Ops & Systems Programming Conference

Union Trust Building — Pittsburgh, PA

August 24-25, 2017

Register

Uptime is a single track conference focusing on skills and technologies that improve software delivery and infrastructure management.

Speakers

Featuring a hand-picked lineup of presenters that we think best emphasize the values and ideas that will move our community forward.

Buy Tickets

Schedule

Thursday Friday
9am-5pm

Times and additional sessions TBA

Put Some Dev in Your Devops

Presented by Katherine Daniels

One of the goals of modern operations teams is to provide and operate services that other engineering teams use to do their jobs, enabling developers to get their work done with as little friction or operational overhead as possible. Some of those services, such as hardware provisioning and server configuration, have typically fallen under the domain of system administration, but there’s no reason that they have to be developed or operated in an old-school sysadmin-sort of way.

This talk will look at how Etsy’s operations team has worked to add some dev to their ops, including test coverage, refactoring, and deployment processes, with a focus on how to add better development processes to existing infrastructure and tools (since we don’t always have the luxury of throwing things out and starting from scratch!). It will discuss specific tools such as Chef, Nagios, and Etsy's deployinator, but the concepts will be applicable to most operations tech stacks.

Platform Agnostic and Self Organizing Software Packages

Presented by Nell Shamrell

One of the dreams of development is to build a software package once, then be able to deploy it anywhere. With current Open Source projects this dream is closer than ever. Come to this talk to learn how to create software packages that run (almost) anywhere. You will see how the same application can be run on bare metal, on a VM, or in a container - with everything needed to automate that application already built into the package itself. This even works with a mixed infrastructure - metal for your static compute heavy loads, vms for your persistent data stores, and ephemeral short lived containers for you applications managed by Kubernetes or other container scheduling services.

Come to this talk to also learn how to build and deploy these packages with the intelligence to self organize into topologies, no central orchestrator needed. Learn how the dream of platform agnostic and self organizing packages is fulfilled today and where it will evolve in the future.

Security in Automation

Presented by Jamesha Fisher

Security automation involves so much more than just infrastructure as code. How do we make it easier for engineers to do their jobs and at the same time have security in all that we do, including for companies just starting out? In Jamesha Fisher’s talk, she expands upon the world of Security in DevOps, and how automation helps engineering overall.

Build a Fault Localizer in 40 Minutes

Presented by Robbie McKinstry

Harden your test suite with a fault localization tool that generates a coverage profile for each test in your suite. Then, if any test fails, the fault localizer generates a "suspicion" value for each possible pathway which could contain the location of the fault

Scale it to a Billion: How to build it, keep it safe, and keep it running

Presented by Pete Cheslock

Over the past three years, Threat Stack has been working on building a scalable distributed system to manage a continually growing corpus of customers’ critical data. Like many growing companies, Threat Stack has limited time, money, and resources, but that doesn’t offer an excuse to skimp on things such as high availability and security.

I'll share the operational and security practices that helped Threat Stack scale while staying stable and secure, covering technology and tools and the various scale points that forced hard decisions. Along the way, we'll also explores approaching security not as a dedicated team but as culture that everyone owns.

Topics include:

  • Going from five servers and a few hundred thousand events per day to several hundred servers and ten billion unique events each day
  • How on-demand telemetry helps Threat Stack scale
  • Early design decisions that worked (and those that didn’t)
  • When to use distributed systems (and when not to)

Designing for Operations

Presented by Craig McLuckie

Kubernetes and Linux application containers are making it easier than ever to build and deploy distributed systems software. They also provide a gateway to more intrinsically sustainable operations. During this session we will explore how to think about building more intrinsically operable systems with Kubernetes that are not only easy to live with, but how they are changing the game for operations teams that are responsible for the care and feeding of production systems.

Reactive Infrastructure with Consul

Presented by Seth Vargo

Consul is an open source tool for service discovery, monitoring, and infrastructure configuration. There are two sides to monitoring - exposing problems with alerts and acting upon those alerts to automatically resolve them when possible or notify an operator. For exposing problems, Consul works much like other monitoring solutions. Users can define any script for Consul to intelligently check and report the health status of a node in a cluster. In this way, Consul is compatible with Nagios and Sensu style checks, but the problem with monitoring systems like Nagios or Sensu is that they are knowledge silos. They are designed to ingest health information and expose them to human operators. Consul supports health monitoring using Nagios-style plugins, but it is designed to expose that information in a way that is both machine and human actionable.

With Consul custom watches and service discovery integration, infrastructure can automatically react and adjust around failures. If a web node is reporting an unhealthy state, Consul can automatically remove the node from the load balancer. If a disk space health check is low, Consul can automatically run logrotate and delete everything in `/tmp`. If CPU load is high, Consul can trigger a script to add more nodes to the cluster. In this way, Consul pushes the existing paradigms of monitoring, making it much more than a notification system.

From Turing to Big Data: A Look at Computing and Analytics

Presented by PJ Hagerty

A look at where computing and analytics began and where it is headed. The basis of all DevOps and development starts with our measurements. We need to understand what role analytics and metrics plays in modern computing. To find out, we look at where analytics began in the advent of computer science and where we stand today, with an eye toward the future.

Lightning Talks

Presented by You(?)

Five minute presentations by attendees. No product pitches. Sign-ups at the event.

Times and additional sessions TBA

Sponsors

We believe in creating high quality events that are accessible to all. Thanks to these sponsors for helping us maintain low ticket prices. Email sponsorship@codeandsupply.co for information about sponsoring this and other events or view our prospectus.

Venue & Hotel

Our event will be held in the auditorium of the Union Trust Building located at 501 Grant Street in Pittsburgh, PA. The official conference hotel is the Omni William Penn Hotel located directly across Oliver Avenue from the conference venue. To book a room at a special conference rate, call and mention Code & Supply Uptime or use the hotel's provided online booking service.