Red Hat at Open Source Summit + Embedded Linux Conference Europe 2019
Visit the Red Hat booth to speak with our open source experts. As the largest open source company in the world, we build and support open source products from open source projects. With open source, we equip our customers for success.
Speak with our Fedora and CentOS subject matter experts, discuss Red HatⓇ Enterprise LinuxⓇ 8 and Red Hat OpenShiftⓇ 4 and talk all things open with our team.
Red Hat is a platinum sponsor of KVM Forum. Open Source Summit and KVM Forum have partnered for a joint track on Wednesday, October 30, 2019.
Featured Red Hat Talks at KVM Forum
Keynote: QEMU Status Report by Paolo Bonzini
Thursday, October 31, 2019 9:15 a.m.
Libvirt: Never Too Late to Learn New Tricks by Daniel Berrange
Thursday, October 31, 2019 9:30 a.m.
Command Line Heroes tells the epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape.
Help us shape the podcast’s content by giving a short interview—it’s by listening to you that we learn what topics we should cover in future episodes.
Monday, October 28, 2019
Panel Discussion: Evolving for Today’s Security First Mindset
Jon Masters with David C. Stewart & Hengameh James (Intel Corporation), Jiri Kosina (SUSE), Ed Maste (FreeBSD Foundation)
As the cybersecurity landscape continues to evolve, our industry remains focused on ways we can help protect developers and customers. Over the past two years, teams across the industry have continued to improve security throughout our portfolio of hardware and software, and taken our industry collaboration to new levels. We recognize however that no one company can do this alone. We see the value in collaboration that is driven by the structure of the industry and interdependency between layers in the stack. We have built an approach to engaging the ecosystem that features unprecedented levels of coordination. This approach is not only multi-party, it’s multi-lateral, and the goal is to create an environment where we’re all continuously learning. This allows us to drive the meaningful change that customers and end users are counting on. That mindset has improved how everyone develops the hardware and software we deliver. This panel will feature key contributors to this collaboration.
Instrumenting Applications and Alerting with Prometheus
Modern infrastructures allow more frequent and fast deployments of applications. To deal with this ever-changing world, it becomes crucial to gain real-time visibility and detect problems as fast as possible. New tools like Prometheus are adopted more broadly but developers might be left with questions when it comes to instrumenting applications. In this talk, Simon Pasquier will do a brief introduction of the Prometheus monitoring system. He will then explain how to write good instrumentation, what are the common pitfalls and how to do effective alerting. A live demonstration will show how to get from zero instrumentation to an observable system.
Mario’s Adventures in Tekton Land
Vincent Demeester & Andrea Frittoli (IBM)
Tekton is a Kubernetes-native, lightweight, easy to manage CI/CD pipelines engine. Pipeline building blocks can be reused, version controlled and curated in a catalogue that embeds best practices. Tekton, hosted by the CD Foundation, aspires to be the common denominator in CI/CD, modelling what Kubernetes has become in cloud-native application development. The Tekton team wanted to make sure that the project is going in the right direction by "dogfooding" i.e. by using Tekton to run its own automation "plumbing". The initial continuous integration setup embedded most of the testing pipelines in bash scripts. The speakers replaced this with Tekton, hence improving the readability of the pipelines and the reproducibility of CI runs. Eventually, they moved onto continuously delivering Tekton and its pipelines via Tekton. In this talk, the speakers will tell their experiences about using a cloud-native pipeline system to test, release and continuously deploy itself.
Lightning Talk: Using Data without Compromising Privacy
Deep learning and machine learning more broadly depend on large quantities of data to develop accurate predictive models. In areas such as medical research, sharing data among institutions can lead to even greater value. However, data often includes personally identifiable information that we may not want to (or even be legally allowed to) share with others. Traditional anonymization techniques only help to some degree.<br><br>In this talk, Red Hat's Gordon Haff will share with you the active research activity taking place in academia and elsewhere into techniques such as multi-party computation and homomorphic encryption. The goal of this research is to enable broad information sharing leading to better models while preserving the anonymity of individual data points.
Keylime - An Open Source TPM Project for Remote Trust of IoT
Keylime (keylime.dev) is a young, rapidly growing open source project originally created in the security research department of MIT's Lincoln Laboratory. It provides a way of measuring the cryptographic hardware root of trust of devices hosting an Trusted Platform Module (TPM) chip. Keylime is about making TPM technology accessible for developers and users. It handles the complexity, you drive the use case!
Mentors Make Mentors: 7 Tips For Your Open Source Mentoring
If mentoring is the cornerstone of a successful open source project, how do you sustainably grow mentors? After all, mentors don't fall from trees, right? How can the hand-holding become viral? In this talk you'll learn why and how "mentors make more mentors" is a secret ingredient of the best open source project. This mentoring method helps enable collaboration at a scale, to grow beyond a tightly-knit original contributor core. Karsten draws upon two decades in roles across open source projects and as a community architect at Red Hat to craft 7 specific tips for education and discussion. By no means all the tips and tricks one can know about, he focuses on broadly useful areas, such as: defining the role; empowering subjects; creating communities of practice; building diversity in from the start; and more! By the end of this presentation you will have methods and resources to use for your open source community development mentoring.
Confidential Computing with Enarx
Mike Bursell & Nathaniel McCallum
We've known for a long time that we need encryption for data at rest and in transit: the Linux Foundation recently formed the Confidential Computing Consortium to encourage use of technologies to help you do encryption for data in use. Enarx is an application deployment system enabling applications to run within Trusted Execution Environments (TEEs) without rewriting for particular platforms or SDKs. You will learn why confidential computing is so important, why it is so hard, and how Enarx is designed to make it easier and more manageable without sacrificing security. Technologies include Rust, virtualization, WebAssembly, Trusted Execution Environments. We will examine the architecture and workflow, and provide a demo of the existing state of the project, which is currently targeting AMD and Intel hardware.
Best Practices for Community Elections
More and more communities are moving to representative bodies elected from communities. This change results in a number of questions which can consume an inordinate amount of time and effort: Who can be nominated and elected?* Who gets to vote? * How can people be nominated? * How will you administer the vote? * Should you defend against ballot stuffing or similar ills?* How will people's votes be counted?* How do you ensure that the vote is anonymous and verifiable? Community elections can be a fabulous way to engage with your community. The running and counting of elections also has the potential to be contentious, disruptive, and time-consuming. This presentation will lay out your options, describe how elections are run in various open source communities, and make recommendations for how to run your own elections efficiently.
(How to) Be a Good Citizen in Open-Source Documentation
Open-source projects struggle with documentation -- it is often cited as the weak spot of open source. Many projects have failed to attract docs contributors, and many companies that contribute code don’t have processes for working with upstream docs. How can you, both as a corporate and individual contributor, help to create a healthy documentation set? What are best practices for writing and maintaining open docs? This session will introduce attendees to basic principles of fitting docs work into the open-source collaboration model. You will learn about open-source documentation what you may already know about open-source code: how to be a good community member, how to contribute meaningfully, and how to ensure the resulting docs serve the community well and can also be downstreamed easily.
BoF: For Digital Transformation, the Answer is Open Source
Katrina Novakovic & Malcom Herbert
Tuesday, October 29, 2019
Stop Merging Broken Code: An Introduction to Zuul
Matthieu Huin & Fabien Boucher
Being one of the biggest open source projects with hundreds of code repositories and tens of thousands of commits with each release, OpenStack's CI faces unprecedented scale problems. Among those challenges, making sure that the code base is always healthy is the most critical one; but conventional CI workflows cannot keep up with the velocity of OpenStack's contributors as a whole. New problems require new solutions, and thus the OpenStack community came up with Zuul, the "Gate Keeper" ( https://zuul-ci.org ). Zuul is a code gating system that drives CI/CD workflows. At version 3, it is flexible enough to be used with projects of any scale to ensure code sanity. This presentation aims to introduce Zuul's core concepts like "code gating", ie automate merging changes to projects only if their tests pass; and "speculative merging", ie "testing the future" to detect problems early. Zuul's main features will also be discussed. Finally, pointers will be given to deploy and test Zuul.
Kubevirt 101 - Learn the New Way to Operate VMs
Juan Manuel Parrilla Madrid & Sergi Jimenez Romero
In this session we will talk about what KubeVirt is and how it works under the hood on a Kubernetes platform. KubeVirt is a project that allows users to create and manage virtual machines within a Kubernetescluster. It helps you to reduce complexity in your infrastructure to manage containers and VMs side by side with a single orchestration tool. Attendees will walk away with the following:* Understanding of KubeVirt installation.* Understanding of the basic KubeVirt objects and components.* Understanding on how to deploy/manage virtual machines. * Understanding on KubeVirt storage. * Understanding on KubeVirt networking.* Understanding on how to live migrate virtual machines. * Understanding on how KubeVirt integrates with Prometheus.
Growing and Sustaining OSS: Evolution of the Ceph Development Process
Ceph is a fully open source distributed storage system that started in a university lab, and has now reached 100K commits from nearly 800 contributors from all over the world. The use cases for Ceph are broad; from providing shared file systems in small private clusters, Ceph scales to meet the needs of even modern public clouds. Like other large OSS projects, a diverse set of tools and procedures have grown up around the user and development community. This talk will explore the unique aspects of the size and scope of Ceph development process, and how the community is trying to improve the overall experience through documentation. The nature of many large software projects means documentation and reality are often drifting further apart, and this is especially true for projects like Ceph that are constantly evolving to meet the needs of new hardware systems and operating environments.
Lightning Talk: Benchmarking CALMly for Noisy Neighbor Environments
The common practice of benchmarking databases and other applications on platforms like Kubernetes by running an application benchmark on an idle platform is not ideal: it does not give insights into how performance will be impacted in production when noisy neighbors are sharing the platform. In this talk, Manoj Pillai will introduce Controlled Ambient Load Mixing (CALM), a new benchmarking methodology which involves running a benchmark concurrently with a steady background load, and iterating the process with different background load levels. The talk will describe an implementation of CALM aimed at storage workloads and provide results for some popular database benchmarks, demonstrating the insights CALM can provide into application and platform performance characteristics, like application sensitivity to noisy neighbors, while maintaining reproducibility of results.
Introduction to Kubernetes Operators and the Operator Framework
Matt Dorn & Michael Hrivnak
This is an entry-level workshop for both application developers and system administrators interested in building and managing Operators for Kubernetes environments. It is designed for those who have a basic knowledge of Kubernetes and want to learn how to apply domain or application-specific knowledge to automate common operational tasks. Attendees will receive live lab environments and take an interactive journey through the process of creating real-world Operators with Go, Ansible, and Helm while mastering methodologies, design patterns, and strategies that can assist in avoiding common pitfalls. After your Operator has been created, learn how to utilize the Operator Lifecycle Manager (OLM) to define, install, and upgrade your Operator and record cluster usage with the Operator Metering project.
Waiting and Idling: An Anatomy of the Virtual Processor
The x86 architecture provides a number of instructions that can improve Processor performance and efficiency when used correctly. However, their behavior might not be straight forward and evident in a virtualized environment. This talk focuses on processor behavior when these instructions are executed in guest mode. A proper understanding can potentially help application programmers and administrators alike to get maximum performance, utilization and consolidation when dealing with virtualization.
Wednesday, October 30, 2019
VirtIO without the Virt - Towards Implementations in Hardware
VirtIO was designed to standardize hypervisor interfaces for virtual machines - but we are beginning to see the emergence of Virtio hardware. This talk will answer the questions: why does this make sense, what works and what are the issues hardware implementations of virtio have to overcome? Topics to be covered:- What is the difference between hardware virtio devices and virtio data path accelerators? - What are the minimal requirements of virtio in hardware? - How can we handle compatibility, including hardware bugs and limitations?- How to make live migration work? What about overcommit?- Which changes included in the recent virtio specification help design hardware virtio devices?- Which known issues remain and how does the Virtio committee plat to address them?- Why design Virtio in hardware? Are there alternatives?- Why get involved with the Virtio specification process?
Practical OpenHPC: Cluster Management, HPC Applications, Containers and Cloud
Since its inception as a Linux Foundation project in 2015, OpenHPC (https:///openhpc.community) has steadily grown to provide a modern, consistent, reference collection of HPC software.Although a primary focus of OpenHPC remains in enabling people deploying new HPC clusters to rapidly get their clusters up and running, the OpenHPC software repository itself serves as a reliable, portable, integrated collection of software, libraries, tools and user environment that can be employed in containers and VMs as well as HPC clusters to develop and execute HPC applications.This workshop will begin with a brief, advanced introduction to OpenHPC. We will then guide attendees through several practical, hands-on exercise modules employing an OpenHPC-based cluster and the OpenHPC software repository to explore real-world activities.
Formal Verification Made Easy (and fast!)
Daniel Bristot de Oliveira
Modeling parts of Linux has become a recurring topic. For instance, the memory model, the model for PREEMPT_RT synchronization, and so on. But the term “formal model” causes panic for most of the developers. Mainly because of the complex notations and reasoning that involves formal languages. It seems to be a very theoretical thing, far from our day-by-day reality. Believe me. Modeling can be more practical than you might guess! This talk will discuss the challenges and benefits of the modeling and verification of the Linux kernel, based on the experience of developing the PREEMPT_RT model. It will present a methodology based on Finite-State Machines, using terms that are very known by kernel developers: tracing events! With the particular focus on how to use models for the formal verification, at runtime, with low overhead, and in many cases, without even modifying Linux kernel!
Crafting an Open Source Product Strategy
Some common questions which are asked frequently of open source programs include:* How should I open source a proprietary project? * How can I get some more support for this open source project? * What business model will work best for this open source project? It turns out that there are some very common patterns that can help answer all of these questions, by first answering the question "why?" This presentation will present some of the foundational questions that you should ask yourself when putting together a business case for an open source project. We will talk about the economics of open source, the steps involved in open sourcing proprietary code, and how you can help your company realize the benefits of open source.
Contributor Q&A Panel
Andrea Arcangeli, Karen Noel & Kashyap Chamarthy with Peter Shier (Google), Konrad Wilk (Oracle), David Woodhouse (Amazon)
A technical (and end-user oriented) Q&A panel discussion on a variety of topics related to KVM, QEMU and more. The discussion will be for about an hour. Topics will be chosen on the spot from a prepared list, and from the live Etherpad, where an audience (live or remote) can add questions before or during the discussion. https://etherpad.net/p/KVMForum2019Panel
Introduction to AWX
If you started to work with AWX GUI, You might have questions like: What is AWX? How do I use AWX to manage my environment? Can I use RBAC in AWX? Can I use Authentication methods like SAML, Google with AWX? How to import dynamic inventories aws, vmware, azure etc in awx? Is there any way from which I can use my already available code in the AWX? What about security, is it secured? Our aim is to answer all of these questions, and showcase places you can find (and use!) each of them. We’ll discuss how these specs affect you when using AWX. We’ll explore how each standard is improving our lives today, and what kinds of innovation they open up for the future. Wanna know more on AWX, visit : https://github.com/ansible/awx