This is based on my experience with fuzzing in systemd and casync using google's oss-fuzz. I'll discuss the general idea, libraries which can be used for fuzzing (afl, libfuzzer) and testing (address sanitizer, valgrind, ...), how to easily add fuzzing to any compiled project, and how to use online fuzzing resources. I think that almost any project can benefit, but this is still relatively unknown and many people don't realize how is it easy to add fuzzing, and how quickly this finds bugs. Fuzzing is yet another tool that is a necessary part of the toolbox.

I expect that attendees will be know how to add fuzzing to their projects after the session even if they knew nothing about the subject beforehand.

Speakers
avatar for Zbigniew Jędrzejewski-Szmek

Zbigniew Jędrzejewski-Szmek

software engineer, Red Hat
systemd maintainer



Friday January 25, 2019 9:30am - 9:55am CET
E105

10:00am CET

Testing in a Reactive Way
Today, Reactive Programming is becoming more popular in IT applications. It offers a new way to handle asynchronous processes. No matter if they are computation processes, long time running processes, cloud processes, web application you can benefit from this programming approach. You can benefit from this approach even when writing tests, and this is the focus for this presentation.
You will try think about testing in a new way. You will see Python code - RxPy, JavaScript code RxJS in an action.

Speakers
avatar for Jan Stavel

Jan Stavel

Senior Quality Engineer, Red Hat


index html
scan png
zip png

Friday January 25, 2019 10:00am - 10:25am CET
E105

10:30am CET

Symbiotic: finding bugs in C programs
Computer bugs make everyday life harder not just to programmers, but mostly to users. This brings up the desire for bug-free software. Symbiotic is an open-source tool that automatically finds bugs in C programs. It performs a set of program transformations that make it easier to find bugs, and then it analyzes the program by symbolic execution. It can search for the common errors like assertion violation, null or dangling pointer dereference, integer overflow, and similar. In this presentation, we tell you what is Symbiotic, how it works, and how you can use it.
Slides: https://github.com/mchalupa/devconf19-symbiotic-presentation

Speakers
MC

Marek Chalupa

Student, Masaryk University


main pdf

Friday January 25, 2019 10:30am - 10:55am CET
E105

11:00am CET

~1 sec. Java app redeployments on Kubernetes
Interested in seeing your application redeployed on Kubernetes ~1 second after you have changed your Java code? To simplify and speed up the development process for Apache Camel users, we could unleash the power of Kubernetes via a custom Kubernetes Operator, custom Kubernetes resources, reuse of build images based on the set of dependencies and use of a ConfigMap to mount the changing bits to a container. We'll explain all included concepts and run a live demo!

Speakers
avatar for Peter Palaga

Peter Palaga

Red Hat
Peter Palaga is senior sustaining engineer for JBoss Fuse at Red Hat. Earlier, he worked on JBoss EAP, Hawkular and other Red Hat Middleware projects. The author of srcdeps and contributor to several Maven and Gradle plugins.



Friday January 25, 2019 11:00am - 11:50am CET
E105

1:00pm CET

Make a career out of Opensource Software testing
Some overlook Software testing as a career Option. Some don't know where to start, and many don't know where they can learn from and contribute. The easiest gateway to learn software testing is through contributing to Opensource software quality. You get to learn many new technologies, can learn to understand what s/w quality is about and contribute to it in many ways. In this talk we would be talking about how to learn , contribute , network and make a career out of software testing through opensource projects

Speakers
avatar for Nag Pavan Chilakam

Nag Pavan Chilakam

Principal Quality Engineer, Red Hat
A Storage Quality Engineer who loves his job



Friday January 25, 2019 1:00pm - 1:25pm CET
E105

1:30pm CET

QE role in a cross functional team
Being in cross functional team can pose a challenge for Quality Engineers. It is not enough to learn Devel processes and make occasional bugfixes for them to be effective in their role. Practices that worked just fine in case of separate Devel and QE teams gets in the way now and needs to be rethought.

In this talk, I will share experience and observations I got during my transformation from pure QE working separately to devel counterparts, to combined QE/Product Owner role in fully cross functional team.

Speakers
avatar for Marek Haičman

Marek Haičman

Red Hat Czech
I am Quality Engineer and Product Owner of the Security Compliance team in Red Hat Enterprise Linux. I am mostly interested in these topics:* Security Compliance* Testing of tests* CI in upstream / community projects



Friday January 25, 2019 1:30pm - 1:55pm CET
E105

2:00pm CET

Cookies for Kernel Developers
Red Hat's CKI ("cookie") project is building a CI for kernel patches being sent to maillists, both its own and public. We are putting our extensive park of hard-to-obtain hardware to the task of testing patches before they're even reviewed, and we strive to give you the test results with no strings attached, just like cookies.

We've been running the system internally for a while, and are getting ready to apply it to upstream patches and start sending reports to contributors. We would like to tell you how our system works so far, what ideas we have, and hear how you would like it to work for you, on upstream maillists!

Naturally, real cookies are involved in the presentation!

Speakers
avatar for Major Hayden

Major Hayden

Red Hat
avatar for Nikolai Kondrashov

Nikolai Kondrashov

Senior Software Engineer, Red Hat
A self-taught software engineer. Love working on low-level software and dealing with hardware directly. Work on CKI project at Red Hat, maintain DIGImend project, and play with embedded as a hobby.



Friday January 25, 2019 2:00pm - 2:50pm CET
E105

3:00pm CET

Things Fedora QA Robots Do
There are rather a lot of bits of automated infrastructure related to Fedora QA that do things like creating those release validation wiki pages you may have seen, forwarding automated results to various places, sending out email reports, and so on. This session will try to provide an overview of all these little things, which I like to call robots because it sounds cooler, their functions, where they run, and how they work together to help save people work and make Fedora work better.

Speakers
avatar for Adam Williamson

Adam Williamson

Fedora QA engineer, Red Hat
Fedora QA engineer


robots odp

Friday January 25, 2019 3:00pm - 3:50pm CET
E105

4:00pm CET

Testing Ceph: Pains & Pleasures
Over ten years of deployments, the Ceph distributed storage system has proven itself resilient to failures of all kinds. Much of this success can be traced to its “teuthology” automated testing system, which runs thousands of machine-hours of tests every day. This talk will describe the technical function of teuthology and our other CI systems; explore how Ceph succeeded in automated testing that is reliable and useful at both a system and community level; and discuss the ways and whys of where that testing falls short. We’ll explore pain points and pitfalls to avoid in trying to build these systems out, and ideas to help overcome them.

Speakers
avatar for Gregory Farnum

Gregory Farnum

Principal Software Engineer, Red Hat
Greg Farnum has been in the core Ceph development group since 2009. Now a Red Hat employee, Greg has done major work on all components of the Ceph ecosystem, previously served as the CephFS tech lead, and is moving from an individual contributor to team management role.



Friday January 25, 2019 4:00pm - 4:50pm CET
E105

5:00pm CET

Write tests for the Always Ready Operating System
Join the workshop to understand the vision of the Always Ready Operating System and get hands-on experience with enabling new test coverage. Learn about processes and tools used to support testing, get an overview of documentation to easily find important information and be inspired to a quick start by real-life success stories.

Prerequisites:
Laptop with Fedora, Fedora account, FPCA signed
Recommended: A package for experimenting / contributions
Optional: A test suitable for CI

https://fedoraproject.org/wiki/CI

Speakers
DP

Dominik Perpeet

Operating System CI, Red Hat
Dominik Perpeet dreams of Operating Systems that are always stable, even in development. He leads the CI Objective in Fedora and wants to tie upstreams, Fedora and Red Hat Enterprise Linux together in logical and meaningful ways. He is with Red Hat and lives in Germany.
avatar for Miroslav Vadkerti

Miroslav Vadkerti

Senior Prinicipal Quality Engineer, Red Hat
I work on Continuous Integration for RHEL. I am the co-author of https://github.com/gluetool/gluetool and Testing Farm.
avatar for Petr Šplíchal

Petr Šplíchal

Principal Software Quality Engineer, Red Hat
Member of the Operating System CI team with focus on improving tools, processes and best practices.



Friday January 25, 2019 5:00pm - 5:50pm CET
E105
 
Saturday, January 26
 

9:00am CET

enterprise Linux crypto story
This session will go through the core crypto components of Red Hat enterprise Linux from kernel to openssl, go briefly through the requirements set for such components, and how their security is evaluated through certifications and other means.

Speakers
avatar for Anderson Sasaki

Anderson Sasaki

Software Engineer, Red Hat



Saturday January 26, 2019 9:00am - 9:25am CET
E105

9:30am CET

Why you shouldn't write crypto functions yourself
Writing cryptographic functions is not hard, you do not even need to understand the math behind the cryptographic primitive you want to implement to be able to construct a set of cunctions that correctly encrypts and decrypts ciphertext.
So why cryptographers keep saying you should not implement your own crypto ?
In this talk we'll show practical examples that explain why implementing a mathematical function correctly is only the easy part of the job, and where the devil in the detail lies. We'll also show how even thought through implementations sometimes can be attacked, and how they evolve over time.

Genral understanding of how modern CPUs work is useful to better understand the more technical parts. Knowledge of a programming language is highly recommended.

Speakers
avatar for Simo Sorce

Simo Sorce

Senior Principal Software Engineer, Red Hat
I work in the RHEL Crypto Team, I like Security related topics.



Saturday January 26, 2019 9:30am - 9:55am CET
E105

10:00am CET

Russian GOST cryptography in and near OpenSSL
There is a necessity to provide national cryptography in various applications. The presentation describes history, current state and future of Russian GOST support in OpenSSL and OpenSSL-based applications.

Russian GOST support in OpenSSL is divided between modifications of OpenSSL itself and the engine (https://github.com/gost-engine/engine) implementing the low-level cryptographic primitives. The presentation describes the edge cases of using externally provided algorithms, problems of support of the national specifics in OpenSSL and adopting applications and standards to support national cryptography.

The presentation contains history of the universal API for asymmetric cryptography in OpenSSL and provides some ideas about possible API development to make it more flexible.



Saturday January 26, 2019 10:00am - 10:50am CET
E105

11:00am CET

Overview of the NIST Post-Quantum Algorithms
This session will have a high level overview of the various NIST post-Quantum algorithms: 1) why they are needed, 2) how the families of the various algorithms work. 3) what are the broad characteristics of those families, 4) what algorithms are in those families, 5) how some of the one offs work. 6) Where to go to play with the algorithms. 5) What are the next steps in the competition.

Speakers
avatar for Bob Relyea

Bob Relyea

Principal Programmer, OASIS PKCS #11 co-chair., Red Hat
Bob Relyea is a principal programmer at Red Hat working on the Network Security System Library. Bob is also the co-chair for the OASIS PKCS #11 technical committee, having worked with PKCS #11 and PKCS #11 integration into NSS since 1995.



Saturday January 26, 2019 11:00am - 11:25am CET
E105

11:30am CET

TLS 1.3: what developers should know about the API
Major crypto libraries have adopted TLS 1.3 since its final publication in last August. Those libraries are carefully designed so applications can switch to the new protocol with minimal code modification. However, as TLS 1.3 also brings new features, such as post-handshake authentication and 0-RTT, applications need to use new API to take full advantage of the protocol.

In this presentation, we will go through the new API functions added for TLS 1.3 in multiple crypto libraries, see pros and cons of their design choices, and discuss the best practice in using those new functions.

Speakers
avatar for Daiki Ueno

Daiki Ueno

Engineer, Red Hat
Daiki Ueno is a senior software engineer at the Red Hat Security Technologies group.


tls13 pdf

Saturday January 26, 2019 11:30am - 11:55am CET
E105

12:00pm CET

Applications of TPM 2.0
Now that a complete TPM 2.0 infrastructure has been delivered in Linux, the focus is moving to building applications that benefit from TPM security. This session will cover the initial application of TPM in NBDE and explore other applications that can be built with TPM. Topics include protecting secrets with the TPM, measurement of the system and using system information to seal secrets, Trusted Boot, TPM signing of software patchesand protection of Edge systems. We will also address the use of trusted processing enclaves and complete system protection using TPM with trusted processing enclaves. Bonus topic: TPM secured Blockchains!

Speakers
avatar for Javier Martinez Canillas

Javier Martinez Canillas

Software Engineer, Red Hat
Javier is a Software Engineer in the Desktop Hardware Enablement team at Red Hat, working on the Fedora and RHEL bootloader stack.
avatar for Russell Doty

Russell Doty

Russell Doty is a Technology Product Manager at Red Hat., Red Hat
Russell Doty is a Technology Product Manager at Red Hat focusing on the requirements of Internet of Things (IoT), High Performance Computing, and AI/ML - all with a strong focus on security.



Saturday January 26, 2019 12:00pm - 12:50pm CET
E105

1:00pm CET

Minting and collecting SWID tags
What software is installed on machine X?

With new ways of distributing software like container images or web applications in various formats, trusted packaging tools and formats like rpm, deb, or pacman no longer provide complete answer to this simple question. That in turn makes it harder to scan for vulnerabilities, or prevents even basic software accounting.

We will look at SWID, 2015 standard for software identification that might be bringing a solution. We will explore the schema, some SWID tags, tools and content, and share preliminary results of quest for best practices, for turning the standard into useful mechanism for admins, security personnel, or software maintainers. Think about examples of convoluted deployment and come to find out if SWID can bring some order to the chaos.

Speakers
avatar for Jan Pazdziora

Jan Pazdziora

Sr. Principal Software Engineer, Red Hat
As a member of Security Engineering Special Projects group, Jan focuses on making security features seamlessly consumable by admins and users. Lately he's been working with software identities and SWID.



Saturday January 26, 2019 1:00pm - 1:25pm CET
E105

1:30pm CET

First steps into security engineering
Experience with security is a useful and even profitable skill for every technical and non-technical employee in IT. Contrary to common stereotypes, security is far more than black hoodies, math and crypto. It's also humans and communication skills.

Attendees of my talk DevConf.CZ 2018 talk and DevConf.IN key note have ask me how to get started. Let me introduce you to diverse areas of info sec and point you to books, online courses, talks, and other resources to get you started.

Speakers
avatar for Christian Heimes

Christian Heimes

Principal Software Engineer, Red Hat
Christian is a long time Python developer from Hamburg/Germany and contributor to several Open Source projects such as the CPython interpreter. In the past years he has helped to keep Python secure, for example as member of the Python security response te



Saturday January 26, 2019 1:30pm - 1:55pm CET
E105

2:00pm CET

Migrating a Linux environment to IDM
As you would expect, Red Hat IT manages lots of Linux systems. This talk will discuss how we are slowly and methodically migrating them from classical LDAP and MIT Kerberos info and authentication backends to using IDM and sssd.

Benefits of the move will be shared and so will some of the lessons learned.

Speakers
avatar for Dustin Minnich

Dustin Minnich

Principal Systems Administrator, Red Hat
Been in IT for over a decade. Currently work for the Identity and Access Management IT team at Red Hat as a Principal Systems Administrator. RHCA certified.Strong believer in open source technologies and methodologies. Privacy and freedom of speech advocate.In my free time I enjoy... Read More →



Saturday January 26, 2019 2:00pm - 2:25pm CET
E105

2:30pm CET

Finding vulnerabilities using VMaaS
Looking for a simple way how to find vulnerable packages installed on your RHEL/Fedora systems? Vulnerability Metadata as a Service (VMaaS) is an API microservice that could fulfill this need.

VMaaS works as an repository and CVE metadata aggregator and provides these metadata in a stateless HTTP API. The microservice is deployable as an docker-compose or into an OpenShift environment. There is also a public deployment hosted by Red Hat.

This talk will summarize current state of the service and present a thin client tool to obtain vulnerabilities from the API.

Speakers


Saturday January 26, 2019 2:30pm - 2:55pm CET
E105

3:00pm CET

USBGuard
In this session you will be presented with USB Guard functionality both CLI and GUI.

You will get:

* overall understanding of the concept
* knowledge to configure the service
* CLI how to
* rules structure explanation
* explanation of GUI applet
* hands on experiance

There will be slides presented to lead us through the steps and real examples will be shown.
You are encouraged to bring your laptop and any kind of USB device (mouse, flash stick, yubikey, ...) to try to set it up on your own.

Speakers
avatar for Dalibor Pospisil

Dalibor Pospisil

quality engineer, Red Hat



Saturday January 26, 2019 3:00pm - 3:25pm CET
E105

3:30pm CET

System-wide crypto policies what and why
System-wide crypto policies are a fairly new thing in Fedora. In this talk I will introduce them and show the reasons why system-wide crypto policies are needed.
Then we look at them in more details - which are the currently provided policy levels, which core crypto components follow the policy, and how the policies are implemented.
I will also provide overview of what is in works and what are the future plans with the system-wide crypto policies features.
The attendants of the talk should have some basic knowledge of cryptography algorithms and secure protocols from the user's point of view.

Speakers
avatar for Tomáš Mráz

Tomáš Mráz

Principal Software Engineer, Red Hat
Tomáš Mráz is long time developer and package maintainer of security related software in Fedora and Red Hat Enterprise Linux, he also participates in the upstream OpenSSL community as a member of the OpenSSL committers team.



Saturday January 26, 2019 3:30pm - 3:55pm CET
E105

4:00pm CET

Using SELinux with container runtimes
This talk will explain how SELinux works with containers. We will show how to enable/disable SElinux using multiple different container runtimes and define the default types. The two default types for running containers are container_t which is a fully confined domain, which eliminates any use of the host files unless they are relabeled. Or spc_t, which is the type containers run with when SELinux is disabled for container separation, --privileged mode. Writing custom policy for each container that needed additional access would be very difficult and require a container policy writer. Lukas built a new standalone tool, udica for generating SELinux policy profiles for containers based on automatic inspecting these containers. Come to see how easy you can create own policy for container!

Speakers
avatar for Lukas Vrabec

Lukas Vrabec

Principal Software engineer & SELinux technology evangelist, Red Hat
Lukas Vrabec is a product owner & SELinux technology evangelist at Red Hat. He is leading SELinux and Security Special Projects engineering teams. Lukas is a long-term Fedora contributor and Red Hat Enterprise Linux developer. He is the author of udica, the tool for generating custom... Read More →
avatar for Dan Walsh

Dan Walsh

Senior Distinguished Engineer, Red Hat, Inc.
Daniel Walsh has worked in the computer security field for over 30 years.Dan is a Consulting Engineer at Red Hat. He joined Red Hat in August 2001.Dan leads the Red Hat Container Engineering team since August 2013, but hasbeen working on container tec



Saturday January 26, 2019 4:00pm - 4:50pm CET
E105

5:00pm CET

Common Criteria Demystified
What do you feel when you hear the term "Common Criteria"? Do you perceive
it as something complex and scary? It doesn't need to be. After attending
this talk, you will have a clear picture of what Common Criteria is, when,
why and how it is used, why it matters, and what is your role as a
developer in the process of acquiring Common Criteria Certification.
Equipped with this knowledge, you will better appreciate all that goes into
Common Criteria and how it makes products more secure.

Speakers
avatar for Steven Grubb

Steven Grubb

Security Architect, Red Hat
Steve Grubb is a Senior Principal Engineer whose role in Red Hat Engineering is as a Security Architect with a focus on Security Certifications (such as Common Criteriai, SCAP, and FIPS-140) and configuration Guidance (such as DISA STIG, USGCB, and the CIS RHEL Benchmark). He also... Read More →
avatar for Mark Thacker

Mark Thacker

Principal Technical Product Manager, Red Hat
All about open source security, compliance, multi-level security, encryption with a heavy emphasis on what's actually usable.



Saturday January 26, 2019 5:00pm - 5:25pm CET
E105
 
Sunday, January 27
 

9:00am CET

Observability for Istio Service Mesh
In this presentation we will walk through telemetry integration in Istio service mesh. You will learn how observability pillars like tracing and metrics are nicely provided by the mesh and in addition to that how services themselves can enrich this information. We will be demoing Kiali, Prometheus and Jaeger on an OpenShift environment.

Speakers
avatar for Pavol Loffay

Pavol Loffay

Senior Software Engineer, Red Hat



Sunday January 27, 2019 9:00am - 9:25am CET
E105

9:30am CET

Monitoring in Microservices
This talk should be description about what we have done in Factory 2.0 team with regards to monitoring in our microservices and microservice pipelines. What challenges we faced, what technologies we used, what outcomes we achieved. Of course this should be also an introduction to monitoring solutions.



Speakers
avatar for Giulia Naponiello

Giulia Naponiello

Software engineer, Red Hat
I'm an Italian girl and a software engineer at Red Hat. I'm in the DevOps team and I work on a project called Factory 2.0, that has the purpose of automate and improve the release pipeline. I love open source... that's why I also love Red Hat. Sharing knowledge always made us better... Read More →



Sunday January 27, 2019 9:30am - 9:55am CET
E105

10:00am CET

Full-Text Search Tips & Tricks
The real challenge in search is not how to pick the best search engine framework or how to find a match, but how to bring the most relevant results. In this talk we will discuss about relevance and to extract most of your search engine framework by indexing your data in multiple ways, boosting fields correctly, using analyzers, fuzziness, penalizing results, facets, and searching on data with different structures.

In this session we are also going to build from scratch a movie’s search microservice.

Speakers
avatar for Denis Rosa

Denis Rosa

Developer Advocate, Couchbase
Speaker and Developer Advocate at Couchbase, he started programming even before the college and never stopped coding since then. He is Java Specialist and an enthusiast of online courses platforms and accumulates dozens of courses on it. In the last few years, Denis also has been... Read More →


Sunday January 27, 2019 10:00am - 10:50am CET
E105

11:00am CET

Microfrontends: the Next Step after Microservices
Microservices are awesome! They make refactoring, continuous integration and scaling much easier as with the good old monoliths. But sadly many developers don't go farther than the REST API leaving a monolithic frontend behind. That might seem harmlos at first sight but it clearly violates the "share nothing" rule if you have more than one team working on it.
Fortunately, we can enable different teams to work end-to-end without hard dependencies by using a Microfrontend approach.
In this session, you will learn how to break the Frontend into smaller parts and what techniques we have to integrate the resulting Microfrontends without deteriorating the user experience or performance.

Speakers
avatar for Juande Carrion

Juande Carrion

Senior Software Architect, Lidl Digital International
Juande works at Lidl Digital International as Senior Software Architect. He is passionate about distributed software architectures and enabling agile development teams have as much fun as possible while delivering awesome products.



Sunday January 27, 2019 11:00am - 11:50am CET
E105

12:00pm CET

Knative 101: What it is, and what it will be
Knative is a very promising framework, which aims to extends kubernetes with many new features. More than a solution, is a set of middleware components, which targets developers in order to support them in building multicloud, kubernetes based applications.

Potential use cases satisfied by knative includes:

Serverless
Event based programming
Builds

In this basic presentation, we will have a look at the current status of Knative community and subproject, in order to explore the current implementations and the potential evolutions of this solution.

Speakers
avatar for Giuseppe Bonocore

Giuseppe Bonocore

Principal Solution Architect, Red Hat
Solution Architect
avatar for Giuseppe Brindisi

Giuseppe Brindisi

Solution Architect, Red Hat
Giuseppe works as solution architect at Red Hat with the target to develop the partners’ ecosystem. He has more that 15 years of experience in Application Development and FOSS, focusing on the Red Hat middleware portfolio.



Sunday January 27, 2019 12:00pm - 12:25pm CET
E105

12:30pm CET

Splitting the monolith: From Django to Falcon
I love Django. It is so simple and convenient to serve users data with it that you cannot see the reason not to use it.

So we based our Content Management System (CMS) on Django. But as our project grew, Django could no longer keep its breath.

Our data models are big, with lots of their instances. We do not modify them often, but we need to return them on a massive scale. Therefore we splitted our CMS into data management part (still in Django) and data distribution part.
After research, we chose Falcon and ElasticSearch for the data distribution part.

In this talk I will explain how Django ties to Falcon, address some common problems that may arise and show you two example APIs from Showmax platform. Both working with Falcon, ElasticSearch as a data source and Varnish as router.

Speakers
JP

Jan Panacek

CMS Developer, Showmax
I am CMS developer at Showmax, working at everything content data related. Been Python enthusiast since 2012, since I first encountered it at a temp-job as a customer support during my political science studies and it was love at the first sight. Using it as his weapon of choice... Read More →



Sunday January 27, 2019 12:30pm - 12:55pm CET
E105

1:00pm CET

Transactional solutions for microservices
Providing transactional guarantees in distributed world of microservice architecture could be a difficult task. This is especially true if you don’t utilize distributed transactions which is because you’ve heard they bring an overhead for your deployment. But do you really know why?
Fortunately there are practices and patterns that can help you. One of them is saga pattern. Come to find out what is the deal here and why saga is a good fit for microservice architecture.

The session explains what the saga pattern is, how it relates to the LRA (Long Running Actions, github.com/eclipse/microprofile-lra) specification developed for MicroProfile (microprofile.io) and how implementations provided by the Narayana (narayana.io) and Dynflow (dynflow.github.io) projects implement this pattern.

Speakers
avatar for Ondřej Chaloupka

Ondřej Chaloupka

Developer, Red Hat
I'm a developer at WildFly team, working on project Narayana - transaction manager integrated with WildFly, Quarkus and other Red Hat projects.
AR

Adam Růžička

Software Engineer, Red Hat



Sunday January 27, 2019 1:00pm - 1:50pm CET
E105

2:00pm CET

Integration of Apache Kafka with Thorntail
In this session we will cover:
a) Innovative approach provided by Thorntail to package and run a Java EE applications by packaging them with just enough of the server runtime to "java -jar" application.
b) With the help of Thorntail we are building a RESTFul service to store the data into Database and integrate it with Apache Kafka.

Speakers
avatar for Durgesh Anaokar

Durgesh Anaokar

Senior Software Maintenance Engineer, Red Hat
I am a Senior Software Maintenance Engineer, working for Red Hat. I mainly work with product like Red Hat Data Grid, Infinispan. I also work on JVM related issues and therefore I also look into other middleware products.
avatar for Varsha Kamble

Varsha Kamble

PTSE, Red Hat



Sunday January 27, 2019 2:00pm - 2:25pm CET
E105

2:30pm CET

Composable microservices for streaming analytics
It is common for modern applications to perform near real-time processing of high volume streaming data. As Rui and Michael will introduce in this talk, a useful architectural pattern is the microservice based stream composability. By breaking monolithic applications into single-concern microservices and using distributed computation frameworks, we gain the ability to create robust and complex systems from simple components while maintaining scalability properties.
In this talk Rui and Michael will also present patterns and examples on how to build cloud-ready streaming analytics and machine learning pipelines for common solutions such as anomaly detection, using microservices and composable streams from scratch.

Speakers
avatar for Michael McCune

Michael McCune

Principal Software Engineer, Red Hat
Michael is a software developer creating open source infrastructure and applications for cloud platforms. He has a passion for problem solving and team building, and a lifelong love of music, food, and culture.
avatar for Rui Vieira

Rui Vieira

Red Hat
Rui is a Software Engineer at Red Hat working on Data Science, Apache Spark and Spark Streaming applications.


reveal css
index html

Sunday January 27, 2019 2:30pm - 3:30pm CET
E105
 


Filter sessions
Apply filters to sessions.
  • Academic & Research
  • Activity
  • Agile / DevOps / SRE
  • Blockchain
  • Cloud and Containers
  • Community
  • Debugging / Tracing
  • Desktop
  • Developer Tools + IoT
  • Documentation
  • Fedora
  • Frontend / UI / UX
  • Immutable OS
  • Kernel
  • Lightning Talks
  • Meetup / Hackfest
  • MIcroservices
  • Middleware
  • ML / AI / Big Data
  • Networking
  • Platform / OS
  • Quality & Testing
  • Security / IdM
  • Storage / Ceph / Gluster
  • Virtualization