recentpopularlog in
« earlier  
Introducing Dispatch - Netflix TechBlog
All of the ad-hoc things you’re doing to manage incidents today, done for you, and a bunch of other things you should’ve been doing, but have not had the time!
Dispatch helps us effectively manage security incidents by deeply integrating with existing tools used throughout an organization (Slack, GSuite, Jira, etc.,) Dispatch leverages the existing familiarity of these tools to provide orchestration instead of introducing another tool.
security 
15 hours ago
confluentinc/ducktape: System integration and performance tests
Distributed System Integration & Performance Testing Library
Overview
Ducktape contains tools for running system integration and performance tests. It provides the following features:

Isolation by default so system tests are as reliable as possible.
Utilities for pulling up and tearing down services easily in clusters in different environments (e.g. local, custom cluster, Vagrant, K8s, Mesos, Docker, cloud providers, etc.)
Easy to write unit tests for distributed systems
Trigger special events (e.g. bouncing a service)
Collect results (e.g. logs, console output)
Report results (e.g. expected conditions met, performance results, etc.)
kafka 
3 days ago
MapStruct – Java bean mappings, the easy way!
MapStruct is a code generator that greatly simplifies the implementation of mappings between Java bean types based on a convention over configuration approach.

The generated mapping code uses plain method invocations and thus is fast, type-safe and easy to understand.
kotlin  mapping 
13 days ago
Managed Kubernetes Price Comparison (2020) | DevOps Directive
Also, running on spot/preemptible/low-priority nodes or long-term committed nodes makes a massive impact across all of the platforms.
cloud  eks 
29 days ago
http4k/http4k: http4k is a "Server as a Function" HTTP toolkit written in Kotlin with a focus on creating simple, testable APIs
http4k is a lightweight but fully-featured HTTP toolkit written in pure Kotlin that enables the serving and consuming of HTTP services in a functional and consistent way. http4k applications are just Kotlin functions which can be mounted into a running backend
web  kotlin 
5 weeks ago
The What, Why, and When of Single-Table Design with DynamoDB
The main reason for using a single table in DynamoDB is to retrieve multiple, heterogenous item types using a single request.
dynamodb 
5 weeks ago
Static stability using Availability Zones
In this article, we’ve discussed some simple strategies that we’ve used at AWS for successfully taking dependencies on Availability Zones. We’ve learned that the key to static stability is to anticipate impairments before they happen. Whether a system runs on an active-active horizontally scalable fleet, or whether it is a stateful, active-standby pattern, we can use Availability Zones to target high levels of availability. We deploy our systems so that all capacity that will be needed in the event of an impairment is already fully provisioned and ready to go. Finally, we took a deeper look into how Amazon EC2 itself uses static stability concepts to keep Availability Zones independent of one another.
AWS  builders_library 
6 weeks ago
Round 18 results - TechEmpower Framework Benchmarks
In the following tests, we have measured the performance of several web application platforms, full-stack frameworks, and micro-frameworks (collectively, "frameworks"). For more information, read the introduction, motivation, and latest environment details.
Benchmark  web  WebPerformance 
6 weeks ago
Where is a good site for getting an introduction on what HTTPS covers. Is the U... | Hacker News
Think of it as occuring between TCP and HTTP. So you browser establishes a network connection to example.org, then negotiates to speak SSL/TLS, and then all the web things happen over the top of that (there are minor exceptions for vhost TLS configs).
So no web traffic should traverse in the clear - the URL, domains, GET data, POST data, headers, etc are protected.

however that does leave a surprising amount of info. Your IP address, the IP address you're connecting to, the host domain you're connecting to if your browser just did a DNS lookup (99% likely it did), how long you communicate with that site, the traffic shape, etc etc.

As a crude example: your ISP sees a DNS lookup to pornhub.com, followed by a connection to the IP address associated with that name, followed by 3 hours of fairly large packet sizes in regular repetitive patterns. It's highly likely they can extrapolate what's in your browser.
security 
6 weeks ago
Elasticsearch should not be used as the sole source of truth. I've been using i... | Hacker News
Elasticsearch should not be used as the sole source of truth. I've been using it for years professionally, and it's an amazing tool but not safe with regard to data integrity / durability.
While dramatic progress and improvements have been made over the past 9 years, sometimes things still go bad and indices get corrupted. When this happens, it's necessary to reindex the data. There are also additional situations where reindexing is required. So the safe advice is: Always have the authoritative data source elsewhere (in a reliable data store or database of some kind) and then load the data into Elasticsearch from there.
Postgres or even MySQL will be a safer bet when data integrity is key. Then it's only a matter of indexing the data from the DB into ES.
Using Elasticsearch for a blog is a fun you idea, but ultimately is likely to be overkill for a personal blog site.
ElasticSearch  Databases 
6 weeks ago
I've heard that Elasticsearch has had some durability issues in the past and the... | Hacker News
However, it's not a database. I've actually abused it as such and it's fine. You get optimistic locking but no real transactions. Search is eventually consistent unless you call _refresh (but you shouldn't), etc. Bearing in mind it is not a database, it is not intended to be used as a database, and probably will never be a database, it actually works fine as a database provided you don't do a lot of updates (write model is append only).
If safety is a big concern for you, obviously use something else. But for a blog it's completely fine.
ElasticSearch 
6 weeks ago
Bye Bye Mongo, Hello Postgres | Hacker News
excellent write up of a migration from mongodb to postgres.
guardian  mongodb  PostgreSQL  Migrations 
7 weeks ago
A new hash algorithm for Git [LWN.net]
The Git source-code management system is famously built on the SHA‑1 hashing algorithm, which has become an increasingly weak foundation over the years. SHA‑1 is now considered to be broken and, despite the fact that it does not yet seem to be so broken that it could be used to compromise Git repositories, users are increasingly worried about its security. The good news is that work on moving Git past SHA‑1 has been underway for some time, and is slowly coming to fruition; there is a version of the code that can be looked at now.
git 
7 weeks ago
Frequency Trails: What the Mean Really Means
As the distributions from these surveyed systems show, an average is not a good representation of real-world latency distributions. The best way to understand them is by visualizing them, which can be done using histograms, heat maps, density plots, or frequency trails.

As a way to identify numerically whether the average has been compromised – and the distribution needs to be visualized – you can try the six-sigma test from Detecting Outliers, and the modal test from Modes and Modality. These can identify whether outliers and multiple modes are present.

The difference between the mean and the median can be studied to detect when the mean has been offset; it may not detect bimodal distributions, where the mean and median are similar.

As a statistic, averages (including the arithmetic mean) have many practical uses. Properly understanding a distribution isn't one of them.
WebPerformance  Performance  Statistics 
7 weeks ago
amazon web services - Does AWS Step Functions have a timeout feature? - Stack Overflow
"Unfortunately you can't dynamically specify the timeout for a state, but you can dynamically tell a Wait state how long it should wait. With that said, I would recommend that you use a Parallel State with two branches and a catch block. The first branch contains a Wait State and a Fail State (your timeout). The other branch contains your normal State Machine logic and a Fail State."
aws  StepFunctions 
7 weeks ago
« earlier      
per page:    204080120160

Copy this bookmark:





to read