
Shubham Chaudhary
Senior Software Engineer, Harness
Actions
I am a senior software engineer at Harness. I have experience in maintaining and contributing to open-source projects. I am an active member of the open-source community, maintaining the LitmusChaos project, and contributing to OSS projects.
I enjoy competitive coding and have qualified as an ACM-ICPC Regionalist. I am always enthusiastic about acquiring new knowledge and exploring novel technology stacks, system architectures, and design patterns to address real-world problems
Links
Hands-On Chaos Engineering Workshop with LitmusChaos and the Road to CNCF Graduation
Join us for an immersive workshop on LitmusChaos, the CNCF-incubating chaos engineering framework, as we share our journey toward graduation. We'll cover our transition from Litmus v2 to v3, security audits, new plugins, and our contributions to documentation and mentorship. This session will provide insights into building a globally impactful open-source project, especially for those in sandbox or incubating stages.
In the second half, we’ll guide you through installing Litmus, running your first chaos experiment, and connecting your ChaosHub. We’ll explore how to create custom experiments using the Litmus SDK, encouraging participants to suggest and test their own chaos scenarios. Bring Your Own Chaos (BYOC) and let’s execute it together in real time. Don’t miss this interactive deep dive into chaos engineering!
Fire in the Cloud: Bringing Managed Services Under The Ambit of Cloud-Native Chaos Engineering
Despite the overwhelming popularity of Kubernetes as the default cloud native substrate, a significant majority of organizations continue to consume managed services on popular cloud providers to run critical applications. Often, the enterprise setting is a largely hybrid one with services spread across multiple hosting environments. With chaos engineering becoming an important part of DevOps strategy, there is a need to support fault-injection on several kinds of targets from a common control plane, while still maintaining homogeneity in experiment definition, & hypothesis validation. In this talk, the Litmus Maintainers will discuss how you can build chaos experiments for a hybrid environment wherein the chaos tooling is operated as a Kubernetes-native application whilst targeting remote cloud infrastructure and managed services. They will also discuss the various considerations in building out such a practice, especially around security and observability.
Contribute To Chaos Engineering and Get Involved with LitmusChaos
LitmusChaos is an open-source Chaos Engineering platform that enables teams to identify weaknesses & potential outages in infrastructures by inducing chaos tests in a controlled way. Developers & SREs can practice Chaos Engineering with LitmusChaos as it is easy to use, based on modern Chaos Engineering principles & community collaboration.
In this session, the LitmusChaos community team will focus on enabling the community to contribute to LitmusChaos and go through a few exciting hands-on activities together. We will conduct a walk-through of some of the latest features in LitmusChaos to ease your Chaos Engineering adoption journey and discuss your important inputs and feedback to help continue to mature the project.
Pre-requisites: LitmusChaos can be installed by following the steps mentioned here: https://docs.litmuschaos.io/docs/getting-started/installation. Here is the to the contributing guidelines: https://github.com/litmuschaos/litmus/blob/master/CONTRIBUTING.md
Unified Chaos Injection And SLO Validation Experiments In Kubernetes
You have a principled process for releasing your Kubernetes app that involves load testing, benchmarking and validation of service-level objectives (SLOs). But, will your app perform well when your cluster is subject to compute, memory, i/o, or network stress? In this talk, we will explore a novel approach that combines chaos injection for probing weaknesses in your Kubernetes infrastructure, with load testing, benchmarking and performance validation with SLOs for your app. The core thrust of our approach will be flexibility combined with simplicity. Your app may be cluster-local or externally exposed, may implement an HTTP or a gRPC endpoint, may have been specified using built-in or custom Kubernetes resources, may use any type of horizontal or vertical autoscaling, may use any CD/GitOps process for deployment, and you may be interested in probing your cluster by injecting compute, memory, i/o, network, or any other types of chaos. Regardless of these variations, this talk will demonstrate a dead simple way to automatically launch the unified “chaos + performance validation" experiment whenever the app is updated, and automatically notify an event receiver with metrics and SLO validation results once the experiment is completed.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top