Docker 1.12 offers a built-in orchestration manager. This is a big step because allow us to use Docker to manage our production environment and not just the runtime engine for our build containers. This workshop is designed for sysadmins, DevOps and all engineers that already know what a container is and the basics about the Docker ecosystem.
After a deep drive into the main concepts of Docker Swarm, we will create an infrastructure environment made of 5 nodes and we will install few tools to monitor, scale and make secure our environment. We will use all best practices to make our environment secure, stable and also to understand how to manage a production environment. Continuous Integration, Docker Registry, Monitoring, Logs and so on. Attendees will leave understanding what Docker offer to build a solid production environment for our applications and microservices.
In this workshop Russ Miles will demonstrate and implement the DDD patterns that are applicable to building great microservice-based systems. Pulling from years of experience building this style of systems, this workshop will share the deep technical design skills that help make your microservices adoption a success.
- Design a monolith ready for microservices
- Apply patterns such as Bounded Contexts, Events and Event Sourcing to be flexible enough to embrace microservices at the right point for your application
- How to build fast data flows and integrate with big data tasks from your microservices.
- Deploy, Upgrade, Stress and Manage your microservices so that they are ready for production
We all love the aspirational DevOps talks about companies achieving blistering speed and dazzling nimbleness. But improving your own organization’s performance – from where they are now to performance levels equal to the industry leaders – seems like a very long and difficult road. What is missing in most organizations? A repeatable system that empowers teams to find and fix their own problems. This is a prescriptive talk about empowering and transforming organizations using a methodical — and totally reasonable – Kaizen (Continuous Improvement) approach. We’ll look at ways of combining known techniques like value stream mapping, Lean waste analysis, and improvement kata in order to fix organizational, process, and tooling problems. This talk isn’t about mythical silver bullets or vague philosophies. This talk is about taking a fresh look at proven Lean techniques that already work in high-performing IT organizations.
Is continuous delivery mainstream? We would all like to think so, but as William Gibson reminds us, “The future is already here—it’s just not evenly distributed.” The large (unicorn) companies have been talking about deploying containerized applications for some time, but the processes, techniques, and technologies involved are not always clear when looking in from the outside. This can make it difficult to emulate their success.
Based on his experience building several Docker-based applications that were deployed to a range of orchestration and scheduling platforms, Daniel demonstrates how to create a scalable build pipeline that takes a series of Java applications, containerizes them, and deploys them into a container orchestration platform.
The talk will primarily be slide-driven and at the conceptual level, but example Java/Docker/Jenkins code will be available to download via GitHub, and the project can be executed locally via Vagrant.
Peter Lie will give a quick analysis based on the book ‘Antifragile; things that gain from disorder’ from Nassim Nicholas Taleb. He will walk through elements from the book and how they experience these in day to day agile coaching operations: Understanding of Fragile – Robust – Antifragile Fragile: Turkey as Black Swan at Christmas time, You lose more by randomness (gain/loss graphic), One size fits all Antifragile: Can win, You gain more by randomness (gain/loss), Barbell strategy (safety vs. risks), Thinkering versus Big design upfront, Complex versus Simple After the talk Peter will give an interactive workshop about how you can use these insights to improve your own workplace and attitude in your environment.
Building infrastructure in the cloud is a different paradigm to that of physical data centers. The infrastructure we deploy today has no guarantee to be there tomorrow. You therefore need to change how you design infrastructure.
In this talk, Paul will look at some real world examples of how to deploy infrastructure to the cloud that self heals and is scalable to withstand 3rd party provider outages. This should help you think about ways to avoid that 4am pager alert.
Our application and our infrastructure speak, time series are one of their languages, during this talk I will share my experience about InfluxDB and time series to monitor and know the status of our cloud infrastructure. We will show best practice and tricks to grab information from an application in order to understand the mains difference between logs and time series.
We used to talk about developers throwing their code across to beleaguered ops team and now we are preaching a message of doom for companies that fail to “go digital”. DevOps has become such a buzzword in recent IT circles, that no talk is truly complete without a mention. But are we doing it right?
Is the drive for continuous development making it harder and harder for the Ops team to keep the plates spinning and the organisation running? Does the need for business control take all the fun out of development? And why are so many DevOps teams having to become InfraDevOps specialists?
In this keynote, Martin Percival from Red Hat will look at some of the niggles of the DevOps world and will start to look at ways to harness DevOps successfully, drive business transformation and yes, even bring some “sexy back” into the world of corporate development. Be prepared for openness and even some contention, but be prepared to start the conversation around how we change the engine of our businesses while still accelerating hard.
It’s not just about having data, anymore. It’s about what you do with it. We’ll explore the different recipes for unlocking the hidden value in your data. With the right abstractions, models and processes you can bring to light new insights for your customers. Our discussion will cover practical, real-world examples from the Nasdaq Innovation Lab—changing the way organizations find value, through smarter, growth-focused, and living products.
It's a situation many of us are familiar with: a large legacy, monolithic application, limited or no tests, slow & manual release process, low velocity, no confidence... A lot of refactoring is required, but management keeps pushing for new features.
How to proceed? Using examples and lessons learned from a real-world case, I'll show you how to replace a legacy application with a modern service-oriented architecture and build a continuous integration and deployment pipeline to deliver value from the first sprint. On the way, we’ll take a look at the process, automated testing, monitoring, master/trunk based development and various tips and best practices.
To successfully move to DevOps, you will need to change your company's culture in a lot of ways. If you have people in very distinct operations and development teams, how do you convince them about the benefits of closer collaboration and blurring of lines?
Why would operations let developers have production access? If it resulted in better monitored, better documented, more stable and resilient systems, maybe they'll accept the perceived extra risk.
Why would a developer accept being woken up at 2 am for no more money? If it means having the power to make more decisions about the tools, processes and software to use, maybe they'll be fine with that.
Over the last few years at the Financial Times, we've gone through this culture change, and I'm happy to share some of the problems we've faced and the solutions we've tried.
All is not completely rosy in microservice-land. It’s often a sign of an architectural approach’s maturity that anti-patterns begin to be identified and classified alongside well-established principles and practices. Daniel Bryant introduces seven deadly sins from real projects, which left unchecked could easily ruin your next microservices project.
Daniel offers an updated tour for 2016 of some of the nastiest anti-patterns in microservices from several real-world projects he’s encountered as a consultant, providing a series of anti-pattern “smells” you can sniff out and exploring the tools and techniques you need to avoid or mitigate the potential damage.
Pride: Selfishly building the wrong thing, such as the "Inter-Domain-Enterprise-Application-Service-Bus” or a fully bespoke infrastructure platform
Envy: Introducing inappropriate intimacy within services by creating a shared “canonical” domain model
Wrath: Failing to deal with the inevitable bad things that occur within a distributed system
Sloth: Composing services in a lazy fashion, which ultimately leads to the creation of a "distributed monolith”
Lust: Embracing the latest and greatest technology without evaluating the operational impact incurred by these choices
Docker containers have brought great opportunities to shorten the deployment process through continuous integration and delivery of applications and microservices. This applies equally to enterprise datacenters as well as the cloud.
Jussi, an experienced software architect, will use this workshop to discuss solutions and benefits of a deeply-integrated deployment pipeline using technologies such as container management platforms, Docker containers, and the drone.io Cl tool. Jussi also will demonstrate deployment of a CI/CD pipeline using container management, as well as show how to deploy a containerized application through a continuous delivery pipeline.
Software development is not just about building stuff, over the better part of the last decade a global movement kicked in that realized this change in building and delivering software. Software has only value when it is running in production. Yet people seem to forget about that. This talk will teach you about a number of real life situations preventing deplooyment and running software and how to fix them.
Deep learning (DL) hierarchical models are a form of machine learning particularly suited to the creation of artificial intelligence for financial data analysis. We discuss opportunities and limitations of this new technology and indicate what (exciting) changes we expect to unfold over the coming years.
In the past year we migrated our applications to containers to isolate our applications and made them easily shippable. But now we are struggling running stateful applications to make them scaleable and fault tolerant. And we run our big data and fast data frameworks in separate clusters because it is not super easy to integrate this into our current container stack. This means that our cluster utilization is not optimal and we resign scaling effects comprehensive containers and big data frameworks. Florian Leibert (Mesosphere, CEO) calls this phenomenon Container 2.0 and we will discuss this topic in this session.
In this session we will look at current container usages and show the actual problematics. After this we will see how DC/OS and Apache Mesos delivers Container 2.0 to optimize cluster resource sharing for all parts of your application.
The continual search for alpha in trading today has lead to an explosion of interest in alternative information sources, such as social media (Twitter, Stocktwits and so on), and the use of artificial intelligence to make sense of it all. In the world of conversations and opinions it's hard to sift through the noise and filter out the real events that are impacting the markets. Data mining, natural language processing and heavy retrospective analysis has shown there is valuable information, but there are significant challenges finding that information in real time. Working with Yedup we've built an AI system that can extract real-time alpha and provide an API feed of hundreds of stocks and their related companies and industries. Used by one of the worlds biggest market makers we talk through some of the architectural choices and approaches needed to realise the real-time AI found in the Yedup system.
Development is more than just code. How many times have you delivered a feature only to find that what you’ve built isn’t what the user wanted? We’ll be looking at ways you can build communication strategy into your development process, with a focus on cross-team communication in larger organizations. Involving non-technical teams and individuals in your development process through communication allows for a wider range of insights. Productive internal conflict supported by open communication can help make sure you build the right product the first time.
DevOps has provided plenty of lessons for how to speed up the pace of delivery and frequency of deployments. But delivery and deployment only covers one part of the day-to-day life for developers in large enterprises. What about what happens after deployment? In most cases, increasing the pace of delivery and frequency of deployment just increases the operational support load, work interrupts, and context switching that has always cut deeply into a development team’s time.
This talk will focus on the successful design patterns that high-performing, large scale organizations have applied to reduce the operational burden and support costs across their entire organization. Specifically, we’ll look at how they apply DevOps principles to improving the post-deployment lifecycle and how Developers play the key role in reducing the difficultly and cost of operations activity for everyone.
A cornerstone of the DevOps principal is to achieve frequent deployments that are risk-free and simple to perform - and using deployment automation tools such as Ansible, Puppet or Chef is the key to successful implementation. Such tools follow the principals of "infrastructure as code", allowing you to define your infrastructure as a set of instructions that build it from scratch - from provisioning the necessary virtual machines, right through to installing required software and deploying your application.
By turning your infrastructure build into code, you can apply common development principals such as source control, patching and controlled releases, giving you the kind of control that you need to ensure that everything runs smoothly.
With this session aimed at those who are new to Ansible, we will talk through what Ansible is, what it does, and how to use it, before demonstrating how you can use it to configure your cloud infrastructure in AWS, provision a JBoss FUSE fabric to host the applications, and then deploy an example application to it.
Attendees will get a good understanding of how they can use automated deployment and infrastructure as code technologies, and how these can help them in their DevOps journey.
Has DevOps become a synonym for Continuous Improvement? As the breadth of DevOps concerns has spread to seemingly include everything in the IT lifecycle and ever incorporates the rest of the business’ goals and activities how do we define what it is? What are the contributing methodologies that converge and combine to drive DevOps evolution? In this talk, Helen explores the relationships between Agile, Lean, ITSM, Learning, Failing Smart/Safe/Fast, the Theory of Constraints, Shifting Left and Holacracy and whether together they are a superpattern that underpins DevOps.
For effective, modern, Cloud-connected software systems we need to organize our teams in certain ways. Taking account of Conway’s Law, we look to match the team structures to the required software architecture, enabling or restricting communication and collaboration for the best outcomes. This talk will cover the basics of organization design, exploring a selection of key team topologies and how and when to use them in order to make the development and operation of your software systems as effective as possible. The talk is based on experience helping companies around the world with the design of their teams.
Interest and energy has been pouring into the Hyperledger Project which was launched in 2016 by the Linux Foundation to provide blockchain technologies for the enterprise. Blockchain technology is the underpinning of Bitcoin, but its application goes far beyond alternate currencies. Blockchain can be used to address information-management problems in a decentralized manner. This is valuable not only to the financial industry, but also in healthcare, environmental monitoring, emerging-market credit, supply chains, even education. This presentation covers how this community of open source communities is organized, the different projects they focus on, and provides an introduction to Fabric, the blockchain framework IBM has contributed.
Look at that application. It's fantastic. It’s solid, reliable and bug free. Depended on by many. It’s so good your new task is to move it into the cloud and make into a service. How hard can that be?
Many have gone before you along this path. Many have failed. A few have succeeded. All have scars. Although the journey is different for everyone there are common aspects to them all. In this talk we will cover our experiences in moving applications into the Cloud. What you must do. What you must not. What matters, what doesn’t.
In moving to the cloud there is no try.
In this talk:
* We'll cover the core aspects of how the cloud differs from local data centers in terms of application design, runtime characteristics and operational considerations.
* We'll explain through various real life examples where things worked and where they didnt
* We end with a summary of the key elements to success and the major pitfalls to avoid.
Presenting from the perspective of a fictitious web application penetration test, this session will provide you with a well-founded overview of the open-source tools used by security professionals and penetration testers in their daily work on the detection of security vulnerabilities. Despite the high quality of the supportive tools in this field, this is still unknown territory for many development projects and therefore unused potential. After my presentation, you will be familiar with the tools of the professionals along with the purpose, usage scenarios with concrete examples, and pros and cons - in the hope that their use does not remain only in the hands of the penetration tester.
A large number of organisations have successfully adopted DevOps practices, but is it for everyone? Surely bigger enterprises can’t do this because they are too big and too siloed to make it work. Or can they? This presentation will walk through the biggest challenges in scaling up DevOps in the enterprise and how to approach them.
This approach is superior to what came before it but is not perfect. Testing frequently ends at the point of release, meaning that bugs in production can be caught late and by the end users. Pragmatism dictates that exhaustive acceptance testing is infeasible. Tests usually represent only a simplified version of user interactions. In production, data will almost certainly be generated by code paths that have not been fully exercised in tests. That data is usually decoupled from our testing environment. If the current version of the system generates data, how do we know that future versions will consider it valid and act upon it appropriately? How can we find out about bugs after acceptance, but before customers do?
This session will demonstrate how to sanity check a live system using end to end testing, limiting interference with real interactions. It suggests ways to integrate real production data into a continuous delivery pipeline and assert on the validity of the production outputs.
In this hands-on workshop we’ll all attack the training web app, to take on the role of a pentester one step at a time. You’ll learn how to work with professional security tools through a range of practical tasks and will also learn pentesters’ general approach for attacking web apps.
Of course, we’ll also deal with defensive measures for protecting the security holes found, though our focus will remain the systematic use of professional hacking tools for carrying out (partially automated) security analyses. Once you’ve completed this workshop, you’ll have practical experience of carrying out attacks on web apps, which you can transfer into your own software development work so as to increase the security of your projects for the long-term.
For effective Cloud-connected software systems we need to organize our teams in certain ways. Taking account of Conway’s Law, we look to match the team structures to the required software architecture, enabling or restricting communication and collaboration for the best outcomes. In this workshop you will learn how to design your organization for modern, Cloud-connected software systems, covering topics such as: fundamental team topology types; how and when to use the fundamental team topologies; how to recognise other team topologies and to map these onto the fundamental types using topology fitness functions; the dynamics of team design and how team topologies should evolve; heuristics for discovering new topologies. On completion of the workshop, you should have a sound understanding of which team topologies to apply in different circumstances and why. Attendees are expected to have a basic understanding of Conway’s Law and of the DevOps Topologies patterns at http://devopstopologies.com/.