I hope you enjoy this week’s newsletter. We had some interesting links to help secure Nginx and practice breaking and fixing K8S.
If you enjoy this newsletter, make a small contribution to help me to keep working on it.
Now, onward to our links.
Nginx is the web server powering one-third of all websites in the world. Detectify Crowdsource has detected some common Nginx misconfigurations that, if left unchecked, leave your web site vulnerable to attack. Here’s how to find some of the most common misconfigurations before an attacker exploits them.
Kubernetes solves complex problem and it is itself complex. Today we will break the cluster, delete certificates, rejoin nodes on live, and doing all this fancy stuff without possible downtime for already running services.
Solving all puzzles in under a second. Yes, in less than one second total. Pretty impressive and techniques to achieve this performance.
In last issue we link to this serid on physical hardware side, this week we’ll learn about logical side.
Read Replicas are great to reduce load on primary node. But they can be lagged behind? In this post, Shopify show us the solution the Database Connection Management team at Shopify chose to solve variable lag and how they solved the issues we ran into.
walk through the tradeoffs to consider while using pg_dump and pg_restore for your Postgres database migrations—and how you can optimize your migrations for speed, too.
reverse engineering GTA to fix a bottle neck in JSON parsing. Really impressive on figuring out the bottle beck without accessing to souce code and even patch it with a hash map to utilize caching.
Site traffic leapt up in the second quarter, when lockdowns went into widespread effect, by an amount it normally would have taken several years to achieve. For context about Etsy, as of 2020 Q4 they had 81 million active buyers and over 85 million items for sale.
A quick overview of a few tools that are helpful for monitoring linux system.
Understanding XSS and its mitigations provides substantial insight into how the web works and how sites are safely (and unsafely) isolated from each other.
Libraries for creating and controlling interactive web pages with Python 3.7 and above.Python
🔍 Rails N+1 queries auto-detection with zero false positives / false negativesRuby
This is a pure Ruby implementation of the Secure Remote Password protocol (SRP-6a), which is a ‘zero-knowledge’ mutual authentication system. You’ll some cool trick such as constant time string comparison.Ruby
Go package to make lightweight ASCII line graph ╭┈╯ in command line apps with no other dependencies.Go
transforms your cloud infrastructure into SQL or Graph database for easy monitoring, governance and security.
A tool similar to cloc, sloccount and tokei. For counting physical the lines of code, blank lines, comment lines, and physical lines of source code in many programming languages.
a small CLI tool for generating a TLS self-signed (“TOFU”) ECC certificate and private key, suitable for using in small distributed networks, like gemini.
Hanami is a service that allow you to forward email from your domain to personal email and sending email through your domain as well. You can also create unlimited alias on your domain and all of them will be foreward to your personal email.Sponsor
Better Dev Link