Debugging Software Deployments with strace
Instead of using normal debugging tools like gdb, I have another toolset for debugging deployments. My favourite tool for “Why isn’t this software working on this machine?” is strace
UUIDs are Popular, but Bad for Performance
In order to appreciate the impact of using UUID values as a primary key, it is important to review how InnoDB organizes the data. InnoDB stores the rows of a table in the b-tree of the primary key. In database terminology, we call this a clustered index. The clustered index orders the rows automatically by the primary key.
How Let's Encrypt(LE) Runs CT Logs
Beside issue free cert, LE runs a Certificate Transparency. They issue 1M certs per day and share how they run this log infrastructure to handle that scale.
You’re making morning drip coffee. You need to make 2 cups. Do you:
1. Put 1 cups worth of water in the boiler so the water boils sooner and the first cup is ready sooner or,
2. Put 2 cups worth of water in so both cups are done sooner?
This is an illustration of Latency/Throughput.
An Overview of Cryptography
This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today. (See Section A.4 for some additional commentary on this…)
Addressing in AF_INET, AF_INET6 and AF_UNIX sockets
A freshly created socket isn’t very useful. We have to tell it to either listen for incoming data, or connect to a remote peer. To achieve anything useful we need to perform a syscall dance, which involves either bind() or connect() or both.
Mergeable replicated data types – Part I
Mergeable Replicated Data Types (MRDTs) are in the same spirit as CRDTs but with the very interesting property that they compose. Furthermore, a principled approach for deriving MRDTs is provided, allowing a wide range of data-types to be lifted to their mergeable, replicated counterparts with very little effort on the part of the programmer.
Code to read
Rapidly create interactive uis in pure ruby.
A resilience and transient-fault-handling library that allows developers to express policies such as Backoff, Retry, Circuit Breaker, Timeout, Bulkhead Isolation, and Fallback
A general purpose syntax highlighter in pure Go
a lightweight network vulnerability scanner. With Flan Scan you can easily find open ports on your network, identify services and their version, and get a list of relevant CVEs affecting your network.
A scalable overlay networking tool with a focus on performance, simplicity and security
monitors Kubernetes, recording histories of events and resource state changes and providing visualizations to aid in debugging past event
a data loading tool for PostgreSQL, using the COPY command.
an open source privacy-friendly analytics software. It aims to be reliable, friendly to use and easy to deploy.
a scalable real-time operating system (RTOS) supporting multiple hardware architectures, optimized for resource constrained devices, and built with safety and security in mind.
Network, Service & Security Observability for Kubernetes
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this